Author christian.heimes
Recipients Alex Warhawk, Mark.Ribau, Ye.Wang, alex, christian.heimes, dstufft, giampaolo.rodola, janssen, pitrou, xiang.zhang
Date 2016-09-05.18:26:27
SpamBayes Score -1.0
Marked as misclassified Yes
Message-id <>
Note to future me:
Don't forget to take care of X.509 client authentication. A server is allowed to bypass client cert validation when a SSL session is resumed. SSLContext.load_cert_chain() should invalidate session caches. (CVE-2016-5419
Date User Action Args
2016-09-05 18:26:27christian.heimessetrecipients: + christian.heimes, janssen, pitrou, giampaolo.rodola, alex, dstufft, Ye.Wang, Mark.Ribau, xiang.zhang, Alex Warhawk
2016-09-05 18:26:27christian.heimessetmessageid: <>
2016-09-05 18:26:27christian.heimeslinkissue19500 messages
2016-09-05 18:26:27christian.heimescreate