Message299766
It might help if you explained what “atrocities” are happening on your network. Is there a proxy or man-in-the-middle (or the remote peer) that shuts down TCP connections?
If so, perhaps this is similar to Issue 10808. From my memory, in that case an OS “recv” or “read” call returns zero to indicate a connection was shut down. Python and/or Open SSL correctly treats this as an error, but then assumes “errno” is valid. Perhaps Python should be raising SSLEOFError in this situation.
Maybe also check the “suppress_ragged_eofs” setting, but I think that only affects later stages, after the handshake succeeds. |
|
Date |
User |
Action |
Args |
2017-08-05 01:49:39 | martin.panter | set | recipients:
+ martin.panter, christian.heimes, nikratio |
2017-08-05 01:49:39 | martin.panter | set | messageid: <1501897779.85.0.852741090708.issue31122@psf.upfronthosting.co.za> |
2017-08-05 01:49:39 | martin.panter | link | issue31122 messages |
2017-08-05 01:49:39 | martin.panter | create | |
|