This issue tracker has been migrated to GitHub, and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

Author martin.panter
Recipients christian.heimes, martin.panter, nikratio
Date 2017-08-05.01:49:39
SpamBayes Score -1.0
Marked as misclassified Yes
Message-id <1501897779.85.0.852741090708.issue31122@psf.upfronthosting.co.za>
In-reply-to
Content
It might help if you explained what “atrocities” are happening on your network. Is there a proxy or man-in-the-middle (or the remote peer) that shuts down TCP connections?

If so, perhaps this is similar to Issue 10808. From my memory, in that case an OS “recv” or “read” call returns zero to indicate a connection was shut down. Python and/or Open SSL correctly treats this as an error, but then assumes “errno” is valid. Perhaps Python should be raising SSLEOFError in this situation.

Maybe also check the “suppress_ragged_eofs” setting, but I think that only affects later stages, after the handshake succeeds.
History
Date User Action Args
2017-08-05 01:49:39martin.pantersetrecipients: + martin.panter, christian.heimes, nikratio
2017-08-05 01:49:39martin.pantersetmessageid: <1501897779.85.0.852741090708.issue31122@psf.upfronthosting.co.za>
2017-08-05 01:49:39martin.panterlinkissue31122 messages
2017-08-05 01:49:39martin.pantercreate