Author christian.heimes
Recipients christian.heimes
Date 2018-02-25.11:54:40
SpamBayes Score -1.0
Marked as misclassified Yes
Message-id <1519559680.67.0.467229070634.issue32947@psf.upfronthosting.co.za>
In-reply-to
Content
I'm using this ticket as an epos to track commits and required changes for OpenSSL 1.1.1 and TLS 1.3. Fixes need to be backported to 2.7 and 3.6 to 3.8. We might have to consider backports to 3.4 and 3.5, too.

If all goes to plan, OpenSSL 1.1.1 final is scheduled for 8th May 2018, https://www.openssl.org/policies/releasestrat.html . It will contain support for TLS 1.3. Python should either support TLS 1.3 by then or disable TLS 1.3 by default.

Fixes:

* #20995 added TLS 1.3 cipher suite support
* #29136 added OP_NO_TLSv1_3
* #30622 fixes NPN guard for OpenSSL 1.1.1

Issues:

* A new option OP_ENABLE_MIDDLEBOX_COMPAT is enabled by default. We need to expose the flag to make test pass.
* TLS 1.3 has changed session handling. The current session code cannot handle TLS 1.3 session resumption.
* Threaded echo server and asynchat based tests are failing with TLS 1.3. I haven't analyzed the issue properly. It looks like the server thread dies when a handshake error occurs.
History
Date User Action Args
2018-02-25 11:54:40christian.heimessetrecipients: + christian.heimes
2018-02-25 11:54:40christian.heimessetmessageid: <1519559680.67.0.467229070634.issue32947@psf.upfronthosting.co.za>
2018-02-25 11:54:40christian.heimeslinkissue32947 messages
2018-02-25 11:54:40christian.heimescreate