This issue tracker has been migrated to GitHub, and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

Author christian.heimes
Recipients christian.heimes, darrenrs
Date 2021-01-22.08:05:16
SpamBayes Score -1.0
Marked as misclassified Yes
Message-id <1611302716.32.0.793560974006.issue43000@roundup.psfhosted.org>
In-reply-to
Content
I'm not familiar with Telerik Fiddler and don't have access to the tool. From the description on its Wikipedia page, it sounds like the tool is an active interceptor that uses a man-in-the-middle attack approach.

Python's ssl module wraps OpenSSL. All steps of the TLS handshake are performed by OpenSSL code. Your connection issue is most likely an incompatibility between recent OpenSSL 1.1.1 and your tool. I recommend that you contact the vendor of your tool.

The ssl module supports passive introspection of TLS connections with SSLKEYLOGFILE. The format is supported by Wireshark and other tools.
History
Date User Action Args
2021-01-22 08:05:16christian.heimessetrecipients: + christian.heimes, darrenrs
2021-01-22 08:05:16christian.heimessetmessageid: <1611302716.32.0.793560974006.issue43000@roundup.psfhosted.org>
2021-01-22 08:05:16christian.heimeslinkissue43000 messages
2021-01-22 08:05:16christian.heimescreate