This issue tracker has been migrated to GitHub, and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

Author christian.heimes
Recipients Dima.Tisnek, asvetlov, christian.heimes, fantix, yselivanov
Date 2021-02-05.08:08:36
SpamBayes Score -1.0
Marked as misclassified Yes
Message-id <1612512517.06.0.681836436177.issue39951@roundup.psfhosted.org>
In-reply-to
Content
3.7 is in security fix-only mode.

APPLICATION_DATA_AFTER_CLOSE_NOTIFY is a protocol violation in any TLS version. It's not related to TLS 1.3. The error occurs when one side wants to close the connection, but the other sides keeps sending user data. It's bug in higher level application could. The ssl module cannot ignore this error condition.

https://github.com/openssl/openssl/blob/76624df15fef0725f28a8b9d0f31256946669b1a/ssl/record/rec_layer_s3.c#L1635-L1648
History
Date User Action Args
2021-02-05 08:08:37christian.heimessetrecipients: + christian.heimes, fantix, asvetlov, Dima.Tisnek, yselivanov
2021-02-05 08:08:37christian.heimessetmessageid: <1612512517.06.0.681836436177.issue39951@roundup.psfhosted.org>
2021-02-05 08:08:37christian.heimeslinkissue39951 messages
2021-02-05 08:08:36christian.heimescreate