This issue tracker has been migrated to GitHub, and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

Author christian.heimes
Recipients amacd31, christian.heimes, jakirkham, jan-xyz, matan1008, methane, ronaldoussoren
Date 2021-06-24.20:39:31
SpamBayes Score -1.0
Marked as misclassified Yes
Message-id <1624567171.6.0.240585802465.issue42853@roundup.psfhosted.org>
In-reply-to
Content
Right now sending and receiving buffers >2 GB over TLS consistently fails on all platforms with Python 3.9. A backport of bf624032c12c763b72594e5f41ff8af309b85264 to Python 3.9 would make the behavior inconsistent. Your code would work on your laptop with a recent Fedora or Ubuntu version that has OpenSSL 1.1.1. But it would suddenly fail on your production system with Debian 10, because it has OpenSSL 1.1.0 and Python would have to fall back to SSL_read().

In my experience these kinds of inconsistencies cause headaches and frustrations. A consistent error gives you a chance to notice a problem early and to implement a workaround.
History
Date User Action Args
2021-06-24 20:39:31christian.heimessetrecipients: + christian.heimes, ronaldoussoren, methane, jakirkham, matan1008, amacd31, jan-xyz
2021-06-24 20:39:31christian.heimessetmessageid: <1624567171.6.0.240585802465.issue42853@roundup.psfhosted.org>
2021-06-24 20:39:31christian.heimeslinkissue42853 messages
2021-06-24 20:39:31christian.heimescreate