Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | Issue #21043: Remove the recommendation for specific CA organizations | Donald Stufft | 2014-03-24 | 1 | -14/+3 |
| | | | | | | | Closes #21043 by updating the documentation to remove specific CA organizations and update the text to no longer need to tell you to download root certificates, but instead use the OS certificates avaialble through SSLContext.load_default_certs. | ||||
* | Issue #21013: Enhance ssl.create_default_context() for server side contexts | Donald Stufft | 2014-03-23 | 1 | -7/+20 |
| | | | | | | | | | | | | | | | | | | | | Closes #21013 by modfying ssl.create_default_context() to: * Move the restricted ciphers to only apply when using ssl.Purpose.CLIENT_AUTH. The major difference between restricted and not is the lack of RC4 in the restricted. However there are servers that exist that only expose RC4 still. * Switches the default protocol to ssl.PROTOCOL_SSLv23 so that the context will select TLS1.1 or TLS1.2 if it is available. * Add ssl.OP_NO_SSLv3 by default to continue to block SSL3.0 sockets * Add ssl.OP_SINGLE_DH_USE and ssl.OP_SINGLE_ECDG_USE to improve the security of the perfect forward secrecy * Add ssl.OP_CIPHER_SERVER_PREFERENCE so that when used for a server side socket the context will prioritize our ciphers which have been carefully selected to maximize security and performance. * Documents the failure conditions when a SSL3.0 connection is required so that end users can more easily determine if they need to unset ssl.OP_NO_SSLv3. | ||||
* | Issue #20913: make it clear that create_default_context() also enables ↵ | Antoine Pitrou | 2014-03-23 | 1 | -4/+5 |
| | | | | hostname checking | ||||
* | Issue #20913: improve the SSL security considerations to first advocate ↵ | Antoine Pitrou | 2014-03-22 | 1 | -6/+36 |
| | | | | using create_default_context(). | ||||
* | Issue #20995: Enhance default ciphers used by the ssl module | Donald Stufft | 2014-03-22 | 1 | -11/+4 |
| | | | | | | | | | | | | | | | Closes #20995 by Enabling better security by prioritizing ciphers such that: * Prefer cipher suites that offer perfect forward secrecy (DHE/ECDHE) * Prefer ECDHE over DHE for better performance * Prefer any AES-GCM over any AES-CBC for better performance and security * Then Use HIGH cipher suites as a fallback * Then Use 3DES as fallback which is secure but slow * Finally use RC4 as a fallback which is problematic but needed for compatibility some times. * Disable NULL authentication, NULL encryption, and MD5 MACs for security reasons | ||||
* | Merge in all documentation changes since branching 3.4.0rc1. | Larry Hastings | 2014-03-16 | 1 | -3/+2 |
| | |||||
* | Issue #19422: Explicitly disallow non-SOCK_STREAM sockets in the ssl module, ↵ | Antoine Pitrou | 2013-12-28 | 1 | -8/+14 |
|\ | | | | | | | rather than silently let them emit clear text data. | ||||
| * | Issue #19422: Explicitly disallow non-SOCK_STREAM sockets in the ssl module, ↵ | Antoine Pitrou | 2013-12-28 | 1 | -8/+14 |
| | | | | | | | | rather than silently let them emit clear text data. | ||||
* | | Tidy up ssl whatsnew references, make ssl section formatting consistent. | R David Murray | 2013-12-20 | 1 | -4/+1 |
| | | | | | | | | | | Also remove some extra blank lines in the ssl doc acctions for tls1.1/1.2, and reflow a paragraph. | ||||
* | | Issue #19509: Add SSLContext.check_hostname to match the peer's certificate | Christian Heimes | 2013-12-02 | 1 | -1/+35 |
| | | | | | | | | with server_hostname on handshake. | ||||
* | | Issue #19795: Improved markup of True/False constants. | Serhiy Storchaka | 2013-11-29 | 1 | -4/+4 |
|\ \ | |/ | |||||
| * | Issue #19795: Improved markup of True/False constants. | Serhiy Storchaka | 2013-11-29 | 1 | -3/+3 |
| | | |||||
* | | Tweak ssl docs | Antoine Pitrou | 2013-11-23 | 1 | -23/+53 |
| | | |||||
* | | Issue #19689: Add ssl.create_default_context() factory function. It creates | Christian Heimes | 2013-11-23 | 1 | -0/+18 |
| | | | | | | | | a new SSLContext object with secure default settings. | ||||
* | | Correct documentation clientAuth -> CLIENT_AUTH | Christian Heimes | 2013-11-23 | 1 | -2/+2 |
| | | |||||
* | | Issue #19292: Add SSLContext.load_default_certs() to load default root CA | Christian Heimes | 2013-11-23 | 1 | -1/+30 |
| | | | | | | | | | | certificates from default stores or system stores. By default the method loads CA certs for authentication of server certs. | ||||
* | | Issue #8813: X509_VERIFY_PARAM is only available on OpenSSL 0.9.8+ | Christian Heimes | 2013-11-23 | 1 | -0/+1 |
| | | | | | | | | The patch removes the verify_flags feature on Mac OS X 10.4 with OpenSSL 0.9.7l 28 Sep 2006. | ||||
* | | Issue #18147: Add missing documentation for SSLContext.get_ca_certs(). | Christian Heimes | 2013-11-22 | 1 | -0/+12 |
| | | | | | | | | Also change the argument name to the same name as getpeercert() | ||||
* | | Issue #17134: Finalize interface to Windows' certificate store. Cert and | Christian Heimes | 2013-11-22 | 1 | -15/+30 |
| | | | | | | | | | | CRL enumeration are now two functions. enum_certificates() also returns purpose flags as set of OIDs. | ||||
* | | Issue #8813: Add SSLContext.verify_flags to change the verification flags | Christian Heimes | 2013-11-21 | 1 | -0/+45 |
| | | | | | | | | | | of the context in order to enable certification revocation list (CRL) checks or strict X509 rules. | ||||
* | | Issue #18379: SSLSocket.getpeercert() returns CA issuer AIA fields, OCSP | Christian Heimes | 2013-11-21 | 1 | -0/+4 |
| | | | | | | | | and CRL distribution points. | ||||
* | | Issue #18138: Implement cadata argument of SSLContext.load_verify_location() | Christian Heimes | 2013-11-21 | 1 | -1/+10 |
| | | | | | | | | | | to load CA certificates and CRL from memory. It supports PEM and DER encoded strings. | ||||
* | | Issue #19508: direct the user to read the security considerations for the ↵ | Antoine Pitrou | 2013-11-17 | 1 | -5/+14 |
|\ \ | |/ | | | | | ssl module | ||||
| * | Issue #19508: direct the user to read the security considerations for the ↵ | Antoine Pitrou | 2013-11-17 | 1 | -5/+14 |
| | | | | | | | | ssl module | ||||
* | | merge | Christian Heimes | 2013-10-29 | 1 | -1/+1 |
|\ \ | |/ | |||||
| * | fix language | Christian Heimes | 2013-10-29 | 1 | -1/+1 |
| | | |||||
* | | Issue #19227 / Issue #18747: Remove pthread_atfork() handler to remove ↵ | Christian Heimes | 2013-10-29 | 1 | -0/+8 |
|\ \ | |/ | | | | | | | | | OpenSSL re-seeding It is causing trouble like e.g. hanging processes. | ||||
| * | Issue #18747: document issue with OpenSSL's CPRNG state and fork | Christian Heimes | 2013-10-29 | 1 | -0/+8 |
| | | |||||
* | | merge with 3.3 | Georg Brandl | 2013-10-27 | 1 | -4/+11 |
|\ \ | |/ | |||||
| * | Issue #17997: Change behavior of ``ssl.match_hostname()`` to follow RFC 6125, | Georg Brandl | 2013-10-27 | 1 | -4/+11 |
| | | | | | | | | | | for security reasons. It now doesn't match multiple wildcards nor wildcards inside IDN fragments. | ||||
* | | merge with 3.3 | Georg Brandl | 2013-10-06 | 1 | -3/+3 |
|\ \ | |/ | |||||
| * | Closes #19177: replace dead link to SSL/TLS introduction with the version ↵ | Georg Brandl | 2013-10-06 | 1 | -3/+3 |
| | | | | | | | | from Apache. | ||||
* | | Issue #19095: SSLSocket.getpeercert() now raises ValueError when the SSL ↵ | Antoine Pitrou | 2013-09-29 | 1 | -1/+5 |
| | | | | | | | | handshake hasn't been done. | ||||
* | | Fix minor documentation markup error. | Larry Hastings | 2013-08-03 | 1 | -1/+1 |
| | | |||||
* | | Merge #18311: fix typo. | R David Murray | 2013-06-26 | 1 | -1/+1 |
|\ \ | |/ | |||||
| * | #18311: fix typo. | R David Murray | 2013-06-26 | 1 | -1/+1 |
| | | |||||
* | | Issue #18147: Add diagnostic functions to ssl.SSLContext(). | Christian Heimes | 2013-06-17 | 1 | -0/+24 |
| | | | | | | | | | | get_ca_list() lists all loaded CA certificates and cert_store_stats() returns amount of loaded X.509 certs, X.509 CA certs and CRLs. | ||||
* | | Issue #17134: Add ssl.enum_cert_store() as interface to Windows' cert store. | Christian Heimes | 2013-06-09 | 1 | -0/+23 |
| | | |||||
* | | removed accidental new line | Christian Heimes | 2013-06-09 | 1 | -2/+1 |
| | | |||||
* | | Issue #18143: Implement ssl.get_default_verify_paths() in order to debug | Christian Heimes | 2013-06-09 | 1 | -1/+19 |
| | | | | | | | | the default locations for cafile and capath. | ||||
* | | Issue #17739: fix the description of SSLSocket.getpeercert(binary_form=True) ↵ | Antoine Pitrou | 2013-04-16 | 1 | -5/+11 |
|\ \ | |/ | | | | | | | | | for server sockets. Thanks to David D Lowe for reporting. | ||||
| * | Issue #17739: fix the description of SSLSocket.getpeercert(binary_form=True) ↵ | Antoine Pitrou | 2013-04-16 | 1 | -5/+11 |
| | | | | | | | | | | | | for server sockets. Thanks to David D Lowe for reporting. | ||||
* | | Fix a crash when setting a servername callback on a SSL server socket and ↵ | Antoine Pitrou | 2013-04-11 | 1 | -0/+1 |
| | | | | | | | | | | | | | | the client doesn't send a server name. Patch by Kazuhiro Yoshida. (originally issue #8109) | ||||
* | | Issue #16692: The ssl module now supports TLS 1.1 and TLS 1.2. Initial ↵ | Antoine Pitrou | 2013-03-28 | 1 | -10/+45 |
| | | | | | | | | patch by Michele Orrù. | ||||
* | | Issue #17047: remove doubled words added in 3.4, | Terry Jan Reedy | 2013-03-11 | 1 | -1/+1 |
| | | | | | | | | as reported by Serhiy Storchaka and Matthew Barnett. | ||||
* | | Issue #8109: The ssl module now has support for server-side SNI, thanks to a ↵ | Antoine Pitrou | 2013-01-05 | 1 | -0/+71 |
|/ | | | | | | :meth:`SSLContext.set_servername_callback` method. Patch by Daniel Black. | ||||
* | Update the getpeercert() example with a real-world cert showing non-trivial ↵ | Antoine Pitrou | 2012-08-16 | 1 | -17/+33 |
|\ | | | | | | | issuer, subject and subjectAltName. | ||||
| * | Update the getpeercert() example with a real-world cert showing non-trivial ↵ | Antoine Pitrou | 2012-08-16 | 1 | -17/+33 |
| | | | | | | | | issuer, subject and subjectAltName. | ||||
* | | Issue #14837: SSL errors now have `library` and `reason` attributes ↵ | Antoine Pitrou | 2012-06-22 | 1 | -0/+16 |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | describing precisely what happened and in which OpenSSL submodule. The str() of a SSLError is also enhanced accordingly. NOTE: this commit creates a reference leak. The leak seems tied to the use of PyType_FromSpec() to create the SSLError type. The leak is on the type object when it is instantiated: >>> e = ssl.SSLError() >>> sys.getrefcount(ssl.SSLError) 35 >>> e = ssl.SSLError() >>> sys.getrefcount(ssl.SSLError) 36 >>> e = ssl.SSLError() >>> sys.getrefcount(ssl.SSLError) 37 | ||||
* | | Issue #14204: The ssl module now has support for the Next Protocol ↵ | Antoine Pitrou | 2012-03-21 | 1 | -1/+34 |
| | | | | | | | | | | | | Negotiation extension, if available in the underlying OpenSSL library. Patch by Colin Marc. |