Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | Issue #21356: Make ssl.RAND_egd() optional to support LibreSSL. The | Victor Stinner | 2015-01-06 | 1 | -1/+6 |
| | | | | | availability of the function is checked during the compilation. Patch written by Bernard Spil. | ||||
* | Issue #20896, #22935: The ssl.get_server_certificate() function now uses the | Victor Stinner | 2015-01-06 | 1 | -1/+1 |
| | | | | | | ssl.PROTOCOL_SSLv23 protocol by default, not ssl.PROTOCOL_SSLv3, for maximum compatibility and support platforms where ssl.PROTOCOL_SSLv3 support is disabled. | ||||
* | Issue #22935: Fix ssl module when SSLv3 protocol is not supported | Victor Stinner | 2014-12-12 | 1 | -6/+2 |
| | |||||
* | don't require OpenSSL SNI to pass hostname to ssl functions (#22921) | Benjamin Peterson | 2014-11-23 | 1 | -6/+1 |
| | | | | Patch by Donald Stufft. | ||||
* | Issue #22638: SSLv3 is now disabled throughout the standard library. | Antoine Pitrou | 2014-10-17 | 1 | -0/+3 |
| | | | | It can still be enabled by instantiating a SSLContext manually. | ||||
* | PEP 476: enable HTTPS certificate verification by default (#22417) | Benjamin Peterson | 2014-11-03 | 1 | -2/+9 |
| | | | | Patch by Alex Gaynor with some modifications by me. | ||||
* | Issue #22186: Fix typos in Lib/. | Berker Peksag | 2014-10-19 | 1 | -1/+1 |
| | | | | Patch by Févry Thibault. | ||||
* | also use openssl envvars to find certs on windows (closes #22449) | Benjamin Peterson | 2014-10-03 | 1 | -2/+1 |
| | | | | Patch by Christian Heimes and Alex Gaynor. | ||||
* | Issue #21013: Enhance ssl.create_default_context() for server side contexts | Donald Stufft | 2014-03-23 | 1 | -6/+24 |
| | | | | | | | | | | | | | | | | | | | | Closes #21013 by modfying ssl.create_default_context() to: * Move the restricted ciphers to only apply when using ssl.Purpose.CLIENT_AUTH. The major difference between restricted and not is the lack of RC4 in the restricted. However there are servers that exist that only expose RC4 still. * Switches the default protocol to ssl.PROTOCOL_SSLv23 so that the context will select TLS1.1 or TLS1.2 if it is available. * Add ssl.OP_NO_SSLv3 by default to continue to block SSL3.0 sockets * Add ssl.OP_SINGLE_DH_USE and ssl.OP_SINGLE_ECDG_USE to improve the security of the perfect forward secrecy * Add ssl.OP_CIPHER_SERVER_PREFERENCE so that when used for a server side socket the context will prioritize our ciphers which have been carefully selected to maximize security and performance. * Documents the failure conditions when a SSL3.0 connection is required so that end users can more easily determine if they need to unset ssl.OP_NO_SSLv3. | ||||
* | Issue #20995: Enhance default ciphers used by the ssl module | Donald Stufft | 2014-03-22 | 1 | -8/+31 |
| | | | | | | | | | | | | | | | Closes #20995 by Enabling better security by prioritizing ciphers such that: * Prefer cipher suites that offer perfect forward secrecy (DHE/ECDHE) * Prefer ECDHE over DHE for better performance * Prefer any AES-GCM over any AES-CBC for better performance and security * Then Use HIGH cipher suites as a fallback * Then Use 3DES as fallback which is secure but slow * Finally use RC4 as a fallback which is problematic but needed for compatibility some times. * Disable NULL authentication, NULL encryption, and MD5 MACs for security reasons | ||||
* | Issue #20976: pyflakes: Remove unused imports | Victor Stinner | 2014-03-20 | 1 | -3/+0 |
| | |||||
* | Issue #19422: Explicitly disallow non-SOCK_STREAM sockets in the ssl module, ↵ | Antoine Pitrou | 2013-12-28 | 1 | -0/+5 |
|\ | | | | | | | rather than silently let them emit clear text data. | ||||
| * | Issue #19422: Explicitly disallow non-SOCK_STREAM sockets in the ssl module, ↵ | Antoine Pitrou | 2013-12-28 | 1 | -0/+5 |
| | | | | | | | | rather than silently let them emit clear text data. | ||||
* | | Issue #19509: Don't close the socket in do_handshake() when hostname ↵ | Christian Heimes | 2013-12-04 | 1 | -9/+4 |
| | | | | | | | | verification fails. | ||||
* | | add check_hostname arg to ssl._create_stdlib_context() | Christian Heimes | 2013-12-02 | 1 | -1/+2 |
| | | |||||
* | | Issue #19509: Add SSLContext.check_hostname to match the peer's certificate | Christian Heimes | 2013-12-02 | 1 | -5/+27 |
| | | | | | | | | with server_hostname on handshake. | ||||
* | | ssl.create_default_context() sets OP_NO_COMPRESSION to prevent CRIME | Christian Heimes | 2013-11-28 | 1 | -0/+2 |
| | | |||||
* | | Issue #19735: Implement private function ssl._create_stdlib_context() to | Christian Heimes | 2013-11-23 | 1 | -6/+44 |
| | | | | | | | | | | create SSLContext objects in Python's stdlib module. It provides a single configuration point and makes use of SSLContext.load_default_certs(). | ||||
* | | Issue #19689: Add ssl.create_default_context() factory function. It creates | Christian Heimes | 2013-11-23 | 1 | -0/+35 |
| | | | | | | | | a new SSLContext object with secure default settings. | ||||
* | | Issue #19292: Add SSLContext.load_default_certs() to load default root CA | Christian Heimes | 2013-11-23 | 1 | -0/+28 |
| | | | | | | | | | | certificates from default stores or system stores. By default the method loads CA certs for authentication of server certs. | ||||
* | | Issue #17134: Finalize interface to Windows' certificate store. Cert and | Christian Heimes | 2013-11-22 | 1 | -1/+1 |
| | | | | | | | | | | CRL enumeration are now two functions. enum_certificates() also returns purpose flags as set of OIDs. | ||||
* | | Issue #8813: Add SSLContext.verify_flags to change the verification flags | Christian Heimes | 2013-11-21 | 1 | -0/+2 |
| | | | | | | | | | | of the context in order to enable certification revocation list (CRL) checks or strict X509 rules. | ||||
* | | Issue #19448: Add private API to SSL module to lookup ASN.1 objects by OID, ↵ | Christian Heimes | 2013-11-17 | 1 | -2/+24 |
| | | | | | | | | NID, short name and long name. | ||||
* | | merge with 3.3 | Georg Brandl | 2013-10-27 | 1 | -22/+50 |
|\ \ | |/ | |||||
| * | Issue #17997: Change behavior of ``ssl.match_hostname()`` to follow RFC 6125, | Georg Brandl | 2013-10-27 | 1 | -22/+50 |
| | | | | | | | | | | for security reasons. It now doesn't match multiple wildcards nor wildcards inside IDN fragments. | ||||
* | | #18705: merge with 3.3. | Ezio Melotti | 2013-08-17 | 1 | -1/+1 |
|\ \ | |/ | |||||
| * | #18705: fix a number of typos. Patch by Févry Thibault. | Ezio Melotti | 2013-08-17 | 1 | -1/+1 |
| | | |||||
* | | Issue #9177: Calling read() or write() now raises ValueError, not ↵ | Antoine Pitrou | 2013-07-20 | 1 | -0/+4 |
| | | | | | | | | | | | | AttributeError, on a closed SSL socket. Patch by Senko Rasic. | ||||
* | | Issue #18200: Back out usage of ModuleNotFoundError (8d28d44f3a9a) | Brett Cannon | 2013-07-04 | 1 | -2/+2 |
| | | |||||
* | | Issue #18200: Update the stdlib (except tests) to use | Brett Cannon | 2013-06-14 | 1 | -2/+2 |
| | | | | | | | | ModuleNotFoundError. | ||||
* | | Issue #17134: Add ssl.enum_cert_store() as interface to Windows' cert store. | Christian Heimes | 2013-06-09 | 1 | -0/+4 |
| | | |||||
* | | Issue #18143: Implement ssl.get_default_verify_paths() in order to debug | Christian Heimes | 2013-06-09 | 1 | -0/+20 |
| | | | | | | | | the default locations for cafile and capath. | ||||
* | | Issue #17980: Fix possible abuse of ssl.match_hostname() for denial of ↵ | Antoine Pitrou | 2013-05-18 | 1 | -1/+8 |
|\ \ | |/ | | | | | service using certificates with many wildcards (CVE-2013-2099). | ||||
| * | Issue #17980: Fix possible abuse of ssl.match_hostname() for denial of ↵ | Antoine Pitrou | 2013-05-18 | 1 | -1/+8 |
| | | | | | | | | service using certificates with many wildcards (CVE-2013-2099). | ||||
* | | Issue #13721: SSLSocket.getpeercert() and SSLSocket.do_handshake() now raise ↵ | Antoine Pitrou | 2013-05-01 | 1 | -12/+22 |
| | | | | | | | | an OSError with ENOTCONN, instead of an AttributeError, when the SSLSocket is not connected. | ||||
* | | remove uneffective 'while True' clause | Giampaolo Rodola' | 2013-04-03 | 1 | -11/+10 |
| | | |||||
* | | Issue #16692: The ssl module now supports TLS 1.1 and TLS 1.2. Initial ↵ | Antoine Pitrou | 2013-03-28 | 1 | -2/+11 |
| | | | | | | | | patch by Michele Orrù. | ||||
* | | merge 3.3 (#16900) | Benjamin Peterson | 2013-01-10 | 1 | -4/+0 |
|\ \ | |/ | |||||
| * | remove __del__ because it's evil and also prevents the ResourceWarning on ↵ | Benjamin Peterson | 2013-01-10 | 1 | -4/+0 |
| | | | | | | | | the socket from happening (closes #16900) | ||||
* | | Issue #8109: The ssl module now has support for server-side SNI, thanks to a ↵ | Antoine Pitrou | 2013-01-05 | 1 | -32/+60 |
| | | | | | | | | | | | | :meth:`SSLContext.set_servername_callback` method. Patch by Daniel Black. | ||||
* | | Issue #16717: get rid of socket.error, replace with OSError | Andrew Svetlov | 2012-12-18 | 1 | -4/+6 |
|/ | |||||
* | Issue #16357: fix calling accept() on a SSLSocket created through ↵ | Antoine Pitrou | 2012-11-11 | 1 | -10/+5 |
|\ | | | | | | | | | | | SSLContext.wrap_socket(). Original patch by Jeff McNeil. | ||||
| * | Issue #16357: fix calling accept() on a SSLSocket created through ↵ | Antoine Pitrou | 2012-11-11 | 1 | -10/+5 |
| | | | | | | | | | | | | SSLContext.wrap_socket(). Original patch by Jeff McNeil. | ||||
* | | Issue #14204: The ssl module now has support for the Next Protocol ↵ | Antoine Pitrou | 2012-03-21 | 1 | -3/+24 |
| | | | | | | | | | | | | Negotiation extension, if available in the underlying OpenSSL library. Patch by Colin Marc. | ||||
* | | Try to really fix compilation failures of the _ssl module under very old ↵ | Antoine Pitrou | 2012-02-17 | 1 | -1/+5 |
| | | | | | | | | OpenSSLs. | ||||
* | | Issue #13636: Weak ciphers are now disabled by default in the ssl module | Antoine Pitrou | 2012-01-03 | 1 | -2/+11 |
|\ \ | |/ | | | | | (except when SSLv2 is explicitly asked for). | ||||
| * | Issue #13636: Weak ciphers are now disabled by default in the ssl module | Antoine Pitrou | 2012-01-03 | 1 | -2/+10 |
| | | | | | | | | (except when SSLv2 is explicitly asked for). | ||||
* | | Issue #13626: Add support for SSL Diffie-Hellman key exchange, through the | Antoine Pitrou | 2011-12-22 | 1 | -1/+1 |
| | | | | | | | | SSLContext.load_dh_params() method and the ssl.OP_SINGLE_DH_USE option. | ||||
* | | Fix ssl module compilation if ECDH support was disabled in the OpenSSL build. | Antoine Pitrou | 2011-12-21 | 1 | -1/+1 |
| | | | | | | | | (followup to issue #13627) | ||||
* | | Issue #13634: Add support for querying and disabling SSL compression. | Antoine Pitrou | 2011-12-20 | 1 | -0/+11 |
| | |