Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

bpo-40457: Support OpenSSL without TLS 1.0/1.1 #19862

Merged
merged 1 commit into from
May 16, 2020

Conversation

tiran
Copy link
Member

@tiran tiran commented May 2, 2020

OpenSSL can be build without support for TLS 1.0 and 1.1. The ssl module
now correctly adheres to OPENSSL_NO_TLS1 and OPENSSL_NO_TLS1_1 flags.

Also update multissltest to test with latest OpenSSL and LibreSSL
releases.

Signed-off-by: Christian Heimes [email protected]

https://bugs.python.org/issue40457

Automerge-Triggered-By: @tiran

OpenSSL can be build without support for TLS 1.0 and 1.1. The ssl module
now correctly adheres to OPENSSL_NO_TLS1 and OPENSSL_NO_TLS1_1 flags.

Also update multissltest to test with latest OpenSSL and LibreSSL
releases.

Signed-off-by: Christian Heimes <[email protected]>
@miss-islington
Copy link
Contributor

Thanks @tiran for the PR 🌮🎉.. I'm working now to backport this PR to: 3.7, 3.8.
🐍🍒⛏🤖

@miss-islington
Copy link
Contributor

Sorry @tiran, I had trouble checking out the 3.8 backport branch.
Please backport using cherry_picker on command line.
cherry_picker 6e8cda91d92da72800d891b2fc2073ecbc134d98 3.8

@miss-islington miss-islington self-assigned this May 16, 2020
miss-islington pushed a commit to miss-islington/cpython that referenced this pull request May 16, 2020
OpenSSL can be build without support for TLS 1.0 and 1.1. The ssl module
now correctly adheres to OPENSSL_NO_TLS1 and OPENSSL_NO_TLS1_1 flags.

Also update multissltest to test with latest OpenSSL and LibreSSL
releases.

Signed-off-by: Christian Heimes <[email protected]>

Automerge-Triggered-By: @tiran
(cherry picked from commit 6e8cda9)

Co-authored-by: Christian Heimes <[email protected]>
@bedevere-bot
Copy link

GH-20126 is a backport of this pull request to the 3.7 branch.

@tiran tiran added needs backport to 3.8 only security fixes and removed needs backport to 3.8 only security fixes labels May 16, 2020
@miss-islington
Copy link
Contributor

Thanks @tiran for the PR 🌮🎉.. I'm working now to backport this PR to: 3.8.
🐍🍒⛏🤖

@bedevere-bot
Copy link

GH-20127 is a backport of this pull request to the 3.8 branch.

@bedevere-bot bedevere-bot removed the needs backport to 3.8 only security fixes label May 16, 2020
miss-islington pushed a commit to miss-islington/cpython that referenced this pull request May 16, 2020
OpenSSL can be build without support for TLS 1.0 and 1.1. The ssl module
now correctly adheres to OPENSSL_NO_TLS1 and OPENSSL_NO_TLS1_1 flags.

Also update multissltest to test with latest OpenSSL and LibreSSL
releases.

Signed-off-by: Christian Heimes <[email protected]>

Automerge-Triggered-By: @tiran
(cherry picked from commit 6e8cda9)

Co-authored-by: Christian Heimes <[email protected]>
miss-islington added a commit that referenced this pull request May 16, 2020
OpenSSL can be build without support for TLS 1.0 and 1.1. The ssl module
now correctly adheres to OPENSSL_NO_TLS1 and OPENSSL_NO_TLS1_1 flags.

Also update multissltest to test with latest OpenSSL and LibreSSL
releases.

Signed-off-by: Christian Heimes <[email protected]>

Automerge-Triggered-By: @tiran
(cherry picked from commit 6e8cda9)

Co-authored-by: Christian Heimes <[email protected]>
arturoescaip pushed a commit to arturoescaip/cpython that referenced this pull request May 24, 2020
OpenSSL can be build without support for TLS 1.0 and 1.1. The ssl module
now correctly adheres to OPENSSL_NO_TLS1 and OPENSSL_NO_TLS1_1 flags.

Also update multissltest to test with latest OpenSSL and LibreSSL
releases.

Signed-off-by: Christian Heimes <[email protected]>

Automerge-Triggered-By: @tiran
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants