Skip to content

Conversation

@csquire
Copy link

@csquire csquire commented Aug 30, 2018

Forcing the connection to TLSv1 is actually downgrading connections that would otherwise be TLSv1_2. Cloudmonkey is better off auto-negotiating ssl/tls versions and versions should be enforced on the server side. Since the Go version is still alpha, it would be very useful to have the Python version play nice with TLSv1_2.

@csquire
Copy link
Author

csquire commented Aug 31, 2018

@rhtyd Any thoughts on this? Could really use this fix so I can turn off TLSv1.

@rohityadavcloud rohityadavcloud merged commit 9464276 into apache:5.3 Aug 31, 2018
@csquire
Copy link
Author

csquire commented Aug 31, 2018

Thanks @rhtyd, are you planning a new release to pip with the fix?

@rohityadavcloud
Copy link
Member

pip install from the git repo's 5.3 branch, I'll see if we can do a python based 5.3.4 release. Most of my focus is going towards the go port which has entered beta state (some people have started using in prod as well) but not announced yet.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants