Dimitri John Ledkov <dimitri.led...@canonical.com> added the comment:

Ubuntu 20.04+ compile OpenSSL with default security level set to 2, and further 
customized security level 2 to prohibit TLS below v1.2 and DTLS below v1.2.

You can export custom openssl configuration that sets security level back to 1, 
which is compatible across any openssl series.

```
export OPENSSL_CONF=`pwd`/openssl.cnf
cat openssl.cnf
openssl_conf = default_conf
[default_conf]
ssl_conf = ssl_sect
[ssl_sect]
system_default = system_default_sect
[system_default_sect]
CipherString = DEFAULT@SECLEVEL=1
```

Or you can use native APIs to reset the security level to 1 in the test-suite. 
I.e. via the SSL_CTX_set_security_level api binding.

This is documented behaviour in Ubuntu manpages of OpenSSL and on Ubuntu 
Discourse

https://manpages.ubuntu.com/manpages/focal/en/man3/SSL_CTX_set_security_level.3ssl.html

https://discourse.ubuntu.com/t/default-to-tls-v1-2-in-all-tls-libraries-in-20-04-lts/12464/8

OpenSSL upstream for 3.0.0 series are refusing to bump minimum required 
protocol versions to prohibit out of the box old version of TLS and also don't 
have a standard way to disable this. Hence implementation is different in 
Debian, Ubuntu and Fedora. Debian's implementation is buggy with respect to 
DTLS and default openssl.cnf breaks 1.0.2x series libssl. And as far as I know 
Fedora implementation requires use of crypto-policies package which is quite 
advanced and not trivial to integrate in smaller environments.

----------
nosy: +xnox

_______________________________________
Python tracker <rep...@bugs.python.org>
<https://bugs.python.org/issue43382>
_______________________________________
_______________________________________________
Python-bugs-list mailing list
Unsubscribe: 
https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com

Reply via email to