[issue21246] test_ssl handshake failure

2014-04-16 Thread ddve...@ucar.edu

ddve...@ucar.edu added the comment:

Despite this being Red Hat, this is not at all the case!

OpenSSL 1.0.1f has been released on Jan 6th, 2014 at 15:39:19 -- see 
https://www.openssl.org/source/

--

___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue21246
___
___
Python-bugs-list mailing list
Unsubscribe: 
https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com



[issue21246] test_ssl handshake failure

2014-04-16 Thread ddve...@ucar.edu

ddve...@ucar.edu added the comment:

Just to make sure I'm using the right version:

Python 2.7.6 (default, Apr 14 2014, 15:12:21)
[GCC 4.8.2] on linux2
Type help, copyright, credits or license for more information.
  import ssl
  ssl.OPENSSL_VERSION
'OpenSSL 1.0.1f 6 Jan 2014'
 

On 04/16/2014 08:49 AM, Davide Del Vento wrote:

 ddve...@ucar.edu added the comment:

 Despite this being Red Hat, this is not at all the case!

 OpenSSL 1.0.1f has been released on Jan 6th, 2014 at 15:39:19 -- see
 https://www.openssl.org/source/

 --

 ___
 Python tracker rep...@bugs.python.org
 http://bugs.python.org/issue21246
 ___


--

___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue21246
___
___
Python-bugs-list mailing list
Unsubscribe: 
https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com



[issue21246] test_ssl handshake failure

2014-04-16 Thread Antoine Pitrou

Antoine Pitrou added the comment:

This was fixed in #20896 by a certain Benjamin Peterson.

--
nosy: +pitrou
resolution:  - duplicate
status: open - closed
superseder:  - test_ssl.test_get_server_certificate() should use 
PROTOCOL_SSLv23, not PROTOCOL_SSLv3

___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue21246
___
___
Python-bugs-list mailing list
Unsubscribe: 
https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com



[issue21246] test_ssl handshake failure

2014-04-16 Thread ddve...@ucar.edu

ddve...@ucar.edu added the comment:

Thanks. The reason why I overlook it is that #20896 did not list 2.7 as 
an affected version. I changed #20896 to prevent other people doing the 
same mistake

--

___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue21246
___
___
Python-bugs-list mailing list
Unsubscribe: 
https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com



[issue21246] test_ssl handshake failure

2014-04-15 Thread ddve...@ucar.edu

New submission from ddve...@ucar.edu:

Not sure if this is related with issue #13626 which is the only thing that 
Google knows about these handshake failures. In case it matters:

$ openssl version
OpenSSL 1.0.1f 6 Jan 2014

== CPython 2.7.6 (default, Apr 14 2014, 15:12:21) [GCC 4.8.2]
==   Linux-2.6.32-358.el6.x86_64-x86_64-with-redhat-6.4-Santiago little-endian
==   /glade/scratch/ddvento/build/Python-2.7.6/build/test_python_18521
Testing with flags: sys.flags(debug=0, py3k_warning=0, division_warning=0, 
division_new=0, inspect=0, interactive=0, optimize=0, dont_write_bytecode=0, 
no_user_site=0, no_site=0, ignore_environment=0, tabcheck=0, verbose=0, 
unicode=0, bytes_warning=0, hash_randomization=0)
test_ssl
test_sslwrap_simple (test.test_ssl.BasicTests) ... ok
test_DER_to_PEM (test.test_ssl.BasicSocketTests) ... ok
test_ciphers (test.test_ssl.BasicSocketTests) ... ok
test_constants (test.test_ssl.BasicSocketTests) ... ok
test_openssl_version (test.test_ssl.BasicSocketTests) ... ok
test_parse_cert (test.test_ssl.BasicSocketTests) ... 
{'notAfter': 'Oct  5 23:01:56 2020 GMT',
 'subject': ((('countryName', u'XY'),),
 (('localityName', u'Castle Anthrax'),),
 (('organizationName', u'Python Software Foundation'),),
 (('commonName', u'localhost'),)),
 'subjectAltName': (('DNS', 'localhost'),)}

{'issuer': ((('countryName', u'US'),),
(('organizationName', u'VeriSign, Inc.'),),
(('organizationalUnitName', u'VeriSign Trust Network'),),
(('organizationalUnitName',
  u'Terms of use at https://www.verisign.com/rpa (c)10'),),
(('commonName',
  u'VeriSign Class 3 International Server CA - G3'),)),
 'notAfter': 'Sep 20 23:59:59 2012 GMT',
 'notBefore': 'Sep 21 00:00:00 2011 GMT',
 'serialNumber': '2EE6EA7640A075CEE5005F4D7C79549A',
 'subject': ((('countryName', u'FI'),),
 (('stateOrProvinceName', u'Espoo'),),
 (('localityName', u'Espoo'),),
 (('organizationName', u'Nokia'),),
 (('organizationalUnitName', u'BI'),),
 (('commonName', u'projects.developer.nokia.com'),)),
 'subjectAltName': (('DNS', 'projects.developer.nokia.com'),
('DNS', 'projects.forum.nokia.com')),
 'version': 3}
ok
test_parse_cert_CVE_2013_4238 (test.test_ssl.BasicSocketTests) ... 
{'issuer': ((('countryName', u'US'),),
(('stateOrProvinceName', u'Oregon'),),
(('localityName', u'Beaverton'),),
(('organizationName', u'Python Software Foundation'),),
(('organizationalUnitName', u'Python Core Development'),),
(('commonName', u'null.python.org\x00example.org'),),
(('emailAddress', u'python-...@python.org'),)),
 'notAfter': 'Aug  7 13:12:52 2013 GMT',
 'notBefore': 'Aug  7 13:11:52 2013 GMT',
 'serialNumber': '00',
 'subject': ((('countryName', u'US'),),
 (('stateOrProvinceName', u'Oregon'),),
 (('localityName', u'Beaverton'),),
 (('organizationName', u'Python Software Foundation'),),
 (('organizationalUnitName', u'Python Core Development'),),
 (('commonName', u'null.python.org\x00example.org'),),
 (('emailAddress', u'python-...@python.org'),)),
 'subjectAltName': (('DNS', 'altnull.python.org\x00example.com'),
('email', 'n...@python.org\x00u...@example.org'),
('URI', 'http://null.python.org\x00http://example.org'),
('IP Address', '192.0.2.1'),
('IP Address', '2001:DB8:0:0:0:0:0:1\n')),
 'version': 3}
ok
test_random (test.test_ssl.BasicSocketTests) ... 
 RAND_status is 1 (sufficient randomness)
ok
test_refcycle (test.test_ssl.BasicSocketTests) ... ok
test_wrapped_unconnected (test.test_ssl.BasicSocketTests) ... ok
test_algorithms (test.test_ssl.NetworkedTests) ... skipped 'remote host needs 
SNI, only available on Python 3.2+'
test_connect (test.test_ssl.NetworkedTests) ... ok
test_connect_ex (test.test_ssl.NetworkedTests) ... ok
test_connect_ex_error (test.test_ssl.NetworkedTests) ... ok
test_get_server_certificate (test.test_ssl.NetworkedTests) ... ERROR
test_makefile_close (test.test_ssl.NetworkedTests) ... ok
test_non_blocking_connect_ex (test.test_ssl.NetworkedTests) ... ok
test_non_blocking_handshake (test.test_ssl.NetworkedTests) ... 
Needed 3 calls to do_handshake() to establish session.
ok
test_timeout_connect_ex (test.test_ssl.NetworkedTests) ... ok
test_asyncore_server (test.test_ssl.ThreadedTests)
Check the example asyncore integration. ... 
 server:  new connection from 127.0.0.1:48912
 client:  sending 'TEST MESSAGE of mixed case\n'...
 client:  read 'test message of mixed case\n'
 client:  closing connection.
 cleanup: stopping server.
 cleanup: joining server thread.
 server:  closed connection ssl.SSLSocket object at 0x2399140
 cleanup: successfully joined.
ok
test_default_ciphers (test.test_ssl.ThreadedTests) ... ok
test_echo 

[issue21246] test_ssl handshake failure

2014-04-15 Thread Benjamin Peterson

Benjamin Peterson added the comment:

Very old version of openssl?

--
nosy: +benjamin.peterson

___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue21246
___
___
Python-bugs-list mailing list
Unsubscribe: 
https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com