Antoine Pitrou pit...@free.fr added the comment:
Someone else requested it and even provided a patch. See you on issue4870.
--
resolution: out of date - duplicate
status: pending - closed
superseder: - ssl module is missing SSL_OP_NO_SSLv2
___
Antoine Pitrou pit...@free.fr added the comment:
The new ciphers argument in trunk and py3k should do the trick, shouldn't it?
Do note that starting with OpenSSL 1.0.0, SSLv2 is disabled by default when
using the SSLv23 client method (you can re-enable it by specifying ALL for
the cipher
Changes by Giampaolo Rodola' g.rod...@gmail.com:
--
nosy: +giampaolo.rodola
status: pending - open
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue3596
___
Changes by Giampaolo Rodola' g.rod...@gmail.com:
--
status: open - pending
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue3596
___
___
New submission from Heikki Toivonen [EMAIL PROTECTED]:
There should be a way to disable SSLv2 since it is insecure. It would be
even better if SSLv2 was disabled out of the box, but maybe there could
be a way to re-enable it.
I made the default to disable SSLv2 in M2Crypto, but those that want