New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
bpo-43640: Update TLS/SSL security consids. due to TLS 1.0 and TLS 1.1 deprecation #25040
base: main
Are you sure you want to change the base?
Conversation
TLS 1.0 and TLS 1.1 have recently been deprecated. https://datatracker.ietf.org/doc/rfc8996/
A Python core developer has requested some changes be made to your pull request before we can consider merging it. If you could please address their requests along with any other requests in other reviews from core developers that would be appreciated. Once you have made the requested changes, please leave a comment on this pull request containing the phrase |
Thanks, instead of adding warnings to PROTOCOL_TLSv1, PROTOCOL_TLSv1_1, OP_NO_TLSv1, OP_NO_TLSv1_1, TLSv1, and TLSv1_1, let's rather document problematic version in the security consideration block. I'll soon post a new PEP based on the RFC, too. |
Fair enough. Do you think it will suffice to change "SSL versions 2 and 3 are considered insecure" to "SSL versions 2 and 3, TLS 1.0, and TLS 1.1 are considered insecure" in the beginning of this section? Also, should we leave the old warnings of |
Are you going to disable TLS 1.0 and 1.1 by default? |
Good point! Please consolidate the old warnings, too. |
This PR is stale because it has been open for 30 days with no activity. |
@@ -2669,7 +2661,8 @@ to specify :const:`CERT_REQUIRED` and similarly check the client certificate. | |||
Protocol versions | |||
''''''''''''''''' | |||
|
|||
SSL versions 2 and 3 are considered insecure and are therefore dangerous to | |||
SSL versions 2 and 3, TLS 1.0, and TLS 1.1 are considered insecure and are | |||
therefore dangerous to | |||
use. If you want maximum compatibility between clients and servers, it is |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
If https://datatracker.ietf.org/doc/rfc8996/ is authoritative, maybe adding it as a source would be useful, something like ... to use (see https://datatracker.ietf.org/doc/rfc8996/)
?
TLS 1.0 and TLS 1.1 have recently been deprecated.
https://datatracker.ietf.org/doc/rfc8996/
https://bugs.python.org/issue43640