[issue33808] ssl.get_server_certificate fails with openssl 1.1.0 but works with 1.0.2g for self-signed certificate

Christian Heimes report at bugs.python.org
Thu Jul 19 13:28:11 EDT 2018


Christian Heimes <lists at cheimes.de> added the comment:

It looks like the server is hard-killing the connection. It doesn't respond with a proper TLS error code. Instead the server response to the CLientHello with a FIN/ACK TCP package. The OSError is all we are getting from the network layer.

19:27:20.956332 IP 192.168.7.168.45884 > 195.22.7.222.imaps: Flags [S], seq 4225502143, win 29200, options [mss 1460,sackOK,TS val 2762111573 ecr 0,nop,wscale 7], length 0
19:27:21.007310 IP 195.22.7.222.imaps > 192.168.7.168.45884: Flags [S.], seq 2527363412, ack 4225502144, win 64240, options [mss 1452,nop,wscale 0,nop,nop,TS val 0 ecr 0,nop,nop,sackOK], length 0
19:27:21.007413 IP 192.168.7.168.45884 > 195.22.7.222.imaps: Flags [.], ack 1, win 229, options [nop,nop,TS val 2762111625 ecr 0], length 0
19:27:21.007775 IP 192.168.7.168.45884 > 195.22.7.222.imaps: Flags [P.], seq 1:111, ack 1, win 229, options [nop,nop,TS val 2762111625 ecr 0], length 110
19:27:21.060476 IP 195.22.7.222.imaps > 192.168.7.168.45884: Flags [F.], seq 1, ack 111, win 64130, options [nop,nop,TS val 37305785 ecr 2762111625], length 0
19:27:21.060767 IP 192.168.7.168.45884 > 195.22.7.222.imaps: Flags [F.], seq 111, ack 2, win 229, options [nop,nop,TS val 2762111678 ecr 37305785], length 0
19:27:21.111577 IP 195.22.7.222.imaps > 192.168.7.168.45884: Flags [.], ack 112, win 64130, options [nop,nop,TS val 37305786 ecr 2762111678], length 0

----------

_______________________________________
Python tracker <report at bugs.python.org>
<https://bugs.python.org/issue33808>
_______________________________________


More information about the Python-bugs-list mailing list