Message329218
| Author | mabrafoo |
|---|---|
| Recipients | Alex Gaynor, adrianv, christian.heimes, doko, kroeckx, mabrafoo, miss-islington, ned.deily, njs |
| Date | 2018-11-04.03:49:30 |
| SpamBayes Score | -1.0 |
| Marked as misclassified | Yes |
| Message-id | <1541303371.08.0.788709270274.issue31453@psf.upfronthosting.co.za> |
| In-reply-to |
| Content | |
|---|---|
FYI, This is how I figured out and fixed the issue on my debian system. -Run nmap to figure out what ssl version is being used by the server nmap -p443 -sV --script ssl-enum-ciphers 10.10.10.7 output says TLSv1.0 test 10.10.10.7 using example in this comment (gets expected error) https://github.com/requests/requests/issues/606#issuecomment-8036266 test with openssl binary (gets expected error) openssl s_client -connect 10.10.10.7:443 fix by editing this value-->MinProtocol = TLSv1.0 in this file--> /etc/ssl/openssl.cnf rerun tests without error. Note the outdated server I am connecting to is internal, non-production, not connected to the internet. |
|
| History | |||
|---|---|---|---|
| Date | User | Action | Args |
| 2018-11-04 03:49:31 | mabrafoo | set | recipients: + mabrafoo, doko, christian.heimes, ned.deily, njs, kroeckx, Alex Gaynor, adrianv, miss-islington |
| 2018-11-04 03:49:31 | mabrafoo | set | messageid: <1541303371.08.0.788709270274.issue31453@psf.upfronthosting.co.za> |
| 2018-11-04 03:49:31 | mabrafoo | link | issue31453 messages |
| 2018-11-04 03:49:30 | mabrafoo | create | |