Some more details on the impact of the bug.

It affects all TLS connections from both Python 2.7 and Python 3.5.
For TLS only the prime256v1 (aka secp256r1 or NIST P-256) elliptic
curve is used by default (it can be changed manually). This results in
handshake failures when this cipher is not supported by the server (like
when the server uses a secp384r1 certificate).

With the patch from Python bug 29697 automatic curve selection is used,
resulting in better curve support.

I am not aware of any concrete security implications, though this issue
causes the client to disregard any other preferred curves.

Reply via email to