On Sun, Nov 16, 2014 at 12:31:53PM +0500, Andrey Rahmatullin wrote:
> 
> The problems are caused by disabled SSLv3. See also
> https://bugs.launchpad.net/u1db/+bug/1383475
> I was able to build the package with the following patch:
> 
> --- u1db-13.10.orig/u1db/tests/test_https.py
> +++ u1db-13.10/u1db/tests/test_https.py
> @@ -26,7 +26,7 @@ def https_server_def():
>                                   'testing.cert')
>          key_file = os.path.join(os.path.dirname(__file__), 'testing-certs',
>                                  'testing.key')
> -        ssl_context = SSL.Context(SSL.SSLv23_METHOD)
> +        ssl_context = SSL.Context(SSL.TLSv1_METHOD)
>          ssl_context.use_privatekey_file(key_file)
>          ssl_context.use_certificate_chain_file(cert_file)
>          srv = httpserver.WSGIServerBase(application, host_port,

This is wrong.  Using SSLv23 is the correct function to use.

> Index: u1db-13.10/u1db/remote/http_client.py
> ===================================================================
> --- u1db-13.10.orig/u1db/remote/http_client.py
> +++ u1db-13.10/u1db/remote/http_client.py
> @@ -77,7 +77,7 @@ class _VerifiedHTTPSConnection(httplib.H
>              # XXX no cert verification implemented elsewhere for now
>              cert_opts = {}
>          self.sock = ssl.wrap_socket(sock, self.key_file, self.cert_file,
> -                                    ssl_version=ssl.PROTOCOL_SSLv3,
> +                                    ssl_version=ssl.PROTOCOL_TLSv1,
>                                      **cert_opts
>                                      )
>          if cert_opts:

Same here, it should have changed to ssl.PROTOCOL_SSLv23


Kurt


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to