Christian Heimes added the comment:

Note to future me:
Don't forget to take care of X.509 client authentication. A server is allowed 
to bypass client cert validation when a SSL session is resumed. 
SSLContext.load_cert_chain() should invalidate session caches. (CVE-2016-5419 
https://curl.haxx.se/docs/adv_20160803A.html)

----------

_______________________________________
Python tracker <rep...@bugs.python.org>
<http://bugs.python.org/issue19500>
_______________________________________
_______________________________________________
Python-bugs-list mailing list
Unsubscribe: 
https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com

Reply via email to