Richard <nyuszik...@gmail.com> added the comment: Never mind, I found the root cause after some debugging. Adding AES256-GCM-SHA384 to the cipher string resolved the issue.
And now I see that the release notes say this: > The ssl module now has more secure default settings. Ciphers without forward > secrecy or SHA-1 MAC are disabled by default. Security level 2 prohibits weak > RSA, DH, and ECC keys with less than 112 bits of security. SSLContext > defaults to minimum protocol version TLS 1.2. Settings are based on Hynek > Schlawackâs research. (Contributed by Christian Heimes in bpo-43998.) ---------- resolution: -> not a bug stage: -> resolved status: open -> closed _______________________________________ Python tracker <rep...@bugs.python.org> <https://bugs.python.org/issue45487> _______________________________________ _______________________________________________ Python-bugs-list mailing list Unsubscribe: https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com