Hi

https://docs.python.org/2.7/library/ssl.html#ssl.OP_NO_SSLv3

says "New in version 2.7.9" and it looks like sage runs 2.7.8 (sage-sh)
root@muizenberg:python2.7$ python --version
Python 2.7.8

Once 2.7.9 is included, I think we can add here, for example:

0 
root@muizenberg:/usr/lib/sagemath/local/lib/python2.7/site-packages/Twisted-14.0.2-py2.7-linux-x86_64.egg/twisted/internet#grep
OP_NO_SSLv2 ssl.py
            ctx.set_options(SSL.OP_NO_SSLv2)
        ctx.set_options(SSL.OP_NO_SSLv2)

Just below those two lines add:
       ctx.set_options(SSL.OP_NO_SSLv3)

I'm not familiar with these files/code, but there are several occurrences:

0 root@muizenberg:/usr/lib/sagemath/local/lib/python2.7/site-packages#grep
-r SSLv23 *
sagenb-0.11.1-py2.7.egg/sagenb/notebook/run_notebook.py:        ssl_context
= SSL.Context(SSL.SSLv23_METHOD)
sagenb-0.11.1-py2.7.egg/sagenb/data/codemirror/contrib/php/js/tokenizephp.js:
"STREAM_CRYPTO_METHOD_SSLv3_CLIENT", "STREAM_CRYPTO_METHOD_SSLv23_CLIENT",
sagenb-0.11.1-py2.7.egg/sagenb/data/codemirror/contrib/php/js/tokenizephp.js:
"STREAM_CRYPTO_METHOD_SSLv3_SERVER", "STREAM_CRYPTO_METHOD_SSLv23_SERVER",
tornado-3.1.1-py2.7.egg/tornado/test/httpserver_test.py:# In pre-1.0
versions of openssl, SSLv23 clients always send SSLv2
tornado-3.1.1-py2.7.egg/tornado/test/httpserver_test.py:# of SSLv23 allows
it.
tornado-3.1.1-py2.7.egg/tornado/test/httpserver_test.py:class
SSLv23Test(BaseSSLTest, SSLTestMixin):
tornado-3.1.1-py2.7.egg/tornado/test/httpserver_test.py:        return
ssl.PROTOCOL_SSLv23
tornado-3.1.1-py2.7.egg/tornado/test/iostream_test.py:        context =
ssl.SSLContext(ssl.PROTOCOL_SSLv23)
tornado-3.1.1-py2.7.egg/tornado/test/iostream_test.py:        context =
ssl.SSLContext(ssl.PROTOCOL_SSLv23)
tornado-3.1.1-py2.7.egg/tornado/netutil.py:
ssl_options.get('ssl_version', ssl.PROTOCOL_SSLv23))
Twisted-14.0.2-py2.7-linux-x86_64.egg/twisted/test/test_ssl.py:        #
SSLv23_METHOD allows SSLv2, SSLv3, or TLSv1
Twisted-14.0.2-py2.7-linux-x86_64.egg/twisted/test/test_ssl.py:
self.assertEqual(self.context._method, SSL.SSLv23_METHOD)
Twisted-14.0.2-py2.7-linux-x86_64.egg/twisted/test/test_ssl.py:
self.assertEqual(self.context._method, SSL.SSLv23_METHOD)
Twisted-14.0.2-py2.7-linux-x86_64.egg/twisted/test/test_sslverify.py:
# Presently, SSLv23_METHOD means (SSLv2, SSLv3, TLSv1.0, TLSv1.1,
Twisted-14.0.2-py2.7-linux-x86_64.egg/twisted/test/test_sslverify.py:
SSL.SSLv23_METHOD: set(ProtocolVersion.iterconstants()),
Twisted-14.0.2-py2.7-linux-x86_64.egg/twisted/test/test_sslverify.py:
if opts.method == SSL.SSLv23_METHOD:
Twisted-14.0.2-py2.7-linux-x86_64.egg/twisted/test/test_sslverify.py:
# Exclusions apply only to SSLv23_METHOD and no others.
Twisted-14.0.2-py2.7-linux-x86_64.egg/twisted/test/test_sslverify.py:
def test_SSLv23(self):
Twisted-14.0.2-py2.7-linux-x86_64.egg/twisted/test/test_sslverify.py:
C{SSLv23_METHOD} all versions of TLS and SSLv3 are allowed.
Twisted-14.0.2-py2.7-linux-x86_64.egg/twisted/test/test_sslverify.py:
method=SSL.SSLv23_METHOD)))
Twisted-14.0.2-py2.7-linux-x86_64.egg/twisted/test/test_sslverify.py:
sslverify._expandCipherString(u'', SSL.SSLv23_METHOD, 0)
Twisted-14.0.2-py2.7-linux-x86_64.egg/twisted/test/test_sslverify.py:
ctx = FakeContext(SSL.SSLv23_METHOD)
Twisted-14.0.2-py2.7-linux-x86_64.egg/twisted/test/test_sslverify.py:
sslverify._expandCipherString, u'ALL', SSL.SSLv23_METHOD, 0
Twisted-14.0.2-py2.7-linux-x86_64.egg/twisted/test/test_sslverify.py:
ciphers = sslverify._expandCipherString(u'ALL', SSL.SSLv23_METHOD, 0)
Twisted-14.0.2-py2.7-linux-x86_64.egg/twisted/mail/protocols.py:        ctx
= SSL.Context(SSL.SSLv23_METHOD)
Twisted-14.0.2-py2.7-linux-x86_64.egg/twisted/internet/test/test_endpoints.py:
from OpenSSL.SSL import ContextType, SSLv23_METHOD, TLSv1_METHOD
Twisted-14.0.2-py2.7-linux-x86_64.egg/twisted/internet/test/test_endpoints.py:
self.assertEqual(server._sslContextFactory.method, SSLv23_METHOD)
Twisted-14.0.2-py2.7-linux-x86_64.egg/twisted/internet/test/test_endpoints.py:
self.assertEqual(certOptions.method, SSLv23_METHOD)
Twisted-14.0.2-py2.7-linux-x86_64.egg/twisted/internet/ssl.py:
sslmethod=SSL.SSLv23_METHOD, _contextFactory=SSL.Context):
Twisted-14.0.2-py2.7-linux-x86_64.egg/twisted/internet/ssl.py:    #
SSLv23_METHOD allows SSLv2, SSLv3, and TLSv1.  We disable SSLv2 below,
Twisted-14.0.2-py2.7-linux-x86_64.egg/twisted/internet/ssl.py:    method =
SSL.SSLv23_METHOD
Binary file Twisted-14.0.2-py2.7-linux-x86_64.egg/twisted/internet/ssl.pyc
matches
Twisted-14.0.2-py2.7-linux-x86_64.egg/twisted/internet/_sslverify.py:
@param method: The SSL protocol to use, one of SSLv23_METHOD,
Twisted-14.0.2-py2.7-linux-x86_64.egg/twisted/internet/_sslverify.py:
self.method = SSL.SSLv23_METHOD
Twisted-14.0.2-py2.7-linux-x86_64.egg/twisted/internet/_sslverify.py:
SSL.SSLv23_METHOD, SSL.OP_NO_SSLv2 | SSL.OP_NO_SSLv3)
Twisted-14.0.2-py2.7-linux-x86_64.egg/twisted/internet/endpoints.py:
constant in C{OpenSSL.SSL}.  Must be one of: "SSLv23_METHOD",
Twisted-14.0.2-py2.7-linux-x86_64.egg/twisted/internet/endpoints.py:
kw['method'] = ssl.SSL.SSLv23_METHOD
Twisted-14.0.2-py2.7-linux-x86_64.egg/twisted/internet/endpoints.py:
method=ssl.SSL.SSLv23_METHOD,
Twisted-14.0.2-py2.7-linux-x86_64.egg/twisted/web/client.py:
method=SSL.SSLv23_METHOD,
Twisted-14.0.2-py2.7-linux-x86_64.egg/twisted/topfiles/NEWS:   SSLv23 is
selected, allowing only SSLv3 and TLSv1. (#6337)
Werkzeug-0.9.6-py2.7.egg/werkzeug/serving.py:    ctx =
SSL.Context(SSL.SSLv23_METHOD)
Werkzeug-0.9.6-py2.7.egg/werkzeug/serving.py:    ctx =
SSL.Context(SSL.SSLv23_METHOD)
0 root@muizenberg:/usr/lib/sagemath/local/lib/python2.7/site-packages#grep
-r OP_NO_SSLv2 *
tornado-3.1.1-py2.7.egg/tornado/simple_httpclient.py:            # the
SSL_OP_NO_SSLv2, but that wasn't exposed to python
Twisted-14.0.2-py2.7-linux-x86_64.egg/twisted/test/test_ssl.py:        #
And OP_NO_SSLv2 disables the SSLv2 support.
Twisted-14.0.2-py2.7-linux-x86_64.egg/twisted/test/test_ssl.py:
self.assertTrue(self.context._options & SSL.OP_NO_SSLv2)
Twisted-14.0.2-py2.7-linux-x86_64.egg/twisted/test/test_ssl.py:
self.assertTrue(self.context._options & SSL.OP_NO_SSLv2)
Twisted-14.0.2-py2.7-linux-x86_64.egg/twisted/test/test_sslverify.py:
Every context must have C{OP_NO_SSLv2}, C{OP_NO_COMPRESSION}, and
Twisted-14.0.2-py2.7-linux-x86_64.egg/twisted/test/test_sslverify.py:
options = (SSL.OP_NO_SSLv2 | opts._OP_NO_COMPRESSION |
Twisted-14.0.2-py2.7-linux-x86_64.egg/twisted/test/test_sslverify.py:
SSL.OP_NO_SSLv2: ProtocolVersion.SSLv2,
Twisted-14.0.2-py2.7-linux-x86_64.egg/twisted/internet/ssl.py:
ctx.set_options(SSL.OP_NO_SSLv2)
Twisted-14.0.2-py2.7-linux-x86_64.egg/twisted/internet/ssl.py:
ctx.set_options(SSL.OP_NO_SSLv2)
Binary file Twisted-14.0.2-py2.7-linux-x86_64.egg/twisted/internet/ssl.pyc
matches
Twisted-14.0.2-py2.7-linux-x86_64.egg/twisted/internet/_sslverify.py:
SSL.OP_NO_SSLv2 | self._OP_NO_COMPRESSION |
Twisted-14.0.2-py2.7-linux-x86_64.egg/twisted/internet/_sslverify.py:
SSL.SSLv23_METHOD, SSL.OP_NO_SSLv2 | SSL.OP_NO_SSLv3)
0 root@muizenberg:/usr/lib/sagemath/local/lib/python2.7/site-packages#

Regards,
Jan


On 4 December 2014 at 16:41, kcrisman <kcris...@gmail.com> wrote:

>
>>
>> Depend on the proper version high enough of openssl and it is fixed for
>> you. (assuming sage server side)
>> On client side your browser, say, firefox34, latest chrome, it is fixed.
>>
>>
> What situation is this for? A server for Tampere university? What version
>> of openssl runs on which OS?
>>
>>
>
> I think Jori is asking about whether Sage itself needs to be patched or
> configured right now.   Is our openssl package high enough?  (This is not
> Heartbleed, something else.)
>
> --
> You received this message because you are subscribed to the Google Groups
> "sage-devel" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to sage-devel+unsubscr...@googlegroups.com.
> To post to this group, send email to sage-devel@googlegroups.com.
> Visit this group at http://groups.google.com/group/sage-devel.
> For more options, visit https://groups.google.com/d/optout.
>



-- 
  .~.
  /V\     Jan Groenewald
 /( )\    www.aims.ac.za
 ^^-^^

-- 
You received this message because you are subscribed to the Google Groups 
"sage-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sage-devel+unsubscr...@googlegroups.com.
To post to this group, send email to sage-devel@googlegroups.com.
Visit this group at http://groups.google.com/group/sage-devel.
For more options, visit https://groups.google.com/d/optout.

Reply via email to