On 2017-10-25, at 21:07, Enoch W. wrote:
> Hi,
>
> I am using a self-signed CA to issue server and client(s) certificates.
>
> My server is using the standard Python ssl module.
> One client, that is using twisted.internet.ssl, consistently fails to connect
> with:
> On the Server:[SSL:
Thanks Jason,
With a more specific error message raised by github latest code [thanks!] the
problem became clear.
I suggest to change the documentation of 'optionsForClientTLS' -
from:
ctx = ssl.optionsForClientTLS(hostName, trustRoot=root,
clientCertificate=mycert)
to:
ctx = ssl.optionsForCli
Thanks exvito for your detailed response.
Re 2 & 3: You're right on the nail :-) See my previous email to Jason.
Re 4: I can't use the high level Transport mechanism as I am using Twisted
(most of the time) through another library layer (pymodbus).
Re 5: My server is still using Python's bloated
On 2017-10-26, at 14:59, Enoch W. wrote:
> Thanks exvito for your detailed response.
> Re 2 & 3: You're right on the nail :-) See my previous email to Jason.
> Re 4: I can't use the high level Transport mechanism as I am using Twisted
> (most of the time) through another library layer (pymodbus
> On Oct 26, 2017, at 6:35 AM, Enoch W. wrote:
>
> Thanks Jason,
>
> With a more specific error message raised by github latest code [thanks!] the
> problem became clear.
> I suggest to change the documentation of 'optionsForClientTLS' -
>
> from:
> ctx = ssl.optionsForClientTLS(hostName, tr