Control: severity -1 serious
Control: tags -1 + patch pending upstream fixed-upstream

On 12 January 2015 at 12:52, Thorsten Glaser <[email protected]> wrote:
> On Sun, 5 Oct 2014, Joey Hess wrote:
>
>> Now it fails with "No seed".
>
> See https://github.com/spesmilo/electrum/issues/919

Thanks for the pointer. The Qt patch looks pretty straightforward to
backport (3 line diff?), I'll look at doing that as soon as possible.

> Should probably be RC.

I'm inclined to agree, although we'll have to see whether the RMs
agree; fortunately the diff for a potential fix is tiny..

> I “live-patched” my files. Here is a bad direct filesystem diff:

> -                        s = ssl.wrap_socket(s, 
> ssl_version=ssl.PROTOCOL_SSLv23, cert_reqs=ssl.CERT_NONE, ca_certs=None)
> +                        s = ssl.wrap_socket(s, 
> ssl_version=ssl.PROTOCOL_TLSv1, cert_reqs=ssl.CERT_REQUIRED, 
> ca_certs="/etc/ssl/certs/ca-certificates.crt", do_handshake_on_connect=True)

Do note that PROTOCOL_SSLv23, despite the confusing name, means "do
protocol version negotiation", not specifically anything to do with
SSLv2 or SSLv3; with the configuration of OpenSSL in Debian at the
moment, it actually means "TLSv1 or TLSv1.1 or TLSv1.2". Using
PROTOCOL_TLSv1 locks the protocol version to TLSv1 and does not allow
negotiation of a newer protocol, which is probably not what you
intended.
-- 
mithrandi, i Ainil en-Balandor, a faer Ambar


--
To UNSUBSCRIBE, email to [email protected]
with a subject of "unsubscribe". Trouble? Contact [email protected]

Reply via email to