Alex Grönholm <alex.gronh...@nextday.fi> added the comment:

OpenSSL 1.1.1 also handled EOFs strictly, but this behavior was generally 
suppressed in the ssl module through the default setting of 
suppress_ragged_eofs=True (thus enabling truncation attacks by default). The PR 
changes the behavior of existing applications in such a way that previously 
detectable unexpected EOFs are now no longer detectable by default. To make 
matters worse, EOF errors are not translated to SSLEOFError anymore, and 
instead I have to match the strerror attribute in SSLError to detect this 
condition.

----------
nosy: +alex.gronholm

_______________________________________
Python tracker <rep...@bugs.python.org>
<https://bugs.python.org/issue43794>
_______________________________________
_______________________________________________
Python-bugs-list mailing list
Unsubscribe: 
https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com

Reply via email to