Re: [Python-Dev] PEP 466 (round 3): Python 2 network security enhancements

2014-03-24 Thread Terry Reedy
On 3/24/2014 9:43 AM, Nick Coghlan wrote: And time for round 3 :) And round 3 of my response: contrary to what I said before, I now think that the base proposal should be the simplest possible: selectively (and minimally) waive the 'no-enhancement in maintenance release policy' for future 2.

Re: [Python-Dev] PEP 466: Proposed policy change for handling network security enhancements

2014-03-24 Thread MRAB
On 2014-03-25 01:29, Ben Darnell wrote: On Mon, Mar 24, 2014 at 4:44 AM, Nick Coghlan mailto:ncogh...@gmail.com>> wrote: On 24 Mar 2014 15:25, "Chris Angelico" mailto:ros...@gmail.com>> wrote: > As has already been pointed out, this can already happen, but in an > ad-hoc way. Mak

Re: [Python-Dev] PEP 466: Proposed policy change for handling network security enhancements

2014-03-24 Thread Ben Darnell
On Mon, Mar 24, 2014 at 4:44 AM, Nick Coghlan wrote: > > On 24 Mar 2014 15:25, "Chris Angelico" wrote: > > > As has already been pointed out, this can already happen, but in an > > ad-hoc way. Making it official or semi-official would mean that a > > script written for Debian's "Python 2.7.10" w

Re: [Python-Dev] PEP 466 (round 2): Network security enhancements for Python 2.7

2014-03-24 Thread Terry Reedy
On 3/24/2014 7:04 PM, Donald Stufft wrote: On Mar 24, 2014, at 5:38 PM, Nick Coghlan mailto:ncogh...@gmail.com>> wrote: Beyond that, PEP 462 covers another way for corporate users to give back - if they want to build massive commercial enterprises on our software, they can help maintain and u

Re: [Python-Dev] RFE 20469: ssl.getpeercert() should include extensions

2014-03-24 Thread Terry Reedy
On 3/24/2014 6:51 PM, Andrew M. Hettinger wrote: I thought I'd wait until the 3.4 release before I bothered asking about this: http://bugs.python.org/issue20469 I don't think I'm qualified to actually be writing code for the ssl module, but is there anything else that I can do to help? I could

[Python-Dev] RFE 20469: ssl.getpeercert() should include extensions

2014-03-24 Thread Andrew M. Hettinger
I thought I'd wait until the 3.4 release before I bothered asking about this: http://bugs.python.org/issue20469 I don't think I'm qualified to actually be writing code for the ssl module, but is there anything else that I can do to help? I could probably put together a demonstration-case if that

Re: [Python-Dev] PEP 466 (round 2): Network security enhancements for Python 2.7

2014-03-24 Thread Donald Stufft
On Mar 24, 2014, at 5:38 PM, Nick Coghlan wrote: > > On 25 Mar 2014 04:00, "Nikolaus Rath" wrote: > > > > Nick Coghlan writes: > > > Maintainability > > > --- > > > > > > This policy does NOT represent a commitment by volunteer contributors to > > > actually backport network secur

Re: [Python-Dev] PEP 466 (round 2): Network security enhancements for Python 2.7

2014-03-24 Thread Nick Coghlan
On 25 Mar 2014 04:00, "Nikolaus Rath" wrote: > > Nick Coghlan writes: > > Maintainability > > --- > > > > This policy does NOT represent a commitment by volunteer contributors to > > actually backport network security related changes from the Python 3 series > > to the Python 2 series

Re: [Python-Dev] PEP 466: Proposed policy change for handling network security enhancements

2014-03-24 Thread Chris Angelico
On Mon, Mar 24, 2014 at 8:28 PM, Cory Benfield wrote: > On 24 March 2014 08:44, Nick Coghlan wrote: >> The position I am coming to is that the "enhanced security" release should >> be the default one that we publish binary installers for, but we should also >> ensure that downstream redistributor

Re: [Python-Dev] cpython (3.3): Make the various iterators' "setstate" sliently and consistently clip the

2014-03-24 Thread Kristján Valur Jónsson
Hi there. I didn’t see the original email in python-dev, sorry about that. The “setstate” of the iterators is primarily used when unpickling them. This is code that was added during the PyCon sprints 2012, IIRC. Some iterators already did the silent clipping. One did not (rangeiter), it raised a

Re: [Python-Dev] PEP 466 (round 2): Network security enhancements for Python 2.7

2014-03-24 Thread Nikolaus Rath
Nick Coghlan writes: > Maintainability > --- > > This policy does NOT represent a commitment by volunteer contributors to > actually backport network security related changes from the Python 3 series > to the Python 2 series. Rather, it is intended to send a clear signal to > potential

Re: [Python-Dev] PEP 466 (round 2): Network security enhancements for Python 2.7

2014-03-24 Thread M.-A. Lemburg
On 24.03.2014 18:23, Ned Deily wrote: > In article > , > Nick Coghlan wrote: >> You also reminded me that I need to dig around for and reference Ned's >> email about the status of OS X and reference that (OpenSSL upgrades >> were a casualty of Apple's anti-GPL crusade, so the OS X installers >>

Re: [Python-Dev] PEP 466 (round 2): Network security enhancements for Python 2.7

2014-03-24 Thread Ned Deily
In article , Nick Coghlan wrote: > You also reminded me that I need to dig around for and reference Ned's > email about the status of OS X and reference that (OpenSSL upgrades > were a casualty of Apple's anti-GPL crusade, so the OS X installers > were switched to static linking somewhere along

Re: [Python-Dev] PEP 466: Proposed policy change for handling network security enhancements

2014-03-24 Thread Antoine Pitrou
Le 24/03/2014 15:21, R. David Murray a écrit : In the context of that last sentence, I think it is worth noting the stance that 3.4 is taking[*] about security backward compatibility, since many people may not be aware of it (we only just finished making the documentation clear). If you use cre

Re: [Python-Dev] PEP 466: Proposed policy change for handling network security enhancements

2014-03-24 Thread Cory Benfield
On 24 March 2014 08:44, Nick Coghlan wrote: > The position I am coming to is that the "enhanced security" release should > be the default one that we publish binary installers for, but we should also > ensure that downstream redistributors can easily do "Python 2.7 with legacy > SSL" releases if t

Re: [Python-Dev] PEP 466: Proposed policy change for handling network security enhancements

2014-03-24 Thread Nick Coghlan
On 25 March 2014 00:36, Nick Coghlan wrote: > On 25 March 2014 00:18, Skip Montanaro wrote: > The PEP does not permit backwards compatibility breaks in maintenance > releases Well, ssl.create_default_context() will use the same "this is a dynamic best practices API" policy as it does in 3.4. But

Re: [Python-Dev] PEP 466: Proposed policy change for handling network security enhancements

2014-03-24 Thread Nick Coghlan
On 25 March 2014 00:18, Skip Montanaro wrote: > On Mon, Mar 24, 2014 at 9:11 AM, Nick Coghlan wrote: >> For example, RHEL7 and derivatives are already locked in to 2.7 until >> 2024, RHEL6 and derivatives are locked in to 2.6 until 2020. The only >> way to keep those combination of RHEL and the P

Re: [Python-Dev] PEP 466: Proposed policy change for handling network security enhancements

2014-03-24 Thread R. David Murray
On Sun, 23 Mar 2014 21:31:12 -0400, Barry Warsaw wrote: > On Mar 24, 2014, at 11:38 AM, Chris Angelico wrote: > > >Easy. Just set PYTHONPATH to import the SEPython [1] lib ahead of the > >standard lib. Then you can go back to the standard 2.7 (if you want > >to) by unsetting PYTHONPATH. > > > >It

Re: [Python-Dev] PEP 466: Proposed policy change for handling network security enhancements

2014-03-24 Thread Skip Montanaro
On Mon, Mar 24, 2014 at 9:11 AM, Nick Coghlan wrote: > For example, RHEL7 and derivatives are already locked in to 2.7 until > 2024, RHEL6 and derivatives are locked in to 2.6 until 2020. The only > way to keep those combination of RHEL and the Python 2 standard > library from holding back the evo

Re: [Python-Dev] PEP 466: Proposed policy change for handling network security enhancements

2014-03-24 Thread Nick Coghlan
On 24 March 2014 23:49, Skip Montanaro wrote: > So what's the big deal? Why can't we be pragmatic and call this thing > (whatever it turns out to be) 2.8? Is this pledge and its rationale > written down in a PEP somewhere, so I can study the reasons behind > what appears at this point to be blind

Re: [Python-Dev] PEP 466: Proposed policy change for handling network security enhancements

2014-03-24 Thread Skip Montanaro
On Sun, Mar 23, 2014 at 7:03 PM, Barry Warsaw wrote: > I want to stick to our no-Python-2.8 pledge I don't understand this dogmatic adherence to a "no 2.8 pledge." Back when it was made, I don't think the issue of SSL vulnerabilities was understood (at least not to the current level). Now we

[Python-Dev] PEP 466 (round 3): Python 2 network security enhancements

2014-03-24 Thread Nick Coghlan
And time for round 3 :) Notable changes: - removed the higher level networking modules from the scope of the PEP. They made people nervous, and aren't actually needed to achieved the desired result (at the higher levels, it's much easier for third party pure Python modules like requests to step i

Re: [Python-Dev] PEP 466 (round 2): Network security enhancements for Python 2.7

2014-03-24 Thread Nick Coghlan
On 24 March 2014 22:39, M.-A. Lemburg wrote: > On 24.03.2014 13:33, Antoine Pitrou wrote: >> Under Linux (and probably OS X too), the _ssl module is linked >> dynamically with OpenSSL: >> >> $ ldd build/lib.linux-x86_64-2.7-pydebug/_ssl.so >> linux-vdso.so.1 => (0x7fff3f1de000) >> lib

Re: [Python-Dev] PEP 466 (round 2): Network security enhancements for Python 2.7

2014-03-24 Thread M.-A. Lemburg
On 24.03.2014 13:33, Antoine Pitrou wrote: > Le 24/03/2014 10:10, M.-A. Lemburg a écrit : >> On 23.03.2014 08:07, Nick Coghlan wrote: >>> Open Questions >>> == >>> >>> * What are the risks associated with allowing OpenSSL to be updated to >>>new feature versions in the Windows and M

Re: [Python-Dev] PEP 466 (round 2): Network security enhancements for Python 2.7

2014-03-24 Thread Antoine Pitrou
Le 24/03/2014 10:10, M.-A. Lemburg a écrit : On 23.03.2014 08:07, Nick Coghlan wrote: Open Questions == * What are the risks associated with allowing OpenSSL to be updated to new feature versions in the Windows and Mac OS X binary installers for maintenance releases? Currently

Re: [Python-Dev] PEP 466 (round 2): Network security enhancements for Python 2.7

2014-03-24 Thread M.-A. Lemburg
On 23.03.2014 08:07, Nick Coghlan wrote: > Open Questions > == > > * What are the risks associated with allowing OpenSSL to be updated to > new feature versions in the Windows and Mac OS X binary installers for > maintenance releases? Currently we just upgrade to the appropriate >

Re: [Python-Dev] PEP 466: Proposed policy change for handling network security enhancements

2014-03-24 Thread Chris Angelico
On Mon, Mar 24, 2014 at 7:44 PM, Nick Coghlan wrote: > > On 24 Mar 2014 15:25, "Chris Angelico" wrote: > >> As has already been pointed out, this can already happen, but in an >> ad-hoc way. Making it official or semi-official would mean that a >> script written for Debian's "Python 2.7.10" would

Re: [Python-Dev] PEP 466: Proposed policy change for handling network security enhancements

2014-03-24 Thread Nick Coghlan
On 24 Mar 2014 15:25, "Chris Angelico" wrote: > As has already been pointed out, this can already happen, but in an > ad-hoc way. Making it official or semi-official would mean that a > script written for Debian's "Python 2.7.10" would run on Red Hat's > "Python 2.7.10", which would surely be an

Re: [Python-Dev] python 3.4 and pywin32

2014-03-24 Thread Thomas Heller
Am 22.03.2014 00:25, schrieb Nick Coghlan: On 22 March 2014 05:46, Thomas Heller wrote: With python 3.4 and pywin32 version 218 it is only possible to import win32com or win32api when pywintypes has been imported before. I have no idea if this is a bug in pywin32 or in Python 3.4. Does anyone