bpo-31453: Add setter for min/max protocol version#5259
Conversation
9e59bf7 to
3c5dd30
Compare
2093bae to
5930eff
Compare
Doc/library/ssl.rst
Outdated
There was a problem hiding this comment.
I think this is more correct with "the"
Doc/library/ssl.rst
Outdated
There was a problem hiding this comment.
I don't understand what the second sentence means.
There was a problem hiding this comment.
I tried to explain that MAXIMUM_SUPPORTED == TLSv1_2 or MAXIMUM_SUPPORTED == TLSv1_3 doesn't give any meaningful result. You cannot use the value of the MAXIMUM_SUPPORTED constant to figure out what the actual maximum supported TLS version is. The values are just arbitrary values.
There was a problem hiding this comment.
Maybe something like "this is a magic constant, it will not be equal to the value of the constant for the highest protocol"?
Doc/library/ssl.rst
Outdated
There was a problem hiding this comment.
I think this should be maximum_version for consistency with the TLSVersion
There was a problem hiding this comment.
The names are based on PEP 543. Also maximum_version and minimum_version are visually similar compared to highest_version and lowest_version.
https://www.python.org/dev/peps/pep-0543/#configuration
:param lowest_supported_version TLSVersion:
The minimum version of TLS that should be allowed on TLS
connections using this configuration.
:param highest_supported_version TLSVersion:
The maximum version of TLS that should be allowed on TLS
connections using this configuration.
https://www.python.org/dev/peps/pep-0543/#tls-versions
class TLSVersion(Enum):
MINIMUM_SUPPORTED = auto()
SSLv2 = auto()
SSLv3 = auto()
TLSv1 = auto()
TLSv1_1 = auto()
TLSv1_2 = auto()
TLSv1_3 = auto()
MAXIMUM_SUPPORTED = auto()
Doc/library/ssl.rst
Outdated
There was a problem hiding this comment.
The feature is not available unless the ssl module is compiled with OpenSSL 1.1.0g or a later version. OpenSSL 1.1.0f and older versions do not have getters.
There was a problem hiding this comment.
I think something like "This attribute does not exist unless ..." would be clearer
Modules/_ssl.c
Outdated
There was a problem hiding this comment.
Should this exist if OpenSSL doesn't have 1.3?
There was a problem hiding this comment.
In PEP 543 all versions are always defined.
Modules/_ssl.c
Outdated
There was a problem hiding this comment.
This is confusing to me, how does it know the difference between set_min(min) and set_min(max)?
There was a problem hiding this comment.
SSL_CTX_set_min_proto_version(ctx, 0) sets lowest version, SSL_CTX_set_max_proto_version(ctx, 0) sets highest version. The function selects betwen min and max based on the what argument.
(Q.E.D. why I prefer highest/lowest over max/min) :p
if (what == 0) {
result = SSL_CTX_set_min_proto_version(self->ctx, v);
}
else {
result = SSL_CTX_set_max_proto_version(self->ctx, v);
}
There was a problem hiding this comment.
How do you set the minimum version to be the same as the maximum version?
There was a problem hiding this comment.
Ah, now I got your. You want to have lowest_version = MAXIUMUM_SUPPORTED. OpenSSL has no API for that. I added more code to emulate it. I also make the attributes read-only unless the context's method support version negotiation.
5930eff to
54697fc
Compare
Doc/library/ssl.rst
Outdated
There was a problem hiding this comment.
Is there a word missing here? Perhaps something like “Enum collection of SSL and TLS versions . . .”?
Doc/library/ssl.rst
Outdated
There was a problem hiding this comment.
Plural: These are magic constants (or These are both equal to a magic constant or something)
By magic constant, do you just mean the value(s) are distinct from the other enum values? After reading further down, it sounds like the user is supposed to feed these values into the highest_ and lowest_version attributes, but saying “it will not be equal” seems to contradict this.
Doc/library/ssl.rst
Outdated
There was a problem hiding this comment.
An TLS → A TLS
TLSversion capitalization of V is inconsistent with elsewhere.
Doc/library/ssl.rst
Outdated
There was a problem hiding this comment.
Which flag? If you mean that highest_version is a flag, be explicit.
Doc/library/ssl.rst
Outdated
There was a problem hiding this comment.
Do you mean like highest_version?
Doc/whatsnew/3.7.rst
Outdated
Doc/library/ssl.rst
Outdated
There was a problem hiding this comment.
This change seems detrimental with no benefit. In fact all four of the the additions don’t seem beneficial to me.
Doc/library/ssl.rst
Outdated
There was a problem hiding this comment.
Have you tried compiling this? I suspect the varying indentation messes things up.
54697fc to
7178f0c
Compare
|
@vadmium thanks Martin, I have addressed your documentation remarks and clarified the documentation @alex It didn't occur to me that you wanted to set the lowest version to maximum supported. OpenSSL doesn't have an API for that. I had to add some extra code to guess the max and min available versions. Since it might be possible that it's incorrect (different libssl than ssl headers), I'm still using 0 for auto config when possible. |
Doc/library/ssl.rst
Outdated
There was a problem hiding this comment.
I think this is better, but also drop the a: “These are magic constants.”
1486d71 to
99a1442
Compare
99a1442 to
31ce9f3
Compare
31ce9f3 to
d32a828
Compare
|
@alex I discussed the naming of the new attributes with @Lukasa. Cory doesn't have a strong opinion but leans towards minimum and maximum. Since you also prefer minimum and maximum, the OpenSSL API use min/max and I don' have a strong opinion either, I decided to go for |
d32a828 to
dc50a26
Compare
|
AppVeyor has some issues. |
OpenSSL 1.1 has introduced a new API to set the minimum and maximum supported protocol version. The API is easier to use than the old OP_NO_TLS1 option flags, too. Since OpenSSL has no call to set minimum version to highest supported, the implementation emulate maximum_version = MINIMUM_SUPPORTED and minimum_version = MAXIMUM_SUPPORTED by figuring out the minumum and maximum supported version at compile time. Signed-off-by: Christian Heimes <[email protected]>
dc50a26 to
3926082
Compare
|
Thanks @tiran for the PR 🌮🎉.. I'm working now to backport this PR to: 3.7. |
|
@tiran: Please replace |
OpenSSL 1.1 has introduced a new API to set the minimum and maximum supported protocol version. The API is easier to use than the old OP_NO_TLS1 option flags, too. Since OpenSSL has no call to set minimum version to highest supported, the implementation emulate maximum_version = MINIMUM_SUPPORTED and minimum_version = MAXIMUM_SUPPORTED by figuring out the minumum and maximum supported version at compile time. Signed-off-by: Christian Heimes <[email protected]> (cherry picked from commit 698dde1) Co-authored-by: Christian Heimes <[email protected]>
|
GH-5926 is a backport of this pull request to the 3.7 branch. |
OpenSSL 1.1 has introduced a new API to set the minimum and maximum supported protocol version. The API is easier to use than the old OP_NO_TLS1 option flags, too. Since OpenSSL has no call to set minimum version to highest supported, the implementation emulate maximum_version = MINIMUM_SUPPORTED and minimum_version = MAXIMUM_SUPPORTED by figuring out the minumum and maximum supported version at compile time. Signed-off-by: Christian Heimes <[email protected]> (cherry picked from commit 698dde1) Co-authored-by: Christian Heimes <[email protected]>
OpenSSL 1.1 has introduced a new API to set the minimum and maximum
supported protocol version. The API is easier to use than the old
OP_NO_TLS1 option flags, too.
Since OpenSSL has no call to set minimum version to highest supported,
the implementation emulate highest_version = MINIMUM_SUPPORTED and
lowest_version = MAXIMUM_SUPPORTED by figuring out the minumum and
maximum supported version at compile time.
Signed-off-by: Christian Heimes [email protected]
https://bugs.python.org/issue31453