On May 1, 2014, at 1:08 PM, Hynek Schlawack <hs@ox.cx> wrote:
On 1 May 2014, at 21:28, Glyph Lefkowitz wrote:
When I connect to the hosts you mention using openssl (don’t forget to set -servername if you play along) I only get TLSv1. Is it possible that there’s some custom TLS code laying around?
As far as I can see, only <https://github.com/glyph/txsni>. It constructs the CertificateOptions in <https://github.com/glyph/txsni/blob/master/txsni/only_noticed_pypi_pem_after...> (whose name suggests a change I need to make to this library). Am I forgetting some cool new options to CertificateOptions?
If you want DHE, you need to load DH parameters:http://twisted.readthedocs.org/en/latest/core/howto/ssl.html#tls-protocol-op... too.
I'm going to make txsni use pem, and then get the automagical DH params version with 0.4 ;-).
Why your server only accepts TLSv1 is beyond me off the cuff.
Oh hah, I think I got it: in order to do SNI with OpenSSL, you need an _initial_ context. For me, in txSNI, that's an incredibly poorly-set-up one just specifying TLSv1_METHOD, here: <https://github.com/glyph/txsni/blob/master/txsni/snimap.py#L11> I should probably have a default DEFAULT.pem symlink in there or something. Another name hosted on that domain is <https://www.ssllabs.com/ssltest/analyze.html?d=glyph.twistedmatrix.com> which doesn't have any of the spurious chain errors. -glyph