Message10725

Author teeohhem
Recipients teeohhem
Date 2016-02-08.15:17:10
SpamBayes Score -1.0
Marked as misclassified Yes
Message-id <1454944631.09.0.360470575672.issue2461@psf.upfronthosting.co.za>
In-reply-to
Content
In the latest trunk, SSL Handshakes fail for peers connected via IPV6. The code makes an assumption that socket.getpeername() will return a tuple containing two values, where in IPV6 the tuple contains four values. 

socket.getpeername()'s format depends on the returned family. (address, port) 2-tuple for AF_INET and (address, port, flow info, scope id) 4-tuple for AF_INET6)

This line is the culprit in Lib/ssl.py
engine = context.createSSLEngine(*addr), where addr is the tuple returned from socket.getpeername()
History
Date User Action Args
2016-02-08 15:17:11teeohhemsetrecipients: + teeohhem
2016-02-08 15:17:11teeohhemsetmessageid: <1454944631.09.0.360470575672.issue2461@psf.upfronthosting.co.za>
2016-02-08 15:17:10teeohhemlinkissue2461 messages
2016-02-08 15:17:10teeohhemcreate