Message274417
| Author |
christian.heimes |
| Recipients |
Alex Warhawk, Mark.Ribau, Ye.Wang, alex, christian.heimes, dstufft, giampaolo.rodola, janssen, pitrou, xiang.zhang |
| Date |
2016年09月05日.18:26:27 |
| SpamBayes Score |
-1.0 |
| Marked as misclassified |
Yes |
| Message-id |
<1473099987.65.0.740313645076.issue19500@psf.upfronthosting.co.za> |
| In-reply-to |
| Content |
Note to future me:
Don't forget to take care of X.509 client authentication. A server is allowed to bypass client cert validation when a SSL session is resumed. SSLContext.load_cert_chain() should invalidate session caches. (CVE-2016-5419 https://curl.haxx.se/docs/adv_20160803A.html) |
|