SSL v3 Handshake Failure (but only in newer versions of OpenSSL)

前端 未结 1 1070
一个人的身影
一个人的身影 2021-01-16 00:04

This basic snippet in Python 3.5, with a specific website, fails with requests.exceptions.SSLError: [SSL: SSLV3_ALERT_HANDSHAKE_FAILURE] sslv3 alert handshake failure

相关标签:
1条回答
  • 2021-01-16 00:20

    The server only supports a single old cipher: DES-CBC3-SHA. This cipher is considered weak (SWEET32) and is removed from the default build in OpenSSL 1.1.0. Since Debian follows the default build the cipher is not available on newer Debian versions.

    From Changes between 1.0.2h and 1.1.0:

    To mitigate the SWEET32 attack (CVE-2016-2183), 3DES cipher suites have been disabled by default and removed from DEFAULT, just like RC4. See the RC4 item below to re-enable both.
    ...
    RC4 based libssl ciphersuites are now classed as "weak" ciphers and are disabled by default. They can be re-enabled using the enable-weak-ssl-ciphers option to Configure.

    0 讨论(0)
提交回复
热议问题