Title: [doc] Explain TLS/SSL gotchas · Issue #55 · python-ldap/python-ldap · GitHub
Open Graph Title: [doc] Explain TLS/SSL gotchas · Issue #55 · python-ldap/python-ldap
X Title: [doc] Explain TLS/SSL gotchas · Issue #55 · python-ldap/python-ldap
Description: TLS/SSL and X.509 are tricky. OpenLDAP adds some additional gotchas to the stack. We should document them so users don't run into issues like pyldap/pyldap#53 start_tls_s() requires protocol version 3. It does not work with protocol vers...
Open Graph Description: TLS/SSL and X.509 are tricky. OpenLDAP adds some additional gotchas to the stack. We should document them so users don't run into issues like pyldap/pyldap#53 start_tls_s() requires protocol versio...
X Description: TLS/SSL and X.509 are tricky. OpenLDAP adds some additional gotchas to the stack. We should document them so users don't run into issues like pyldap/pyldap#53 start_tls_s() requires protocol ve...
Opengraph URL: https://github.com/python-ldap/python-ldap/issues/55
X: @github
Domain: github.com
{"@context":"https://schema.org","@type":"DiscussionForumPosting","headline":"[doc] Explain TLS/SSL gotchas","articleBody":"TLS/SSL and X.509 are tricky. OpenLDAP adds some additional gotchas to the stack. We should document them so users don't run into issues like https://github.com/pyldap/pyldap/issues/53\r\n\r\n* ``start_tls_s()`` requires protocol version 3. It does not work with protocol version 2.\r\n* Several, perhaps all ``set_option(OPT_X_TLS_*, ...)`` calls require a final ``set_option(ldap.OPT_X_TLS_NEWCTX, 0)`` call to submit all previous ``set_option()`` calls. Without ``OPT_X_TLS_NEWCTX``, settings are effectively ignored. \r\n\r\n```\r\n l.set_option(ldap.OPT_PROTOCOL_VERSION, ldap.VERSION3)\r\n l.set_option(ldap.OPT_X_TLS_CACERTFILE, 'path/to/ca.pem')\r\n l.set_option(ldap.OPT_X_TLS_REQUIRE_CERT, ldap. OPT_X_TLS_NEVER)\r\n l.set_option(ldap.OPT_X_TLS_NEWCTX, 0)\r\n```\r\n\r\n* [ ] emit warning when ``OPT_X_TLS_NEWCTX`` is required\r\n* [ ] emit warning when connection is already established and ``OPT_X_TLS_*`` are useless.","author":{"url":"https://github.com/tiran","@type":"Person","name":"tiran"},"datePublished":"2017-11-29T10:38:38.000Z","interactionStatistic":{"@type":"InteractionCounter","interactionType":"https://schema.org/CommentAction","userInteractionCount":15},"url":"https://github.com/55/python-ldap/issues/55"}
| route-pattern | /_view_fragments/issues/show/:user_id/:repository/:id/issue_layout(.:format) |
| route-controller | voltron_issues_fragments |
| route-action | issue_layout |
| fetch-nonce | v2:436b9017-c4ee-e59f-a481-80c5fa55cf87 |
| current-catalog-service-hash | 81bb79d38c15960b92d99bca9288a9108c7a47b18f2423d0f6438c5b7bcd2114 |
| request-id | D588:18DE62:2A64B09:3630167:6975AF8B |
| html-safe-nonce | b5bd60c1e34de94017db7cd95860e3851754b0f952cf70f73fe0885bab2c8332 |
| visitor-payload | eyJyZWZlcnJlciI6IiIsInJlcXVlc3RfaWQiOiJENTg4OjE4REU2MjoyQTY0QjA5OjM2MzAxNjc6Njk3NUFGOEIiLCJ2aXNpdG9yX2lkIjoiNjA5OTE1OTQ5MjYwOTgxNDQxMiIsInJlZ2lvbl9lZGdlIjoiaWFkIiwicmVnaW9uX3JlbmRlciI6ImlhZCJ9 |
| visitor-hmac | 2f51230517e2a8453b631a91a4b2943a224e4d2916c464537c5b0000be45a0ab |
| hovercard-subject-tag | issue:277704914 |
| github-keyboard-shortcuts | repository,issues,copilot |
| google-site-verification | Apib7-x98H0j5cPqHWwSMm6dNU4GmODRoqxLiDzdx9I |
| octolytics-url | https://collector.github.com/github/collect |
| analytics-location | / |
| fb:app_id | 1401488693436528 |
| apple-itunes-app | app-id=1477376905, app-argument=https://github.com/_view_fragments/issues/show/python-ldap/python-ldap/55/issue_layout |
| twitter:image | https://opengraph.githubassets.com/38c203679d3362ed284d40c2b4c0fbb72e4a1160b78636f20b633cae700d1b26/python-ldap/python-ldap/issues/55 |
| twitter:card | summary_large_image |
| og:image | https://opengraph.githubassets.com/38c203679d3362ed284d40c2b4c0fbb72e4a1160b78636f20b633cae700d1b26/python-ldap/python-ldap/issues/55 |
| og:image:alt | TLS/SSL and X.509 are tricky. OpenLDAP adds some additional gotchas to the stack. We should document them so users don't run into issues like pyldap/pyldap#53 start_tls_s() requires protocol versio... |
| og:image:width | 1200 |
| og:image:height | 600 |
| og:site_name | GitHub |
| og:type | object |
| og:author:username | tiran |
| hostname | github.com |
| expected-hostname | github.com |
| None | 4a4bf5f4e28041a9d2e5c107d7d20b78b4294ba261cab243b28167c16a623a1f |
| turbo-cache-control | no-preview |
| go-import | github.com/python-ldap/python-ldap git https://github.com/python-ldap/python-ldap.git |
| octolytics-dimension-user_id | 33895877 |
| octolytics-dimension-user_login | python-ldap |
| octolytics-dimension-repository_id | 111794776 |
| octolytics-dimension-repository_nwo | python-ldap/python-ldap |
| octolytics-dimension-repository_public | true |
| octolytics-dimension-repository_is_fork | false |
| octolytics-dimension-repository_network_root_id | 111794776 |
| octolytics-dimension-repository_network_root_nwo | python-ldap/python-ldap |
| turbo-body-classes | logged-out env-production page-responsive |
| disable-turbo | false |
| browser-stats-url | https://api.github.com/_private/browser/stats |
| browser-errors-url | https://api.github.com/_private/browser/errors |
| release | 488b30e96dfd057fbbe44c6665ccbc030b729dde |
| ui-target | full |
| theme-color | #1e2327 |
| color-scheme | light dark |
Links:
Viewport: width=device-width