2014-10-23 13 views
5

Una vulnerabilità è stata recentemente trovata in SSL 3 e Apple ha deciso di disattivarlo per le notifiche push (APNS). Qui è the announcement pubblicato il 22 ott, 2014Come posso forzare python apns-client ad evitare l'uso di SSL 3?

Negli ultimi giorni, il mio server push sviluppo è stato crash con questa eccezione:

Traceback (most recent call last): 
    File "/var/django/current/manage.py", line 12, in <module> 
    execute_from_command_line(sys.argv) 
    File "/var/django/shared/env/local/lib/python2.7/site-packages/django/core/management/__init__.py", line 399, in execute_from_command_line 
    utility.execute() 
    File "/var/django/shared/env/local/lib/python2.7/site-packages/django/core/management/__init__.py", line 392, in execute 
    self.fetch_command(subcommand).run_from_argv(self.argv) 
    File "/var/django/shared/env/local/lib/python2.7/site-packages/django/core/management/base.py", line 242, in run_from_argv 
    self.execute(*args, **options.__dict__) 
    File "/var/django/shared/env/local/lib/python2.7/site-packages/django/core/management/base.py", line 285, in execute 
    output = self.handle(*args, **options) 
    File "/var/django/releases/7f093a6773161ea21d18c502eaf1a38c76749314/my_app/management/commands/load_apns_feedback.py", line 35, in handle 
    for ios_push_notification_hex_token, unavailability_detected_at in feedback_service.feedback(): 
    File "/var/django/shared/env/local/lib/python2.7/site-packages/apnsclient/apns.py", line 696, in feedback 
    self._connection.refresh() 
    File "/var/django/shared/env/local/lib/python2.7/site-packages/apnsclient/apns.py", line 269, in refresh 
    self._ensure_socket_open() 
    File "/var/django/shared/env/local/lib/python2.7/site-packages/apnsclient/apns.py", line 262, in _ensure_socket_open 
    self._connect_and_handshake() 
    File "/var/django/shared/env/local/lib/python2.7/site-packages/apnsclient/apns.py", line 252, in _connect_and_handshake 
    self._connection.do_handshake() 
    File "/var/django/shared/env/local/lib/python2.7/site-packages/OpenSSL/SSL.py", line 1076, in do_handshake 
    self._raise_ssl_error(self._ssl, result) 
    File "/var/django/shared/env/local/lib/python2.7/site-packages/OpenSSL/SSL.py", line 871, in _raise_ssl_error 
    _raise_current_error() 
    File "/var/django/shared/env/local/lib/python2.7/site-packages/OpenSSL/_util.py", line 22, in exception_from_error_queue 
    raise exceptionType(errors) 
OpenSSL.SSL.Error: [('SSL routines', 'SSL3_READ_BYTES', 'sslv3 alert handshake failure')] 

Come posso risolvere questo problema? C'è un modo per dire apns-client per evitare SSL 3 e utilizzare invece TLS?

risposta

6

Qualcuno ha creato un patch for apns-client per renderlo predefinito su TLS, che è la soluzione consigliata da Apple in futuro. Sarà sicuramente unito a breve.

Spero che questo aiuti.

3

Se non si vuole/non si può andare con la patch, si può sempre scimmia-patch/incidere in questo modo:

import OpenSSL 
OpenSSL.SSL.SSLv3_METHOD = OpenSSL.SSL.TLSv1_METHOD # work-around for apns-client's inability to specify ssl version combined w/apple's turning off of v3 due to POODLE attack 
from apnsclient import Session, Message, APNs # this line must follow the OpenSSL hack line!!!! 
Problemi correlati