http://bugzilla.suse.com/show_bug.cgi?id=1068470
http://bugzilla.suse.com/show_bug.cgi?id=1068470#c38
Sebastian Parschauer changed:
What |Removed |Added
----------------------------------------------------------------------------
Flags|needinfo?(sebastian.parscha |
|uer@suse.com) |
--- Comment #38 from Sebastian Parschauer ---
I've found the bug. The problem is that the connection is not closed.
This is the fix for M2Crypto:
--- SSL/Connection.py.orig 2018-02-22 15:17:42.398599411 +0100
+++ SSL/Connection.py 2018-02-22 15:18:06.326599234 +0100
@@ -73,6 +73,7 @@
def __del__(self):
# type: () -> None
+ self.close()
if getattr(self, 'sslbio', None):
self.m2_bio_free(self.sslbio)
if getattr(self, 'sockbio', None):
Unbelievable, all this hassle and it is fixed by adding a single line to
M2Crypto code to close the connection before destroying the Connection object.
close() calls "m2.ssl_shutdown(self.ssl)" which has multiple states:
0: Connection is still active
1: SSL_SENT_SHUTDOWN
2: SSL_RECEIVED_SHUTDOWN
All this is handled in C code in _m2crypto.so. The tcpdump is now free of RSTs.
--
You are receiving this mail because:
You are on the CC list for the bug.