Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support for passing additional SSL cipher suites for TLS connections #259

Closed
hvardhan20 opened this issue Nov 24, 2023 · 3 comments
Closed
Labels
enhancement New feature or request patch available

Comments

@hvardhan20
Copy link

  1. Describe your new request in detail
    Currently, oracledb uses only default cipher suites provided by python's SSLContext to make TLS connections. This limits connectivity to legacy Oracle DBs that use older Cipher suites like SSL_RSA_WITH_AES_256_CBC_SHA(AWS RDS's default cipher) which is not included in python's default security context.
    We need a way to pass additional SSL cipher suites for establishing TLS connections. This could be done in multiple ways(Pass SSLContext to connect(), CIPHER_SUITES env var, etc).

  2. Give supporting information about tools and operating systems. Give relevant product version numbers
    This enhancement supports DBs using older Cipher suites for TLS.

@anthony-tuininga
Copy link
Member

I have pushed a patch that should implement this enhancement. If you are able to build from source you can verify that it works for you.

@hvardhan20
Copy link
Author

I have pushed a patch that should implement this enhancement. If you are able to build from source you can verify that it works for you.

Works well! Thanks for the quick turn around!

@anthony-tuininga
Copy link
Member

The patch has been included in version 2.0.0 which was just released.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request patch available
Projects
None yet
Development

No branches or pull requests

2 participants