|
15 | 15 | from cryptography.hazmat.primitives.asymmetric.ec import EllipticCurvePublicKey |
16 | 16 | from cryptography.x509 import Certificate |
17 | 17 | from django.conf import settings |
18 | | -from dns.exception import ValidationFailure |
19 | 18 | from dns.name import EmptyLabel |
20 | 19 | from dns.resolver import NXDOMAIN, NoAnswer, NoNameservers, LifetimeTimeout |
21 | 20 | from nassl._nassl import OpenSSLError |
@@ -145,13 +144,13 @@ def dane( |
145 | 144 | dane_data = None |
146 | 145 | dnssec_status = None |
147 | 146 | try: |
148 | | - rrset, dnssec_status = dns_resolve_tlsa(dane_qname, allow_bogus=False) |
| 147 | + rrset, dnssec_status = dns_resolve_tlsa(dane_qname) |
149 | 148 | dane_data = [(rr.usage, rr.selector, rr.mtype, binascii.hexlify(rr.cert).decode("ascii")) for rr in rrset] |
| 149 | + if dnssec_status == DNSSECStatus.BOGUS: |
| 150 | + status = DaneStatus.none_bogus |
| 151 | + score = score_none_bogus |
150 | 152 | except (NXDOMAIN, NoAnswer, NoNameservers, LifetimeTimeout, EmptyLabel): |
151 | 153 | pass |
152 | | - except ValidationFailure: |
153 | | - status = DaneStatus.none_bogus |
154 | | - score = score_none_bogus |
155 | 154 |
|
156 | 155 | if not dane_data or dnssec_status != DNSSECStatus.SECURE: |
157 | 156 | return dict( |
@@ -860,7 +859,7 @@ def test_key_exchange_hash( |
860 | 859 | There are few or no hosts that do not meet this requirement. |
861 | 860 | """ |
862 | 861 | ssl_connection = server_connectivity_info.get_preconfigured_tls_connection(should_use_legacy_openssl=False) |
863 | | - ssl_connection.ssl_client.set_sigalgs(SIGNATURE_ALGORITHMS_SHA2) |
| 862 | + ssl_connection.ssl_client.set_signature_algorithms(SIGNATURE_ALGORITHMS_SHA2) |
864 | 863 |
|
865 | 864 | try: |
866 | 865 | ssl_connection.connect() |
|
0 commit comments