Closed cliff-ha closed 2 years ago
Hello @cliff-ha ,
Thanks for raising that up. Let us investigate that. We rely on the default behaviour of grpc library for that. Maybe there is a way to alter that.
Best, Anton
Hey @cliff-ha ,
We've embedded and tested automatic change of cipher to high in case of failure. We have published the new release 0.7.0
which has this feature. Could you please give it a go and let us know your results, please?
Thanks, Anton
Hello @cliff-ha ,
please, reopen the ticket if you have any issues.
Best, Anton
Hi @akarneliuk I just updated to 0.7.1 but I am still unable to connect without setting the cipher suite.
Hey @cliff-ha , can you please post the output of the script's execution? Best, Anton
Sure it looks like this:
Traceback (most recent call last):
File "/git/python/code/Test/test.py", line 15, in
Hey @cliff-ha , hope you are doing well. I did a bit of research and, to be honest, a bit puzzled with your
os.environ["GRPC_SSL_CIPHER_SUITES"] = "HIGH"
So the default values are ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384, which seems sane. At the same time, there is no cipher called "HIGH".
With this, can you please share your code where you set the environment and the connection to Nokia SR OS starts working fine, please? I'd like to see the working example to figure out if I can back port it.
Best, Anton
Closed due to inactivity
I have the same problem as the user had I case #59. When I look at a wireshark of the data that is send with gnmic that is working it is using tls 1.2, but when I use pygnmi it is using TLS 1.
It works when I add the os value in case #59 (os.environ["GRPC_SSL_CIPHER_SUITES"] = "HIGH"), but is there not a way where pygnmi can negotiate the tls version with the devices, so we do not have to change this for what device we are talking to?