New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Deprecated TLS negotiation in URLLIB3 causing issues #819
Comments
Some details would help? What's the issue, which court, stacktrace? |
flooie
changed the title
OpenSSL issues since December 5th
Deprecated TLS negotiation in URLLIB3 causing issues
Dec 14, 2023
Read more about these changes here |
Sentry issue: COURTLISTENER-65H |
Sentry issue: COURTLISTENER-64R |
Sentry issue: COURTLISTENER-64T |
Sentry issue: COURTLISTENER-6C1 |
This was referenced Jan 23, 2024
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
In reviewing a number of scrapers today for problem sets, I noticed that there was a pattern for when many started showing. That pattern was around December 5th.
After investigating further it became clear that three court websites for atleast four courts still use TLSv1.2 - see below.
urllib3 - which underlies requests deprecated the negotiations for older TLS standards when it switched to urllib3 > 2.0.
Four Louisiana Court of Appeals, the Supreme and Appellate courts of Connecticut we can resolve this by keeping urllib3 at the
1.26.18
For whatever reason - I havent found a simple solution for the California AG website. But writing a custom http adapter with a "legacy server connect" solves California AG. See below.
Regardless -
calag
,conn
,connctapp
andlactapp_1
all have a path to resolve them.I have a feeling that this change was triggered in Missouri appellate courts - and the errors built up and caused the courts to block us. Which needs a call to reach out.
The text was updated successfully, but these errors were encountered: