-
-
Notifications
You must be signed in to change notification settings - Fork 868
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feature: Added support for FTP_TLS (Weak Cryptography Issue) #1320
Feature: Added support for FTP_TLS (Weak Cryptography Issue) #1320
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for the PR and nice to see how simple this nice addition is. I’ve commented on a better way I’d like to do this. As part of that change can you also slim down the test suite to just test these small additions, thanks!
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for the updates it's looking good - just a few more changes to the tests needed and then I think we're good to merge.
e3a32d2
to
38b338a
Compare
@fazledyn-or just need to fix the lint issues then we are good to merge. |
Background
I'm a Software Security Engineer from OpenRefactory-Inc. We are working with OpenSSF on Project Alpha-Omega. While triaging your project, our bug fixing tool generated the following message-
As a result, I've added the support for
FTP_TLS
fromftplib
library into the codebase.Test Status
I copied the
test_ftp.py
file and modified it forFTP_TLS
. Currently all tests are passing.CLA Requirements
This section is only relevant if your project requires contributors to sign a Contributor License Agreement (CLA) for external contributions. All contributed commits are already automatically signed off.
The meaning of a signoff depends on the project, but it typically certifies that committer has the rights to submit this work under the same license and agrees to a Developer Certificate of Origin (see https://developercertificate.org/ for more information).
Sponsorship and Support:
This work is done by the security researchers from OpenRefactory and is supported by the Open Source Security Foundation (OpenSSF): Project Alpha-Omega. Alpha-Omega is a project partnering with open source software project maintainers to systematically find new, as-yet-undiscovered vulnerabilities in open source code - and get them fixed – to improve global software supply chain security.
The bug is found by running the Intelligent Code Repair (iCR) tool by OpenRefactory and then manually triaging the results.