Is it possible to see which TLS version was negotiated with the server using Python requests module?
Something similar to what openssl s_client -connect
would return
--- No client certificate CA names sent --- SSL handshake has read 3043 bytes and written 375 bytes --- New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES256-SHA Server public key is 2048 bit Secure Renegotiation IS supported Compression: NONE Expansion: NONE SSL-Session: Protocol : TLSv1.1 Cipher : ECDHE-RSA-AES256-SHA Key-Arg : None PSK identity: None PSK identity hint: None SRP username: None