Unpin cryptography, and set minimum version to 44.0.1 #691
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
The Cryptography library doesn't follow SemVer for its versioning. Instead, it increments its major version any time it adds a new feature: https://cryptography.io/en/latest/api-stability/
Due to their versioning policy, and because their updates often address security issues in older versions, I would like to propose removing the maximum version constraint for cryptography.
If someone runs into a problem due to a removed symbol (eg, if something completely removes support for an old SSL/TLS version or removes a cipher suite that sslyze directly references), then they can be advised to try downgrading cryptography to an older version (at the risk of having certain vulns included).
This PR also addresses https://osv.dev/vulnerability/GHSA-79v4-65xg-pq4g by updating the minimum version of cryptography.