Is it possible to see which TLS version was negotiated with the server using Python requests module?
Something similar to what openssl s_client -connect would return
---
No client certificate CA names sent
---
SSL handshake has read 3043 bytes and written 375 bytes
---
New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES256-SHA
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
SSL-Session:
Protocol : TLSv1.1
Cipher : ECDHE-RSA-AES256-SHA
Key-Arg : None
PSK identity: None
PSK identity hint: None
SRP username: None