This issue tracker has been migrated to GitHub, and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

Author naif
Recipients gregory.p.smith, jcea, naif, pitrou
Date 2011-12-21.17:31:17
SpamBayes Score 0.08254204
Marked as misclassified No
Message-id <1324488678.17.0.706158850225.issue13636@psf.upfronthosting.co.za>
In-reply-to
Content
Well, my concept is that it would be reasonable to use what people consider secure.

SSL/TLS are security protocol.

Some combination of the protocol configuration (ciphers/hash/key exchange) are:
- known to be insecure
- known to be secure
- known to be unused (like SEED, only used in South Korea by military applications) or PSK with almost no adoption
- Unknown (like CAMELIA, i don't find a single software using it)

The concept i would propose is to choose the ciphers that "known to be secure" by disabling everything else.
History
Date User Action Args
2011-12-21 17:31:18naifsetrecipients: + naif, gregory.p.smith, jcea, pitrou
2011-12-21 17:31:18naifsetmessageid: <1324488678.17.0.706158850225.issue13636@psf.upfronthosting.co.za>
2011-12-21 17:31:17naiflinkissue13636 messages
2011-12-21 17:31:17naifcreate