Message71406
The 2.6 documentation states selecting the most compatible SSLv23 mode
may mean low quality ciphers, which does not really help the application
developers. It would be better to provide a way to set the allowed
ciphers. Even better, IMO, would be if the ssl module would default to
the stronger ciphers. I use the following default in M2Crypto:
set_cipher_list('ALL:!ADH:!LOW:!EXP:!MD5:@STRENGTH'). |
|
Date |
User |
Action |
Args |
2008-08-19 03:38:11 | heikki | set | recipients:
+ heikki |
2008-08-19 03:38:11 | heikki | set | messageid: <1219117091.2.0.876896713341.issue3597@psf.upfronthosting.co.za> |
2008-08-19 03:38:10 | heikki | link | issue3597 messages |
2008-08-19 03:38:09 | heikki | create | |
|