This issue tracker has been migrated to GitHub, and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

Author heikki
Recipients heikki
Date 2008-08-19.03:38:09
SpamBayes Score 1.8789523e-06
Marked as misclassified No
Message-id <1219117091.2.0.876896713341.issue3597@psf.upfronthosting.co.za>
In-reply-to
Content
The 2.6 documentation states selecting the most compatible SSLv23 mode
may mean low quality ciphers, which does not really help the application
developers. It would be better to provide a way to set the allowed
ciphers. Even better, IMO, would be if the ssl module would default to
the stronger ciphers. I use the following default in M2Crypto:
set_cipher_list('ALL:!ADH:!LOW:!EXP:!MD5:@STRENGTH').
History
Date User Action Args
2008-08-19 03:38:11heikkisetrecipients: + heikki
2008-08-19 03:38:11heikkisetmessageid: <1219117091.2.0.876896713341.issue3597@psf.upfronthosting.co.za>
2008-08-19 03:38:10heikkilinkissue3597 messages
2008-08-19 03:38:09heikkicreate