This issue tracker has been migrated to GitHub, and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

Author naif
Recipients naif
Date 2011-12-19.11:00:07
SpamBayes Score 0.0010573841
Marked as misclassified No
Message-id <1324292408.0.0.0336711576939.issue13636@psf.upfronthosting.co.za>
In-reply-to
Content
By default the Python SSL/TLS Stack (client/server) expose unsecure protocols (SSLv2) and unsecure ciphers (EXPORT 40bit DES).

This ticket is about defining a set of secure ciphers that should also provide maximum performance and compatibility, in order to allow any Python coder to use a Secure SSL/TLS stack without the need to became a Crypto Experts.

The discussion come from ticket http://bugs.python.org/issue13627 .

The proposal is to involve a discussion from the Tor Project (mailing list Tor-Talk & Tor-Dev) to define rationally a default set of ciphers/protocol for Python SSL/TLS from the Cryptography point of view .
History
Date User Action Args
2011-12-19 11:00:08naifsetrecipients: + naif
2011-12-19 11:00:08naifsetmessageid: <1324292408.0.0.0336711576939.issue13636@psf.upfronthosting.co.za>
2011-12-19 11:00:07naiflinkissue13636 messages
2011-12-19 11:00:07naifcreate