Donald Stufft added the comment:

Attached is a new patch. It has:

* Switches the protocol to SSLv23 so that we can negotiate a TLS1.1 or TLS1.2 
connection.
* Sets OP_CIPHER_SERVER_PREFERENCE for Purpose.CLIENT_AUTH so that our 
carefully selected cipher priority gives us better encryption and PFS
* Sets OP_SINGLE_DH_USE and OP_SINGLE_ECDH_USE for Purpose.CLIENT_AUTH to 
prevent re-use of the DH and ECDH keys in distinct sessions.
* Disables SSLv3 connections explicitly to match lower bounds of the original 
security of the created context
* Moves the "restricted" ciphers to only apply to servers. Servers can be much 
more picky about which ciphers they accept than clients can, and further more 
with how our ciphers are laid out now if RC4 is selected it is entirely the 
fault of the server we are connecting to.
* Document what the type of error message would be if a SSL 3.0 connection is 
required and how to re-enable it.

----------
Added file: http://bugs.python.org/file34577/ssl-context-defaults-ssl3-diff

_______________________________________
Python tracker <rep...@bugs.python.org>
<http://bugs.python.org/issue21013>
_______________________________________
_______________________________________________
Python-bugs-list mailing list
Unsubscribe: 
https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com

Reply via email to