Mark Kubacki added the comment:

Thanks for the detailed insight, Donald! And I certainly love the progress 
these changes here bring. :-)

Perhaps limiting the scope to ChaCha20Poly1305 (»CCP«) has been a wrong 
approach of mine to explain my concerns:

We should not refer to any particular cipher in those lists, and by that avoid 
to revisit the defaults at any point in the future.

0. Properties of any cipher to come are known to the makers of OpenSSL first.
1. Python shouldn't duplicate the work of ordering ciphers, which is already 
done by OpenSSL.
2. … especially because it is unknown which ciphers a user's OpenSSL does 
actually implement (Is EC present? CCP? HC-256 or HC-128? WIERZA? Rabbit? 
NTRU…) or will implement in the future.
3. Whether a cipher is regarded as more secure than another depends on its 
implementation, too. The implementors are better judges of that, and hence 
ordering should done by them and could vary between versions [e.g., of OpenSSL].
4. Given our experiences with Python 2.7 I'd like to argue that there is 
reluctance to upgrading existing installations and its cipher suite strings. ;-)

But we know from experience with already established ciphers if and when to 
demote them.

That said I don't insist on any changes.

----------

_______________________________________
Python tracker <rep...@bugs.python.org>
<http://bugs.python.org/issue20995>
_______________________________________
_______________________________________________
Python-bugs-list mailing list
Unsubscribe: 
https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com

Reply via email to