New submission from Christian Heimes <li...@cheimes.de>:

It's 2021. TLS 1.0 and 1.1 have been deprecated in RFC 8996. Browsers have 
disabled TLS 1.0 and 1.1, too. Python should no longer enable TLS 1.1 by 
default and require strong TLS ciphers with forward secrecy. 

I'm going to update Python's default cipher suite based on Hynek's excellent 
blog post https://hynek.me/articles/hardening-your-web-servers-ssl-ciphers/ . 
I'll deviate in two minor points:

* keep ephemeral, finite field Diffie-Hellman for legacy hardware. It's not 
that insecure, just slow.
* enforce security level 2 to require strong RSA and DH keys. @SECLEVEL=2 
enforced minimum of 112 bits security. Almost all common RSA certificates use 
2048 bits RSA signature.

I'm also going to set TLS 1.2 as minimum protocol version with Python is 
compiled with --with-ssl-default-suites=python or 
--with-ssl-default-suites=custom_string. Distro vendors can use 
--with-ssl-default-suites=openssl to override the setting.

----------
assignee: christian.heimes
components: SSL
messages: 392582
nosy: christian.heimes, hynek
priority: normal
severity: normal
status: open
title: Increase security of TLS settings in 3.10
type: security
versions: Python 3.10, Python 3.11

_______________________________________
Python tracker <rep...@bugs.python.org>
<https://bugs.python.org/issue43998>
_______________________________________
_______________________________________________
Python-bugs-list mailing list
Unsubscribe: 
https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com

Reply via email to