1. 22 Mar, 2014 2 commits
    • Antoine Pitrou's avatar
      Issue #21015: SSL contexts will now automatically select an elliptic curve for... · 58621d92
      Antoine Pitrou authored
      Issue #21015: SSL contexts will now automatically select an elliptic curve for ECDH key exchange on OpenSSL 1.0.2 and later, and otherwise default to "prime256v1".
      
      (should also fix a buildbot failure introduced by #20995)
      58621d92
    • Donald Stufft's avatar
      Issue #20995: Enhance default ciphers used by the ssl module · d6317e41
      Donald Stufft authored
      Closes #20995 by Enabling better security by prioritizing ciphers
      such that:
      
      * Prefer cipher suites that offer perfect forward secrecy (DHE/ECDHE)
      * Prefer ECDHE over DHE for better performance
      * Prefer any AES-GCM over any AES-CBC for better performance and security
      * Then Use HIGH cipher suites as a fallback
      * Then Use 3DES as fallback which is secure but slow
      * Finally use RC4 as a fallback which is problematic but needed for
        compatibility some times.
      * Disable NULL authentication, NULL encryption, and MD5 MACs for security
        reasons
      d6317e41
  2. 21 Mar, 2014 6 commits
  3. 20 Mar, 2014 14 commits
  4. 19 Mar, 2014 5 commits
  5. 18 Mar, 2014 2 commits
  6. 17 Mar, 2014 11 commits