1. 30 Mar, 2014 4 commits
  2. 29 Mar, 2014 6 commits
  3. 28 Mar, 2014 4 commits
  4. 27 Mar, 2014 8 commits
  5. 25 Mar, 2014 10 commits
  6. 21 Mar, 2014 1 commit
  7. 24 Mar, 2014 4 commits
  8. 23 Mar, 2014 3 commits
    • Donald Stufft's avatar
      Issue #21013: Enhance ssl.create_default_context() for server side contexts · 8e2b1716
      Donald Stufft authored
      Closes #21013 by modfying ssl.create_default_context() to:
      
      * Move the restricted ciphers to only apply when using
        ssl.Purpose.CLIENT_AUTH. The major difference between restricted and not
        is the lack of RC4 in the restricted. However there are servers that exist
        that only expose RC4 still.
      * Switches the default protocol to ssl.PROTOCOL_SSLv23 so that the context
        will select TLS1.1 or TLS1.2 if it is available.
      * Add ssl.OP_NO_SSLv3 by default to continue to block SSL3.0 sockets
      * Add ssl.OP_SINGLE_DH_USE and ssl.OP_SINGLE_ECDG_USE to improve the security
        of the perfect forward secrecy
      * Add ssl.OP_CIPHER_SERVER_PREFERENCE so that when used for a server side
        socket the context will prioritize our ciphers which have been carefully
        selected to maximize security and performance.
      * Documents the failure conditions when a SSL3.0 connection is required so
        that end users can more easily determine if they need to unset
        ssl.OP_NO_SSLv3.
      8e2b1716
    • Georg Brandl's avatar
    • Antoine Pitrou's avatar