1. 29 Nis, 2014 1 kayıt (commit)
  2. 28 Nis, 2014 1 kayıt (commit)
  3. 16 Nis, 2014 1 kayıt (commit)
  4. 24 Mar, 2014 1 kayıt (commit)
  5. 23 Mar, 2014 2 kayıt (commit)
    • Donald Stufft's avatar
      Issue #21013: Enhance ssl.create_default_context() for server side contexts · 6a2ba949
      Donald Stufft yazdı
      Closes #21013 by modfying ssl.create_default_context() to:
      
      * Move the restricted ciphers to only apply when using
        ssl.Purpose.CLIENT_AUTH. The major difference between restricted and not
        is the lack of RC4 in the restricted. However there are servers that exist
        that only expose RC4 still.
      * Switches the default protocol to ssl.PROTOCOL_SSLv23 so that the context
        will select TLS1.1 or TLS1.2 if it is available.
      * Add ssl.OP_NO_SSLv3 by default to continue to block SSL3.0 sockets
      * Add ssl.OP_SINGLE_DH_USE and ssl.OP_SINGLE_ECDG_USE to improve the security
        of the perfect forward secrecy
      * Add ssl.OP_CIPHER_SERVER_PREFERENCE so that when used for a server side
        socket the context will prioritize our ciphers which have been carefully
        selected to maximize security and performance.
      * Documents the failure conditions when a SSL3.0 connection is required so
        that end users can more easily determine if they need to unset
        ssl.OP_NO_SSLv3.
      6a2ba949
    • Antoine Pitrou's avatar
  6. 22 Mar, 2014 2 kayıt (commit)
    • Antoine Pitrou's avatar
      Issue #20913: improve the SSL security considerations to first advocate using… · c5e075ff
      Antoine Pitrou yazdı
      Issue #20913: improve the SSL security considerations to first advocate using create_default_context().
      c5e075ff
    • Donald Stufft's avatar
      Issue #20995: Enhance default ciphers used by the ssl module · 79ccaa2c
      Donald Stufft yazdı
      Closes #20995 by Enabling better security by prioritizing ciphers
      such that:
      
      * Prefer cipher suites that offer perfect forward secrecy (DHE/ECDHE)
      * Prefer ECDHE over DHE for better performance
      * Prefer any AES-GCM over any AES-CBC for better performance and security
      * Then Use HIGH cipher suites as a fallback
      * Then Use 3DES as fallback which is secure but slow
      * Finally use RC4 as a fallback which is problematic but needed for
        compatibility some times.
      * Disable NULL authentication, NULL encryption, and MD5 MACs for security
        reasons
      79ccaa2c
  7. 16 Mar, 2014 1 kayıt (commit)
  8. 12 Mar, 2014 1 kayıt (commit)
  9. 09 Mar, 2014 1 kayıt (commit)
  10. 28 Ara, 2013 1 kayıt (commit)
  11. 20 Ara, 2013 1 kayıt (commit)
  12. 02 Ara, 2013 1 kayıt (commit)
  13. 29 Kas, 2013 1 kayıt (commit)
  14. 23 Kas, 2013 5 kayıt (commit)
  15. 22 Kas, 2013 2 kayıt (commit)
  16. 21 Kas, 2013 3 kayıt (commit)
  17. 17 Kas, 2013 1 kayıt (commit)
  18. 29 Eki, 2013 2 kayıt (commit)
  19. 27 Eki, 2013 1 kayıt (commit)
  20. 06 Eki, 2013 1 kayıt (commit)
  21. 29 Eyl, 2013 1 kayıt (commit)
  22. 03 Agu, 2013 1 kayıt (commit)
  23. 26 Haz, 2013 1 kayıt (commit)
  24. 17 Haz, 2013 1 kayıt (commit)
  25. 09 Haz, 2013 3 kayıt (commit)
  26. 16 Nis, 2013 1 kayıt (commit)
  27. 11 Nis, 2013 1 kayıt (commit)
  28. 28 Mar, 2013 1 kayıt (commit)