naif <n...@globaleaks.org> added the comment:

The Tor Project is composed of Cryptography experts, thus i am opening that 
ticket cause with our group we're implementing Tor2web based on Python that 
require *strict* security requirements for crypto.

The Tor Project heavily use Python for most of tools.

If you want we can open a discussion within Tor Project to have a "rationale 
method" to define a set of "default ciphers" considering the ration of 
security/performance/compatibility.

That way anyone using Python SSL/TLS will be sure in using a "Secure system" 
without the risk of legacy protocol such as SSLv2 or insecure ciphers like 
Export 40bit DES that are nowdays enabled by default.

Today a Python coder approaching SSL/TLS will have an insecurely configured TLS 
connection that can be hijacked via SSLv2 protocol or cracked via 40bit DES. 

Even Firefox, Chrome, IE, Opera disable by default certain protocols and 
certain ciphers, so imho it would be valuable to have a "Secure default", 
obviously considering and maintaining compatibility.

What do you think?

----------

_______________________________________
Python tracker <rep...@bugs.python.org>
<http://bugs.python.org/issue13627>
_______________________________________
_______________________________________________
Python-bugs-list mailing list
Unsubscribe: 
http://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com

Reply via email to