On 22.01.2014 13:43, Jesse Noller wrote:
> I have to concur with Donald here - in the case of security, especially 
> language security which directly impacts the implicit security of downstream 
> applications, I should not have to opt in to the most secure defaults.
> 
> Yes; this potentially breaks applications relying on insecure / loose 
> defaults. However it changes the model to "you are by default, explicitly 
> secure" then relying on the domain knowledge of an application developer to 
> harden their application.
> 
> When, if this changes, an application breaks, it will be in a plainly obvious 
> way which can quickly be resolved.
> 
> Donald is perfectly right: today, it's trivial to MITM an application that 
> relies off of the current behavior; this is bad news bears for users and 
> developers as it means they need domain knowledge to secure their 
> applications by default they may not have.

For 3.5 I'd like to work on a policy framework for the ssl where
application can define policies like SSL/TLS version, cert store,
verification modes etc. etc. I'll discuss my ideas with Donald, Alex and
the other crypto guys as soon as I have settled in with my new job and town.

Christian

_______________________________________________
Python-Dev mailing list
Python-Dev@python.org
https://mail.python.org/mailman/listinfo/python-dev
Unsubscribe: 
https://mail.python.org/mailman/options/python-dev/archive%40mail-archive.com

Reply via email to