Re: [Security-sig] Unified TLS API for Python: Draft 3

2017-01-26 Thread Donald Stufft
, we could always add it in later as a higher level API for cipher selection without the backends needing to change anything since the output of such a function would still be a list of all of the desired ciphers which would be the input to the backends. — Donald Stufft ___

Re: [Security-sig] Unified TLS API for Python

2017-01-12 Thread Donald Stufft
ff makes sense, it’ll be important for projects like Twisted and such and isn’t really *that* much more effort. Getting too lost in the weeds over advanced features like hot-config-reload I agree is a bad use of resources. — Donald Stufft ___ Secu

Re: [Security-sig] Pending security features for 3.6

2016-08-15 Thread Donald Stufft
s something I’m very hoping will land. I’m hoping to transition PyPI over to primarily using blake2 (though will need others for backwards compatibility) and not having blake2 in the stdlib makes this much less feasible. — Donald Stufft ___ Securit

Re: [Security-sig] Take a decision for os.urandom() in Python 3.6

2016-08-07 Thread Donald Stufft
t process. Basically any other time the time to block will be relatively short (and in fact, you see daemons like OpenSSH blocking on start up for similar reasons). — Donald Stufft ___ Security-SIG mailing list Security-SIG@python.org https://ma

Re: [Security-sig] PEP 522: Allow BlockingIOError in security sensitive APIs on Linux

2016-06-23 Thread Donald Stufft
in”. My personal preference is waffling back and forth between them based on which of the two above I feel are more likely to occur in practice. — Donald Stufft ___ Security-SIG mailing list Security-SIG@python.org https://mail.python.org/mailman/listinfo/security-sig