[Python-checkins] cpython (2.7): remove rc4 from the default client ciphers (closes #23481)
benjamin.peterson
python-checkins at python.org
Thu Feb 19 23:58:24 CET 2015
https://hg.python.org/cpython/rev/3596081cfb55
changeset: 94687:3596081cfb55
branch: 2.7
parent: 94684:ba2b0e6a888f
user: Benjamin Peterson <benjamin at python.org>
date: Thu Feb 19 17:57:08 2015 -0500
summary:
remove rc4 from the default client ciphers (closes #23481)
files:
Lib/ssl.py | 6 ++----
Misc/NEWS | 2 ++
2 files changed, 4 insertions(+), 4 deletions(-)
diff --git a/Lib/ssl.py b/Lib/ssl.py
--- a/Lib/ssl.py
+++ b/Lib/ssl.py
@@ -157,14 +157,12 @@
# * Prefer any AES-GCM over any AES-CBC for better performance and security
# * Then Use HIGH cipher suites as a fallback
# * Then Use 3DES as fallback which is secure but slow
-# * Finally use RC4 as a fallback which is problematic but needed for
-# compatibility some times.
# * Disable NULL authentication, NULL encryption, and MD5 MACs for security
# reasons
_DEFAULT_CIPHERS = (
'ECDH+AESGCM:DH+AESGCM:ECDH+AES256:DH+AES256:ECDH+AES128:DH+AES:ECDH+HIGH:'
- 'DH+HIGH:ECDH+3DES:DH+3DES:RSA+AESGCM:RSA+AES:RSA+HIGH:RSA+3DES:ECDH+RC4:'
- 'DH+RC4:RSA+RC4:!aNULL:!eNULL:!MD5'
+ 'DH+HIGH:ECDH+3DES:DH+3DES:RSA+AESGCM:RSA+AES:RSA+HIGH:RSA+3DES:!aNULL:'
+ '!eNULL:!MD5'
)
# Restricted and more secure ciphers for the server side
diff --git a/Misc/NEWS b/Misc/NEWS
--- a/Misc/NEWS
+++ b/Misc/NEWS
@@ -21,6 +21,8 @@
- Issue #22885: Fixed arbitrary code execution vulnerability in the dumbdbm
module. Original patch by Claudiu Popa.
+- Issue #23481: Remove RC4 from the SSL module's default cipher list.
+
- Issue #21849: Fixed xmlrpclib serialization of non-ASCII unicode strings in
the multiprocessing module.
--
Repository URL: https://hg.python.org/cpython
More information about the Python-checkins
mailing list