[Python-checkins] cpython (2.7): remove rc4 from the default client ciphers (closes #23481)

benjamin.peterson python-checkins at python.org
Thu Feb 19 23:58:24 CET 2015


https://hg.python.org/cpython/rev/3596081cfb55
changeset:   94687:3596081cfb55
branch:      2.7
parent:      94684:ba2b0e6a888f
user:        Benjamin Peterson <benjamin at python.org>
date:        Thu Feb 19 17:57:08 2015 -0500
summary:
  remove rc4 from the default client ciphers (closes #23481)

files:
  Lib/ssl.py |  6 ++----
  Misc/NEWS  |  2 ++
  2 files changed, 4 insertions(+), 4 deletions(-)


diff --git a/Lib/ssl.py b/Lib/ssl.py
--- a/Lib/ssl.py
+++ b/Lib/ssl.py
@@ -157,14 +157,12 @@
 #   * Prefer any AES-GCM over any AES-CBC for better performance and security
 #   * Then Use HIGH cipher suites as a fallback
 #   * Then Use 3DES as fallback which is secure but slow
-#   * Finally use RC4 as a fallback which is problematic but needed for
-#     compatibility some times.
 #   * Disable NULL authentication, NULL encryption, and MD5 MACs for security
 #     reasons
 _DEFAULT_CIPHERS = (
     'ECDH+AESGCM:DH+AESGCM:ECDH+AES256:DH+AES256:ECDH+AES128:DH+AES:ECDH+HIGH:'
-    'DH+HIGH:ECDH+3DES:DH+3DES:RSA+AESGCM:RSA+AES:RSA+HIGH:RSA+3DES:ECDH+RC4:'
-    'DH+RC4:RSA+RC4:!aNULL:!eNULL:!MD5'
+    'DH+HIGH:ECDH+3DES:DH+3DES:RSA+AESGCM:RSA+AES:RSA+HIGH:RSA+3DES:!aNULL:'
+    '!eNULL:!MD5'
 )
 
 # Restricted and more secure ciphers for the server side
diff --git a/Misc/NEWS b/Misc/NEWS
--- a/Misc/NEWS
+++ b/Misc/NEWS
@@ -21,6 +21,8 @@
 - Issue #22885: Fixed arbitrary code execution vulnerability in the dumbdbm
   module.  Original patch by Claudiu Popa.
 
+- Issue #23481: Remove RC4 from the SSL module's default cipher list.
+
 - Issue #21849: Fixed xmlrpclib serialization of non-ASCII unicode strings in
   the multiprocessing module.
 

-- 
Repository URL: https://hg.python.org/cpython


More information about the Python-checkins mailing list