[Python-checkins] cpython (2.7): remove rc4 from the default client ciphers (closes #23481)

benjamin.peterson python-checkins at python.org
Thu Feb 19 23:58:24 CET 2015


https://hg.python.org/cpython/rev/3596081cfb55
changeset: 94687:3596081cfb55
branch: 2.7
parent: 94684:ba2b0e6a888f
user: Benjamin Peterson <benjamin at python.org>
date: Thu Feb 19 17:57:08 2015 -0500
summary:
 remove rc4 from the default client ciphers (closes #23481)
files:
 Lib/ssl.py | 6 ++----
 Misc/NEWS | 2 ++
 2 files changed, 4 insertions(+), 4 deletions(-)
diff --git a/Lib/ssl.py b/Lib/ssl.py
--- a/Lib/ssl.py
+++ b/Lib/ssl.py
@@ -157,14 +157,12 @@
 # * Prefer any AES-GCM over any AES-CBC for better performance and security
 # * Then Use HIGH cipher suites as a fallback
 # * Then Use 3DES as fallback which is secure but slow
-# * Finally use RC4 as a fallback which is problematic but needed for
-# compatibility some times.
 # * Disable NULL authentication, NULL encryption, and MD5 MACs for security
 # reasons
 _DEFAULT_CIPHERS = (
 'ECDH+AESGCM:DH+AESGCM:ECDH+AES256:DH+AES256:ECDH+AES128:DH+AES:ECDH+HIGH:'
- 'DH+HIGH:ECDH+3DES:DH+3DES:RSA+AESGCM:RSA+AES:RSA+HIGH:RSA+3DES:ECDH+RC4:'
- 'DH+RC4:RSA+RC4:!aNULL:!eNULL:!MD5'
+ 'DH+HIGH:ECDH+3DES:DH+3DES:RSA+AESGCM:RSA+AES:RSA+HIGH:RSA+3DES:!aNULL:'
+ '!eNULL:!MD5'
 )
 
 # Restricted and more secure ciphers for the server side
diff --git a/Misc/NEWS b/Misc/NEWS
--- a/Misc/NEWS
+++ b/Misc/NEWS
@@ -21,6 +21,8 @@
 - Issue #22885: Fixed arbitrary code execution vulnerability in the dumbdbm
 module. Original patch by Claudiu Popa.
 
+- Issue #23481: Remove RC4 from the SSL module's default cipher list.
+
 - Issue #21849: Fixed xmlrpclib serialization of non-ASCII unicode strings in
 the multiprocessing module.
 
-- 
Repository URL: https://hg.python.org/cpython


More information about the Python-checkins mailing list

AltStyle によって変換されたページ (->オリジナル) /