Message149840
| Author | pitrou |
|---|---|
| Recipients | jcea, naif, pitrou |
| Date | 2011-12-19.11:14:23 |
| SpamBayes Score | 0.0011641977 |
| Marked as misclassified | No |
| Message-id | <1324293228.3588.20.camel@localhost.localdomain> |
| In-reply-to | <1324292016.82.0.631284256073.issue13627@psf.upfronthosting.co.za> |
| Content | |
|---|---|
> If you want we can open a discussion within Tor Project to have a
> "rationale method" to define a set of "default ciphers" considering
> the ration of security/performance/compatibility.
Why don't you simple define your own default ciphers and call the
set_ciphers() method?
That said, we could perhaps call set_ciphers("HIGH") by default. This
excludes legacy ciphers (such as RC4, DES) without having us maintain an
explicit list. |
|
| History | |||
|---|---|---|---|
| Date | User | Action | Args |
| 2011-12-19 11:14:24 | pitrou | set | recipients: + pitrou, jcea, naif |
| 2011-12-19 11:14:23 | pitrou | link | issue13627 messages |
| 2011-12-19 11:14:23 | pitrou | create | |