Alex Gaynor added the comment:

Unfortunately most TLS implementations (particularly those in browser stacks) 
are vulnerable to downgrade attacks, whereby an attacker can send some 
malicious packets to simulate a connection failure and cause a lower version of 
the protocol to be negotiated, 
https://crypto.stackexchange.com/questions/10493/why-is-tls-susceptible-to-protocol-downgrade-attacks
 has some info on it. As a result, whenever possible it's really desirable to 
completely disallow as many poor choices as possible.

----------

_______________________________________
Python tracker <rep...@bugs.python.org>
<http://bugs.python.org/issue21013>
_______________________________________
_______________________________________________
Python-bugs-list mailing list
Unsubscribe: 
https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com

Reply via email to