[Twisted-Python] Re: How to make a secure connection between two computers
Drew Smathers
drew.smathers at gmail.com
Wed Feb 13 15:42:14 MST 2008
On Feb 13, 2008 5:21 PM, Noam Raphael <noamraph at gmail.com> wrote:
> 2008/2/13, Jean-Paul Calderone <exarkun at divmod.com>:
> > When you invented a new crypto protocol, the default is that you have
> > lost. Sorry, that's just how it goes. I already see one weakness in
> > your code, as compared to SSL. I'm sure there are more. Google Gutmann
> > sound wave therapy if you need further convincing.
> >
> > Even if you don't use Twisted, use SSL.
> >
> Well, you are probably right.
> Just wondering: can you tell me what's the weakness you found? (I
> might learn some cryptology from this...)
>
> Another, not really related, question: Do you know if someone used the
> new coroutine-generators in python2.5 as a way to write servers? It
> seems to me like something that can make writing servers much easier,
> since a function is much more natural than a state machine (that's the
> reason I wrote this protocol without twisted).
>
Coroutine-generators? Python 2.5 doesn't have such a thing.
--
\\\\\/\"/\\\\\\\\\\\
\\\\/ // //\/\\\\\\\
\\\/ \\// /\ \/\\\\
\\/ /\/ / /\/ /\ \\\
\/ / /\/ /\ /\\\ \\
/ /\\\ /\\\ \\\\\/\
\/\\\\\/\\\\\/\\\\\\
d.p.s
-------------- next part --------------
An HTML attachment was scrubbed...
URL: </pipermail/twisted-python/attachments/20080213/023418ad/attachment.html>
More information about the Twisted-Python
mailing list