[Twisted-Python] Re: How to make a secure connection between two computers

Drew Smathers drew.smathers at gmail.com
Wed Feb 13 17:42:14 EST 2008


On Feb 13, 2008 5:21 PM, Noam Raphael <noamraph at gmail.com> wrote:

> 2008/2/13, Jean-Paul Calderone <exarkun at divmod.com>:
> > When you invented a new crypto protocol, the default is that you have
> > lost.  Sorry, that's just how it goes.  I already see one weakness in
> > your code, as compared to SSL.  I'm sure there are more.  Google Gutmann
> > sound wave therapy if you need further convincing.
> >
> > Even if you don't use Twisted, use SSL.
> >
> Well, you are probably right.
> Just wondering: can you tell me what's the weakness you found? (I
> might learn some cryptology from this...)
>
> Another, not really related, question: Do you know if someone used the
> new coroutine-generators in python2.5 as a way to write servers? It
> seems to me like something that can make writing servers much easier,
> since a function is much more natural than a state machine (that's the
> reason I wrote this protocol without twisted).
>

Coroutine-generators?  Python 2.5 doesn't have such a thing.

-- 
\\\\\/\"/\\\\\\\\\\\
\\\\/ // //\/\\\\\\\
\\\/  \\// /\ \/\\\\
\\/ /\/ / /\/ /\ \\\
\/ / /\/ /\  /\\\ \\
/ /\\\  /\\\ \\\\\/\
\/\\\\\/\\\\\/\\\\\\
              d.p.s
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://twistedmatrix.com/pipermail/twisted-python/attachments/20080213/023418ad/attachment.htm 


More information about the Twisted-Python mailing list