6.1 SSL? TLS? HTTPS?6.2 Man-in-the-middle attack6.3 The TLS handshake6.3.1 Cipher suite negotiation6.3.2 Key exchange6.3.3 Server authentication6.4 HTTP with Django6.4.1 The DEBUG setting6.5 HTTPS with Gunicorn6.5.1 Self-signed public-key certificates6.5.2 The Strict-Transport-Security response header6.5.3 HTTPS redirects6.6 TLS and the requests package6.7 TLS and database connections6.8 TLS and email6.8.1 Implicit TLS6.8.2 Email client authentication6.8.3 SMTP authentication credentialsSummary