Message181379
| Author |
christian.heimes |
| Recipients |
christian.heimes |
| Date |
2013年02月04日.19:32:33 |
| SpamBayes Score |
-1.0 |
| Marked as misclassified |
Yes |
| Message-id |
<1360006353.36.0.371711249441.issue17129@psf.upfronthosting.co.za> |
| In-reply-to |
| Content |
For effective SSL server cert validation a bundle of trustworthy CA certs is required. Most system ship such a bundle but it's not always possible to access the bundle from Python / OpenSSL. Windows and Mac OS X come into my mind. wget and curl ship a copy of Mozilla's CA cert bundle.
The site http://curl.haxx.se/docs/caextract.html explains how to extract the CA certs in PEM format. I suggest that we ship the CA bundle with Python and use a lookup chain:
- user defined path to a cacert directory or cacert.pem file
- cacert directory or PEM file in the user's home directory:
cacertdir = os.path.join(site.USER_SITE, os.pardir, "cacert")
cacertfile = os.path.join(site.USER_SITE, os.pardir, "cacert.pem")
- system's ca cert directory (/etc/ssl/certs on Linux)
- CA cert bundle shipped with the Python installation. |
|
History
|
|---|
| Date |
User |
Action |
Args |
| 2013年02月04日 19:32:33 | christian.heimes | set | recipients:
+ christian.heimes |
| 2013年02月04日 19:32:33 | christian.heimes | set | messageid: <1360006353.36.0.371711249441.issue17129@psf.upfronthosting.co.za> |
| 2013年02月04日 19:32:33 | christian.heimes | link | issue17129 messages |
| 2013年02月04日 19:32:33 | christian.heimes | create |
|