Christian Heimes added the comment:

I don't see 1) as a problem. You won't be able to resolve these names in DNS, 
would you?

Regarding 2). Yes, it would be beneficial to have more elaborate checks to 
protect against wildcard attacks like *.com. However Python is not a browser. 
It's really hard to do it right and even harder to keep the rule set up to 
date. Some TLDs like .uk have sublevel namespaces, e.g. co.uk. *.co.uk is also 
invalid.

The problem is going to shift anyway. For Python 3.7 I'm going to deprecate 
support for OpenSSL < 1.0.2 and use OpenSSL's hostname verification code 
instead of ssl.match_hostname().

----------

_______________________________________
Python tracker <rep...@bugs.python.org>
<http://bugs.python.org/issue29824>
_______________________________________
_______________________________________________
Python-bugs-list mailing list
Unsubscribe: 
https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com

Reply via email to