On 06/03/2013 10:55 AM, Donald Stufft wrote:
On Jun 3, 2013, at 12:52 PM, Ethan Furman wrote:
On 06/03/2013 09:43 AM, Donald Stufft wrote:
On Jun 3, 2013, at 5:51 AM, Antoine Pitrou wrote:
The problem with a "slightly outdated" CA store is that it can be a
security risk.
Tracking the Mozilla store isn't difficult. New additions can be ignored for
currently released Pythons so we'd just
need to watch them for blacklisting certs and roll that into a security update.
Personally, I'm not interested in waiting six months for an update. And why
can't I have the new additions?
Seems to me a better solution is to have routines that can query and update at
will (meaning the app has to call
them), as well as having the bundle (black lists as well as new additions) in
the regular updates.
Personally I view that as a nice to have but if an app is willing to call hem
they can easily depend on certifi and just
replace the default certificates. The goal here is to get secure by default
without any work on the part of the
developers. If a developer knows to update the certs they can know to use
certifi.
Let's pretend I want to do something with https. I'm pretty much a complete novice in that area, but I do know about
these certificate things and that I should use them. (Which will probably happen sooner rather than later. ;)
From my POV, having the bundled certs in the stdlib is great, but also having something in the stdlib to query for and
download updates would also be great. I just looked at certifi and the only thing it has on there is `where` which
tells me where the certs are on the system. This on only half the problem. If we're going to solve it, why not solve
the whole problem?
--
~Ethan~
_______________________________________________
Python-Dev mailing list
[email protected]
http://mail.python.org/mailman/listinfo/python-dev
Unsubscribe:
http://mail.python.org/mailman/options/python-dev/archive%40mail-archive.com