On Thu, 1 Jun 2017 11:45:14 +0100
Cory Benfield <c...@lukasa.co.uk> wrote:
> 
> I am claiming that using OpenSSL certificate validation with root stores that 
> are not intended for OpenSSL can be. This is because trust of a certificate 
> is non-binary. For example, consider WoSign. The Windows TLS implementation 
> will distrust certificates that chain up to WoSign as a root certificate that 
> were issued after October 21 2016. This is not something that can currently 
> be represented as a PEM file. Therefore, the person exporting the certs needs 
> to choose: should that be exported or not? If it is, then OpenSSL will 
> happily trust it even in situations where the system trust store would not.

I was not talking about exporting the whole system CA as a PEM file, I
was talking about adding an option for system adminstrators to
configure an extra CA certificate to be recognized by pip.

> More generally, macOS allows the administrator to configure graduated trust: 
> that is, to override whether or not a root should be trusted for certificate 
> validation in some circumstances. Again, exporting this to a PEM does not 
> persist this information.

How much of this is relevant to pip?

Regards

Antoine.


_______________________________________________
Python-Dev mailing list
Python-Dev@python.org
https://mail.python.org/mailman/listinfo/python-dev
Unsubscribe: 
https://mail.python.org/mailman/options/python-dev/archive%40mail-archive.com

Reply via email to