You know what, this bug isn't fixed. You clearly didn't test it.
As per http://bugs.python.org/issue1589 you are vulnerable. Test it your self 
using the test I put above again... all that is different is that now don't 
follow the redirect to a http:// location from what i can see. 

So your application is still vulnerable, as long as I have a certificate
signed by ca in the ca store, I can MITM checkbox.

Please test your patches before saying they fix things and EVEN better
add a test to check it has been fixed.

Please let me know if I am wrong :)

** Bug watch added: Python Roundup #1589
   http://bugs.python.org/issue1589

-- 
checkbox fails to verify ssl validity in data exchange with launchpad.net
https://bugs.launchpad.net/bugs/625076
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to