This issue tracker has been migrated to GitHub, and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

classification
Title: some stdlib modules need to be updated to handle SSL certificate validation
Type: enhancement Stage:
Components: Versions: Python 3.2
process
Status: closed Resolution: rejected
Dependencies: Superseder:
Assigned To: Nosy List: asdfasdfasdfasdfasdfasdfasdf, christian.heimes, eric.araujo, fweimer, loewis, nbareil, orsenthil, pitrou
Priority: normal Keywords: patch

Created on 2010-11-17 09:26 by asdfasdfasdfasdfasdfasdfasdf, last changed 2022-04-11 14:57 by admin. This issue is now closed.

Files
File name Uploaded Description Edit
ssl.diff loewis, 2010-11-21 20:19 review
Messages (38)
msg121337 - (view) Author: david (asdfasdfasdfasdfasdfasdfasdf) Date: 2010-11-17 09:26
Please by default enforce ssl certificate checking in modules that can have user's which *depend* on the security of the ssl connection.

See https://bugs.launchpad.net/ubuntu/+source/offlineimap/+bug/675120
http://bugs.python.org/issue10274
http://bugs.python.org/issue1589

and http://seclists.org/oss-sec/2010/q4/33

So I will name the following modules(as starting point):
1. httplib http://docs.python.org/library/httplib.html
2. urllib http://docs.python.org/library/urllib.html
3. urllib2 http://docs.python.org/library/urllib2.html
4. imaplib http://docs.python.org/library/imaplib.html
msg121340 - (view) Author: Antoine Pitrou (pitrou) * (Python committer) Date: 2010-11-17 09:48
http.client and urllib.request are already done (*), and imaplib is covered in issue10274.

(*) http://docs.python.org/dev/library/http.client.html
http://docs.python.org/dev/library/urllib.request.html

Do you have other modules in mind or should I close this issue?
msg121341 - (view) Author: david (asdfasdfasdfasdfasdfasdfasdf) Date: 2010-11-17 10:12
Sorry, I don't remember seeing the change-set /commit showing that is now on by default. (for those modules).
msg121342 - (view) Author: david (asdfasdfasdfasdfasdfasdfasdf) Date: 2010-11-17 10:24
Are you referring to
http://code.python.org/hg/branches/py3k/rev/86f97255bfc8

where there is now 
"
    2.29 +   .. warning::
    2.30 +      If neither *cafile* nor *capath* is specified, an HTTPS request
    2.31 +      will not do any verification of the server's certificate.
"
This doesnt' by default check the certificate does it ? 
IMHO it should use a sane system capath by default and do the checking.
msg121343 - (view) Author: Antoine Pitrou (pitrou) * (Python committer) Date: 2010-11-17 10:31
> Are you referring to
> http://code.python.org/hg/branches/py3k/rev/86f97255bfc8
> 
> where there is now 
> "
>     2.29 +   .. warning::
>     2.30 +      If neither *cafile* nor *capath* is specified, an HTTPS request
>     2.31 +      will not do any verification of the server's certificate.
> "
> This doesnt' by default check the certificate does it ? 
> IMHO it should use a sane system capath by default and do the checking.

I'm afraid Python has no business validating and distributing CA
certificates. You have to use what is provided by your system libraries,
if possible, and otherwise bundle your own.
msg121348 - (view) Author: david (asdfasdfasdfasdfasdfasdfasdf) Date: 2010-11-17 11:30
Well, what are the usual paths for windows and linux?
Just try those(by default) and if this fails (no ca's paths work) then
raise an exception and have a parameter to disable this behaviour.
msg121349 - (view) Author: Antoine Pitrou (pitrou) * (Python committer) Date: 2010-11-17 11:31
> Well, what are the usual paths for windows and linux?
> Just try those(by default) and if this fails (no ca's paths work) then
> raise an exception and have a parameter to disable this behaviour.

That's a possible resolution, but it needs a patch.
msg121352 - (view) Author: Antoine Pitrou (pitrou) * (Python committer) Date: 2010-11-17 12:05
Actually, it seems OpenSSL is often built with the paths to system certificates, which can be enabled by an undocumented function. See issue10443.
msg121353 - (view) Author: david (asdfasdfasdfasdfasdfasdfasdf) Date: 2010-11-17 12:25
Interesting but you may want to ask the openssl developers about this first.
msg121464 - (view) Author: Martin v. Löwis (loewis) * (Python committer) Date: 2010-11-18 15:50
db: there *is* no "sane system ca path", or Python would have done that long ago. On Windows, it may be possible to drop OpenSSL, and use the system certificate store. However, that would be a major rewrite, and it may not be possible to provide the entire API anymore.

The best that could be done is to provide a configuration option (e.g. global variable) that should be treated as a default value, and then leave it to people distributing Python to fill out this variable in a sensible way.
msg121465 - (view) Author: Antoine Pitrou (pitrou) * (Python committer) Date: 2010-11-18 16:01
> The best that could be done is to provide a configuration option (e.g.
> global variable) that should be treated as a default value, and then
> leave it to people distributing Python to fill out this variable in a
> sensible way.

Actually, OpenSSL already does a similar thing (see issue10443).
msg121472 - (view) Author: Martin v. Löwis (loewis) * (Python committer) Date: 2010-11-18 16:18
>> The best that could be done is to provide a configuration option (e.g.
>> global variable) that should be treated as a default value, and then
>> leave it to people distributing Python to fill out this variable in a
>> sensible way.
> 
> Actually, OpenSSL already does a similar thing (see issue10443).

This may not be satisfying to users. For example, our Windows
distribution doesn't ship with any certicates (AFAIK); I have no
clue where exactly OpenSSL would be looking for them, either.
People worried about this problem probably would want a way to
fill the list of trusted CA certificates.

Regards,
Martin
msg121473 - (view) Author: david (asdfasdfasdfasdfasdfasdfasdf) Date: 2010-11-18 16:34
On 19 November 2010 03:18, Martin v. Löwis <report@bugs.python.org> wrote:
>
> Martin v. Löwis <martin@v.loewis.de> added the comment:
>
>>> The best that could be done is to provide a configuration option (e.g.
>>> global variable) that should be treated as a default value, and then
>>> leave it to people distributing Python to fill out this variable in a
>>> sensible way.
>>
>> Actually, OpenSSL already does a similar thing (see issue10443).
>
> This may not be satisfying to users. For example, our Windows
> distribution doesn't ship with any certicates (AFAIK); I have no
> clue where exactly OpenSSL would be looking for them, either.
> People worried about this problem probably would want a way to
> fill the list of trusted CA certificates.
>

Martin does it matter?
To be honest I don't know about that many client side python windows
applications for which this is a problem for. Maybe I am mistaken. If
this is the case, then how do these projects work at the moment? (or
do they just not care about this...) . However, they could bundle
their own certificates, so I don't see this as an issue.

However, you seem confused here:
" I have no
> clue where exactly OpenSSL would be looking for them, either.
> People worried about this problem probably would want a way to
> fill the list of trusted CA certificates."

Erh, those people can already do this, but the problem is by default
none are selected.
IMHO something is probably better than nothing in this case(by default).
msg121477 - (view) Author: Antoine Pitrou (pitrou) * (Python committer) Date: 2010-11-18 16:48
> > This may not be satisfying to users. For example, our Windows
> > distribution doesn't ship with any certicates (AFAIK); I have no
> > clue where exactly OpenSSL would be looking for them, either.
> > People worried about this problem probably would want a way to
> > fill the list of trusted CA certificates.

Right, this is just a helper in case OpenSSL is configured correctly by
the OS vendor (the OpenSSL packaged by Linux distros usually is).

> Erh, those people can already do this, but the problem is by default
> none are selected.
> IMHO something is probably better than nothing in this case(by default).

We can't change anything *by default* since it would break
compatibility. We can just provide helpers and arguments to make it easy
to switch to a more "secure" behaviour (for some meaning of secure).
msg121480 - (view) Author: david (asdfasdfasdfasdfasdfasdfasdf) Date: 2010-11-18 17:12
On 19 November 2010 03:48, Antoine Pitrou <report@bugs.python.org> wrote:
>
> Antoine Pitrou <pitrou@free.fr> added the comment:
>
>> > This may not be satisfying to users. For example, our Windows
>> > distribution doesn't ship with any certicates (AFAIK); I have no
>> > clue where exactly OpenSSL would be looking for them, either.
>> > People worried about this problem probably would want a way to
>> > fill the list of trusted CA certificates.
>
> Right, this is just a helper in case OpenSSL is configured correctly by
> the OS vendor (the OpenSSL packaged by Linux distros usually is).
>
>> Erh, those people can already do this, but the problem is by default
>> none are selected.
>> IMHO something is probably better than nothing in this case(by default).
>
> We can't change anything *by default* since it would break
> compatibility. We can just provide helpers and arguments to make it easy
> to switch to a more "secure" behaviour (for some meaning of secure).

what about an environmental setting that can be used to enforce
checking (or the like) ?
msg121481 - (view) Author: Martin v. Löwis (loewis) * (Python committer) Date: 2010-11-18 17:40
>> This may not be satisfying to users. For example, our Windows
>> distribution doesn't ship with any certicates (AFAIK); I have no
>> clue where exactly OpenSSL would be looking for them, either.
>> People worried about this problem probably would want a way to
>> fill the list of trusted CA certificates.
>>
> 
> Martin does it matter?
> To be honest I don't know about that many client side python windows
> applications for which this is a problem for. Maybe I am mistaken.

I can't understand why you are saying that. The very same issues
that people perceive as problems on Unix ("users can be victim
to man in the middle attack") also exist on Windows. If you run
a Python script that does https on Windows, you can *also* be
MITM-victim (as likely as you can on Unix, that is).

Or are you suggesting that Python Windows applications don't use SSL?

> If
> this is the case, then how do these projects work at the moment? (or
> do they just not care about this...) .

"The projects" may be scripts that somebody developed that never get
released. But yes, most people ignore/accept the problem (often as
gruntingly as the Unix users).

> However, they could bundle
> their own certificates, so I don't see this as an issue.

Who is "they"? Most people get their Python binaries from python.org,
and they don't build "applications" from it, but run "scripts".

> However, you seem confused here:
> " I have no
>> clue where exactly OpenSSL would be looking for them, either.
>> People worried about this problem probably would want a way to
>> fill the list of trusted CA certificates."
> 
> Erh, those people can already do this, but the problem is by default
> none are selected.

You misunderstood. I was not proposing that scripts provide a CA
list, but that users might deploy a CA list into their Python
installation, which is then picked up in the same way as you are asking
for on Ubuntu.
msg121500 - (view) Author: david (asdfasdfasdfasdfasdfasdfasdf) Date: 2010-11-19 01:46
On 19 November 2010 04:40, Martin v. Löwis <report@bugs.python.org> wrote:
>
> Martin v. Löwis <martin@v.loewis.de> added the comment:
>
>>> This may not be satisfying to users. For example, our Windows
>>> distribution doesn't ship with any certicates (AFAIK); I have no
>>> clue where exactly OpenSSL would be looking for them, either.
>>> People worried about this problem probably would want a way to
>>> fill the list of trusted CA certificates.
>>>
>>
>> Martin does it matter?
>> To be honest I don't know about that many client side python windows
>> applications for which this is a problem for. Maybe I am mistaken.
>
> I can't understand why you are saying that. The very same issues
> that people perceive as problems on Unix ("users can be victim
> to man in the middle attack") also exist on Windows. If you run
> a Python script that does https on Windows, you can *also* be
> MITM-victim (as likely as you can on Unix, that is).
>
> Or are you suggesting that Python Windows applications don't use SSL?
>
>> If
>> this is the case, then how do these projects work at the moment? (or
>> do they just not care about this...) .
>
> "The projects" may be scripts that somebody developed that never get
> released. But yes, most people ignore/accept the problem (often as
> gruntingly as the Unix users).
>
>> However, they could bundle
>> their own certificates, so I don't see this as an issue.
>
> Who is "they"? Most people get their Python binaries from python.org,
> and they don't build "applications" from it, but run "scripts".
>
>> However, you seem confused here:
>> " I have no
>>> clue where exactly OpenSSL would be looking for them, either.
>>> People worried about this problem probably would want a way to
>>> fill the list of trusted CA certificates."
>>
>> Erh, those people can already do this, but the problem is by default
>> none are selected.
>
> You misunderstood. I was not proposing that scripts provide a CA
> list, but that users might deploy a CA list into their Python
> installation, which is then picked up in the same way as you are asking
> for on Ubuntu.

No I did not misunderstand at all.
I am pushing for safer defaults or a way to enable safe defaults.
Having to tamper with my python path and point at a modified version
of the ssl module doesn't sound like fun.

OH windows users those guys. Well if they don't have any certificates
at the moment and they don't know this, perhaps some one should tell
them?
I don't know I am not a windows python user.
msg121800 - (view) Author: Antoine Pitrou (pitrou) * (Python committer) Date: 2010-11-20 22:27
Martin,

> You misunderstood. I was not proposing that scripts provide a CA
> list, but that users might deploy a CA list into their Python
> installation, which is then picked up in the same way as you are asking
> for on Ubuntu.

Could you elaborate on what kind of scheme you are proposing?

It should be noted that the default OpenSSL paths can be modified at runtime using environment variables SSL_CERT_FILE and SSL_CERT_DIR. Not sure we should document this, though.
msg121838 - (view) Author: david (asdfasdfasdfasdfasdfasdfasdf) Date: 2010-11-21 02:23
On 21 November 2010 09:27, Antoine Pitrou <report@bugs.python.org> wrote:
>
> Antoine Pitrou <pitrou@free.fr> added the comment:
>
> Martin,
>
>> You misunderstood. I was not proposing that scripts provide a CA
>> list, but that users might deploy a CA list into their Python
>> installation, which is then picked up in the same way as you are asking
>> for on Ubuntu.
>
> Could you elaborate on what kind of scheme you are proposing?
>
> It should be noted that the default OpenSSL paths can be modified at runtime using environment variables SSL_CERT_FILE and SSL_CERT_DIR. Not sure we should document this, though.

Sorry is this question aimed at me?
No I was saying that if we can't move to a sane default then an
environmental setting or other configuration maybe nice to have to
enforce certificate checking etc.
It had nothing to do with those variables, but perhaps we would use them?
msg121879 - (view) Author: Martin v. Löwis (loewis) * (Python committer) Date: 2010-11-21 07:47
Antoine,

I was proposing that the Windows installation should have a folder where OpenSSL looks for certificates, and that users put trusted certificates into that folder. These should be the ones that set_default_verify_paths will use. Unfortunately, I don't know where that directory might be in the windows builds we provide. So I think we should find out.
msg121889 - (view) Author: david (asdfasdfasdfasdfasdfasdfasdf) Date: 2010-11-21 09:28
Back to the main issue here :

So for python3 is it possible to make attempting to use capath(some
common ones OR the openssl location capath if this is ok for use) the
default(with failure to find a valid capath result in an exception
being raised) ?

Obviously if cafile or capath is provided by the caller then --> do
not follow this behaviour.
msg121894 - (view) Author: Martin v. Löwis (loewis) * (Python committer) Date: 2010-11-21 09:50
> So for python3 is it possible to make attempting to use capath(some
> common ones OR the openssl location capath if this is ok for use) the
> default(with failure to find a valid capath result in an exception
> being raised) ?

The default? That would be an incompatible change, and cause many
complaints. So I'm very skeptical that this can be done.

Having applications/scripts explicitly opt-in to a default CA
certificate list would be an option (then making those applications
break in installations where the default CA list is empty).
msg121896 - (view) Author: david (asdfasdfasdfasdfasdfasdfasdf) Date: 2010-11-21 10:13
On 21 November 2010 20:50, Martin v. Löwis <report@bugs.python.org> wrote:
>
> Martin v. Löwis <martin@v.loewis.de> added the comment:
>
>> So for python3 is it possible to make attempting to use capath(some
>> common ones OR the openssl location capath if this is ok for use) the
>> default(with failure to find a valid capath result in an exception
>> being raised) ?
>
> The default? That would be an incompatible change, and cause many
> complaints. So I'm very skeptical that this can be done.
>
> Having applications/scripts explicitly opt-in to a default CA
> certificate list would be an option (then making those applications
> break in installations where the default CA list is empty).

"Errors should never pass silently."
IMHO it is an error not to check by default.
No it wouldn't break anything that shouldn't break.
Users can then pass in None for the capath (as an example).
msg121921 - (view) Author: Antoine Pitrou (pitrou) * (Python committer) Date: 2010-11-21 13:17
> > Having applications/scripts explicitly opt-in to a default CA
> > certificate list would be an option (then making those applications
> > break in installations where the default CA list is empty).
> 
> "Errors should never pass silently."
> IMHO it is an error not to check by default.
> No it wouldn't break anything that shouldn't break.
> Users can then pass in None for the capath (as an example).

Well, can you stop insisting? It is probably the third time that we
explain you we can't break compatibility on this.

(also, many SSL sites are not covered by "default" CA certificates
shipped by most vendors, e.g. self-signed certificates or certificates
signed by CAcert)
msg121930 - (view) Author: david (asdfasdfasdfasdfasdfasdfasdf) Date: 2010-11-21 14:27
Fine.
So if not in the ssl module what about for urllib etc.?
msg121931 - (view) Author: Antoine Pitrou (pitrou) * (Python committer) Date: 2010-11-21 14:28
> Fine.
> So if not in the ssl module what about for urllib etc.?

The same answer really... We can't change default settings without
breaking compatibility.
msg121932 - (view) Author: david (asdfasdfasdfasdfasdfasdfasdf) Date: 2010-11-21 14:29
So please close this bug.
Apparently making things secure by default is to much to ask.
msg121976 - (view) Author: Martin v. Löwis (loewis) * (Python committer) Date: 2010-11-21 20:19
Here is a patch that changes SSLContext into a context manager, allowing to write code like

    with ssl.SSLContext(ssl.PROTOCOL_SSLv23):
        ssl.SSLContext.current().set_default_verify_path()
        res = urllib.request.urlopen("https://www.microsoft.com")

If people like this approach, feel free to adjust it; I likely won't have much time to work on it further.
msg126012 - (view) Author: david (asdfasdfasdfasdfasdfasdfasdf) Date: 2011-01-11 15:36
Thank you @loewis. However, I don't see where set_default_verify_path - is defined in the patch you have provided.

It would also be nice to do something like this:
import ssl
...
ssl._FORCE_VERIFICATION = True

and even better would be to determine the CA path as @pitrou was suggesting and incorporate this into the ssl module somehow.
msg126048 - (view) Author: Martin v. Löwis (loewis) * (Python committer) Date: 2011-01-11 23:03
> Thank you @loewis. However, I don't see where 
> set_default_verify_path - is defined in the patch you have provided.

It's not defined in the patch, as it is already committed to Python.
msg126068 - (view) Author: david (asdfasdfasdfasdfasdfasdfasdf) Date: 2011-01-12 03:19
and what does it do ?
msg126080 - (view) Author: Éric Araujo (eric.araujo) * (Python committer) Date: 2011-01-12 09:54
We tend to spend some time on documentation: http://docs.python.org/dev/library/ssl#ssl.SSLContext.set_default_verify_paths
msg126081 - (view) Author: david (asdfasdfasdfasdfasdfasdfasdf) Date: 2011-01-12 10:07
Cool yeah. The documentation is good I asked the question because I
wasn't sure if it was in a pending patch elsewhere in the bug tracker
or was accepted. I guess I should have googled for it.

Thank you.
msg147338 - (view) Author: Nicolas Bareil (nbareil) Date: 2011-11-09 08:43
Hello,


Your patch about SSLContext is great! But what can we do about python 2.x?

I understand that we have to keep backward compatibility but something has to be done for improving current situation, even Paypal API (*) recommends using urllib.urlopen() to check sensitive things on HTTPS :(

If backporting SSLContext into python 2.x is not an option, what do you think about a DeprecationWarning at runtime?

Thanks,

(*) https://www.x.com/devzone/articles/getting-started-paypal-django
    And even the popular Django paypal module uses urllib2 
    https://github.com/johnboxall/django-paypal
msg147341 - (view) Author: Martin v. Löwis (loewis) * (Python committer) Date: 2011-11-09 09:07
> Your patch about SSLContext is great! But what can we do about python 2.x?

Adding new features to Python 2.7 is certainly not an option.

> what do you think about a DeprecationWarning at runtime?

What API exactly should this deprecate?
msg147342 - (view) Author: Nicolas Bareil (nbareil) Date: 2011-11-09 09:17
Martin v. Löwis <report@bugs.python.org> writes:
>> what do you think about a DeprecationWarning at runtime?
>
> What API exactly should this deprecate?

Ooops, lapsus. I was thinking about a RuntimeWarning raised on HTTPS
request (in httplib.HTTPSConnection.connect for instance).
msg195288 - (view) Author: Antoine Pitrou (pitrou) * (Python committer) Date: 2013-08-15 20:56
I would like to reject this approach. I am still adding Christian to the CC list, in case he has something to say about it :)
msg195289 - (view) Author: Christian Heimes (christian.heimes) * (Python committer) Date: 2013-08-15 21:03
I agree with Antoine. I'm not sure what is going to happen if you use a single SSLContext for unrelated services and different hosts -- not to mention SNI.

A while ago I tried a similar patch but I was stopped by the fact that OpenSSL doesn't provide an API to clone / copy a SSLContext object. Perhaps we have to introduce a factory that creates SSLContext object from a global configuration?
History
Date User Action Args
2022-04-11 14:57:09adminsetgithub: 54650
2013-08-15 21:03:04christian.heimessetmessages: + msg195289
2013-08-15 20:56:15pitrousetstatus: open -> closed

nosy: + christian.heimes
messages: + msg195288

resolution: rejected
2013-03-08 08:47:22fweimersetnosy: + fweimer
2011-11-09 09:17:47nbareilsetmessages: + msg147342
2011-11-09 09:07:42loewissetmessages: + msg147341
title: some stdlib modules need to be updated to handle SSL certificate validation -> some stdlib modules need to be updated to handle SSL certificate validation
2011-11-09 08:43:41nbareilsetnosy: + nbareil
messages: + msg147338
2011-01-12 10:07:07asdfasdfasdfasdfasdfasdfasdfsetnosy: loewis, orsenthil, pitrou, eric.araujo, asdfasdfasdfasdfasdfasdfasdf
messages: + msg126081
2011-01-12 09:54:32eric.araujosetnosy: loewis, orsenthil, pitrou, eric.araujo, asdfasdfasdfasdfasdfasdfasdf
messages: + msg126080
2011-01-12 03:19:31asdfasdfasdfasdfasdfasdfasdfsetnosy: loewis, orsenthil, pitrou, eric.araujo, asdfasdfasdfasdfasdfasdfasdf
messages: + msg126068
title: some stdlib modules need to be updated to handle SSL certificate validation -> some stdlib modules need to be updated to handle SSL certificate validation
2011-01-11 23:03:26loewissetnosy: loewis, orsenthil, pitrou, eric.araujo, asdfasdfasdfasdfasdfasdfasdf
messages: + msg126048
title: some stdlib modules need to be updated to handle SSL certificate validation -> some stdlib modules need to be updated to handle SSL certificate validation
2011-01-11 15:36:53asdfasdfasdfasdfasdfasdfasdfsetnosy: + asdfasdfasdfasdfasdfasdfasdf
messages: + msg126012
2010-11-25 22:33:54orsenthilsetnosy: + orsenthil
2010-11-21 20:19:26loewissetfiles: + ssl.diff
keywords: + patch
messages: + msg121976
2010-11-21 15:05:11pitrousetstatus: closed -> open
resolution: rejected -> (no value)
stage: needs patch ->
2010-11-21 14:54:50asdfasdfasdfasdfasdfasdfasdfsetstatus: open -> closed
resolution: rejected
2010-11-21 14:36:47pitrousetnosy: - asdfasdfasdfasdfasdfasdfasdf
2010-11-21 14:29:51asdfasdfasdfasdfasdfasdfasdfsetmessages: + msg121932
2010-11-21 14:28:21pitrousetmessages: + msg121931
2010-11-21 14:27:26asdfasdfasdfasdfasdfasdfasdfsetmessages: + msg121930
2010-11-21 13:17:18pitrousetmessages: + msg121921
2010-11-21 10:13:05asdfasdfasdfasdfasdfasdfasdfsetmessages: + msg121896
title: some stdlib modules need to be updated to handle SSL certificate validation -> some stdlib modules need to be updated to handle SSL certificate validation
2010-11-21 09:50:00loewissetmessages: + msg121894
title: some stdlib modules need to be updated to handle SSL certificate validation -> some stdlib modules need to be updated to handle SSL certificate validation
2010-11-21 09:28:23asdfasdfasdfasdfasdfasdfasdfsetmessages: + msg121889
2010-11-21 07:47:31loewissetmessages: + msg121879
2010-11-21 02:23:05asdfasdfasdfasdfasdfasdfasdfsetmessages: + msg121838
2010-11-20 22:27:15pitrousetmessages: + msg121800
2010-11-19 01:46:44asdfasdfasdfasdfasdfasdfasdfsetmessages: + msg121500
title: some stdlib modules need to be updated to handle SSL certificate validation -> some stdlib modules need to be updated to handle SSL certificate validation
2010-11-18 17:40:06loewissetmessages: + msg121481
title: some stdlib modules need to be updated to handle SSL certificate validation -> some stdlib modules need to be updated to handle SSL certificate validation
2010-11-18 17:12:38asdfasdfasdfasdfasdfasdfasdfsetmessages: + msg121480
2010-11-18 16:48:46pitrousetmessages: + msg121477
2010-11-18 16:34:15asdfasdfasdfasdfasdfasdfasdfsetmessages: + msg121473
title: some stdlib modules need to be updated to handle SSL certificate validation -> some stdlib modules need to be updated to handle SSL certificate validation
2010-11-18 16:18:09loewissetmessages: + msg121472
title: some stdlib modules need to be updated to handle SSL certificate validation -> some stdlib modules need to be updated to handle SSL certificate validation
2010-11-18 16:01:46pitrousetmessages: + msg121465
2010-11-18 15:50:27loewissetnosy: + loewis
messages: + msg121464
2010-11-17 12:25:26asdfasdfasdfasdfasdfasdfasdfsetmessages: + msg121353
2010-11-17 12:05:25pitrousetmessages: + msg121352
2010-11-17 11:31:47pitrousetmessages: + msg121349
2010-11-17 11:30:39asdfasdfasdfasdfasdfasdfasdfsetmessages: + msg121348
2010-11-17 10:31:28pitrousetmessages: + msg121343
2010-11-17 10:24:23asdfasdfasdfasdfasdfasdfasdfsetmessages: + msg121342
2010-11-17 10:12:37asdfasdfasdfasdfasdfasdfasdfsetmessages: + msg121341
2010-11-17 09:50:13eric.araujosetnosy: + eric.araujo
2010-11-17 09:48:15pitrousettitle: Please by default enforce ssl certificate checking in modules that can have user's which *depend* on the security of the ssl connection. -> some stdlib modules need to be updated to handle SSL certificate validation
stage: needs patch
messages: + msg121340
versions: + Python 3.2
2010-11-17 09:37:10ned.deilysetnosy: + pitrou
type: enhancement
2010-11-17 09:32:27ned.deilylinkissue10442 superseder
2010-11-17 09:26:16asdfasdfasdfasdfasdfasdfasdfcreate