cpython: 0485552b487e (original) (raw)

Mercurial > cpython

changeset 89952:0485552b487e

Merge in 3.4 to bring forward the Issue #21043 changes. [#21043]

Donald Stufft donald@stufft.io
date Mon, 24 Mar 2014 19:28:08 -0400
parents 3047db8f6126(current diff)6f776c91da08(diff)
children f7a40517f0ac
files Misc/NEWS
diffstat 2 files changed, 6 insertions(+), 14 deletions(-)[+] [-] Doc/library/ssl.rst 17 Misc/NEWS 3

line wrap: on

line diff

--- a/Doc/library/ssl.rst +++ b/Doc/library/ssl.rst @@ -1339,20 +1339,9 @@ If you are going to require validation o certificate, you need to provide a "CA certs" file, filled with the certificate chains for each issuer you are willing to trust. Again, this file just contains these chains concatenated together. For validation, Python will use the first -chain it finds in the file which matches. Some "standard" root certificates are -available from various certification authorities: CACert.org[](#l1.8) -<http://www.cacert.org/index.php?id=3>, Thawte[](#l1.9) -<http://www.thawte.com/roots/>, Verisign[](#l1.10) -<http://www.verisign.com/support/roots.html>, Positive SSL[](#l1.11) -<http://www.PositiveSSL.com/ssl-certificate-support/cert_installation/UTN-USERFirst-Hardware.crt> -(used by python.org), Equifax and GeoTrust[](#l1.13) -<http://www.geotrust.com/resources/root_certificates/index.asp>_. - -In general, if you are using SSL3 or TLS1, you don't need to put the full chain -in your "CA certs" file; you only need the root certificates, and the remote -peer is supposed to furnish the other certificates necessary to chain from its -certificate to a root certificate. See :rfc:4158 for more discussion of the -way in which certification chains can be built. +chain it finds in the file which matches. The platform's certificates file can +be used by calling :meth:SSLContext.load_default_certs, this is done +automatically with :func:.create_default_context. Combined key and certificate ^^^^^^^^^^^^^^^^^^^^^^^^^^^^

--- a/Misc/NEWS +++ b/Misc/NEWS @@ -104,6 +104,9 @@ Library Documentation ------------- +- Issue #21043: Remove the recommendation for specific CA organizations and to