Discussion:
[Bug 251562] security/py-certifi: SSLError 'certificate verify failed' despite correct looking /etc/ssl/cert.pem
b***@freebsd.org
2021-05-24 03:21:01 UTC
Permalink
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=251562

Kubilay Kocak <***@FreeBSD.org> changed:

What |Removed |Added
----------------------------------------------------------------------------
Keywords| |needs-patch

--- Comment #2 from Kubilay Kocak <***@FreeBSD.org> ---
@Reporter, This is a change proposal to have certifi use the system, provided
root store, is that correct?

Note: What other OS packages do with respect to integration of system provided
root store aside, there are other considerations too:

- POLA with respect to default (as provided by certifi) behaviour
- Consistency with upstream documentation
- Alternative options that may be documented upstream for integrating
additional trust stores (I haven't looked)
--
You are receiving this mail because:
You are on the CC list for the bug.
You are the assignee for the bug.
b***@freebsd.org
2021-05-24 07:59:10 UTC
Permalink
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=251562

--- Comment #3 from Andreas Strauch <***@hotmail.com> ---
(In reply to Kubilay Kocak from comment #2)

Yes, correct. IMHO it would be beneficial to have certifi use the system
provided root store. For the sake of security, the main goal should be to
encourage as much usage of TLS as possible.

As an example: my actual use case is about using certbot. I have the
'py37-certbot' and 'py37-certbot-nginx' packages installed because I run my own
ACME server at home. Of course my own ACME server does not have a TLS
certificate that could be found in official root stores. I have to add the TLS
root certificate of my 'personal little enterprise' to the system provided root
store. It is a little bit of extra work, but still no problem.

Now, my concern is that if 'private' TLS root certificates have to be added in
multiple places, it might make the case for not bothering and rely on the
'--no-verify-ssl' options (and equivalents) out there. It unnecessarily raises
the bar on both complexity and effort to use TLS and as such, undermines the
maximum possible speed in which TLS is being used by everybody.

Last but not least, I must admit that I know nothing about Python really and I
don't know the magnitude of implications involved to make such change.
Regardless, I will be happy to help where I can. Please put me in the direction
of tasks to be done and I will try my best.
--
You are receiving this mail because:
You are the assignee for the bug.
You are on the CC list for the bug.
Loading...