diff options
author | Donald Stufft <donald@stufft.io> | 2014-03-24 19:28:08 -0400 |
---|---|---|
committer | Donald Stufft <donald@stufft.io> | 2014-03-24 19:28:08 -0400 |
commit | eaeb955f4818896bd552770d55affabeab066836 (patch) | |
tree | ab4ca56479612bcc54042cc793a3caf7a68a0507 | |
parent | 1d29cc5b6c72afc8e310f99e8245de78493553b9 (diff) | |
parent | 4137465bf546964736e45bed16a15d05000b26e8 (diff) | |
download | cpython-git-eaeb955f4818896bd552770d55affabeab066836.tar.gz |
Merge in 3.4 to bring forward the Issue #21043 changes.
-rw-r--r-- | Doc/library/ssl.rst | 17 | ||||
-rw-r--r-- | Misc/NEWS | 3 |
2 files changed, 6 insertions, 14 deletions
diff --git a/Doc/library/ssl.rst b/Doc/library/ssl.rst index 9b74ccf283..94a0c81904 100644 --- a/Doc/library/ssl.rst +++ b/Doc/library/ssl.rst @@ -1339,20 +1339,9 @@ If you are going to require validation of the other side of the connection's certificate, you need to provide a "CA certs" file, filled with the certificate chains for each issuer you are willing to trust. Again, this file just contains these chains concatenated together. For validation, Python will use the first -chain it finds in the file which matches. Some "standard" root certificates are -available from various certification authorities: `CACert.org -<http://www.cacert.org/index.php?id=3>`_, `Thawte -<http://www.thawte.com/roots/>`_, `Verisign -<http://www.verisign.com/support/roots.html>`_, `Positive SSL -<http://www.PositiveSSL.com/ssl-certificate-support/cert_installation/UTN-USERFirst-Hardware.crt>`_ -(used by python.org), `Equifax and GeoTrust -<http://www.geotrust.com/resources/root_certificates/index.asp>`_. - -In general, if you are using SSL3 or TLS1, you don't need to put the full chain -in your "CA certs" file; you only need the root certificates, and the remote -peer is supposed to furnish the other certificates necessary to chain from its -certificate to a root certificate. See :rfc:`4158` for more discussion of the -way in which certification chains can be built. +chain it finds in the file which matches. The platform's certificates file can +be used by calling :meth:`SSLContext.load_default_certs`, this is done +automatically with :func:`.create_default_context`. Combined key and certificate ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ @@ -104,6 +104,9 @@ Library Documentation ------------- +- Issue #21043: Remove the recommendation for specific CA organizations and to + mention the ability to load the OS certificates. + - Issue #20765: Add missing documentation for PurePath.with_name() and PurePath.with_suffix(). |