-
Notifications
You must be signed in to change notification settings - Fork 177
TLS fingerprints (2.1) #106
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
untitaker
commented
Aug 20, 2014
- Write tests
- Wait for allow performing *only* fingerprint verification urllib3/urllib3#444
- Wait for use built-in ssl module (v2) pallets/werkzeug#565 -- use git version
- Wait for kennethreitz/requests#2192 -- worked around it
|
Sorry for the spam. So i guess any changes can be filed against this branch. |
|
Maybe https://pypi.python.org/pypi/pytest-localserver can be used. |
|
pytest-localserver depends on pyOpenSSL, are you fine with this? |
|
I don't care that much about the deps of the testsuite, so i'm fine with that. On Wed, Aug 20, 2014 at 12:25:13PM -0700, Thomas Weißschuh wrote:
|
|
@t-8ch Should i add you as a collaborator so you can push directly to this? (Please don't merge yet though) |
|
@untitaker It turns out, that the current fingerprint logic only checks fingerprints if it also validates the certficate itself (If it is trusted by a CA, not if the name matches, which is rather broken). |
|
@t-8ch I added you as a collaborator. I'd like to make this work regardless of the version of requests installed. If you have created a PR for requests, please post here then. |
|
Blocked on urllib3/urllib3#444 |
|
So the end user has to set |
|
I renamed this to |
|
currently |
|
I mean, assuming we are running a urllib3 version with your PR merged. |
|
Yes, then you would set |
I'd rather keep as strict defaults as possible. |
|
I added some tests, but they fail on my machine. I am able to start a local server using the CLI of |
|
I confused |
|
My fault -- a different test didn't properly clean up after monkeypatching. |
|
The issue in urllib3 has been fixed and released in requests 2.4.0. We can depend on the old version of werkzeug requiring pyopenssl and later switch to the new one. |
|
The testsuite is now blocked on kennethreitz/requests#2192 |
|
We can't depend on a old version of Werkzeug, neither work with Py3. |
|
Ah nvm i see you already commited something. Well, that's a solution too. |
|
Actually i fixed the issue with requests by simply catching more errors: vdirsyncer/owncloud-testserver@6499b76 |
|
Is there anything stopping this PR now? |
|
|
Version 0.3.0 ============= *released on 20 September 2014* - Add ``verify_fingerprint`` parameter to :py:class:`vdirsyncer.storage.HttpStorage`, :py:class:`vdirsyncer.storage.CaldavStorage` and :py:class:`vdirsyncer.storage.CarddavStorage`, see issue `#99`_ and pull request `#106`_. - Add ``passwordeval`` parameter to :ref:`general_config`, see issue `#108`_ and pull request `#117`_. - Emit warnings (instead of exceptions) about certain invalid responses from the server, see issue `#113`_. This is apparently required for compatibility with Davmail. .. _`#99`: pimutils/vdirsyncer#99 .. _`#106`: pimutils/vdirsyncer#106 .. _`#108`: pimutils/vdirsyncer#108 .. _`#113`: pimutils/vdirsyncer#113 .. _`#117`: pimutils/vdirsyncer#117
Version 0.3.0 ============= *released on 20 September 2014* - Add ``verify_fingerprint`` parameter to :py:class:`vdirsyncer.storage.HttpStorage`, :py:class:`vdirsyncer.storage.CaldavStorage` and :py:class:`vdirsyncer.storage.CarddavStorage`, see issue `#99`_ and pull request `#106`_. - Add ``passwordeval`` parameter to :ref:`general_config`, see issue `#108`_ and pull request `#117`_. - Emit warnings (instead of exceptions) about certain invalid responses from the server, see issue `#113`_. This is apparently required for compatibility with Davmail. .. _`#99`: pimutils/vdirsyncer#99 .. _`#106`: pimutils/vdirsyncer#106 .. _`#108`: pimutils/vdirsyncer#108 .. _`#113`: pimutils/vdirsyncer#113 .. _`#117`: pimutils/vdirsyncer#117