On 04/08/2017 15:44, Robin Becker wrote:
> ..........
>>
>> Hi Robin
>>
>> I am not sure how this is any benefit over the self-signed root certs that I 
>> now use?
>>
>> Except for the fact that these are a root cert as well and don't use any CA 
>> trust chain.
>> To be able to validate this cert, I have to load it as a CA cert on the 
>> validating side.
>> Which isn't bad perse.
>>
>> I've used openssl as mentioned here to create my certs:
>> https://docs.python.org/3.7/library/ssl.html#self-signed-certificates
> .........Welle I was thinking perhaps you had trouble with self signed certs 
> for some
> reason. I only used CA type setup because some recipe for mongo clusters 
> seems to want
> that. I think the mariadb clusters were fine with simple self signed certs. 
> However, if
> I control the cluster can I not just distribute the cert to all members and 
> have them
> validate it against itself or does python refuse to do that? I vaguely 
> remember some
> python apis allow the authority chain to be specified.

You can specify a CAcert using load_verify_locations on the ssl context. Is 
that what
you meant? I figured out that if you set that to the peer's certificate it will 
then be
accepted.  I understand it as much as "hey openssl here is a root cert that you 
should
trust if you encounter it".
Without doing this, the cert is denied on the SSL level (unless you set the ssl 
options
to no-cert-required but that is definitely not what I wanted)

Bottom line is I learned something new :)

And also that Python's standard ssl library isn't as bad as I remember it to be 
a few
years ago.  Is there still a reason to use, say, PyOpenSSL anymore?


Irmen
-- 
https://mail.python.org/mailman/listinfo/python-list

Reply via email to