2015-11-04 12:01:55 +00:00
|
|
|
Metadata-Version: 2.0
|
|
|
|
Name: certifi
|
2015-11-23 21:13:53 +00:00
|
|
|
Version: 2015.11.20
|
2015-11-04 12:01:55 +00:00
|
|
|
Summary: Python package for providing Mozilla's CA Bundle.
|
|
|
|
Home-page: http://certifi.io/
|
|
|
|
Author: Kenneth Reitz
|
|
|
|
Author-email: me@kennethreitz.com
|
|
|
|
License: ISC
|
|
|
|
Platform: UNKNOWN
|
|
|
|
Classifier: Development Status :: 5 - Production/Stable
|
|
|
|
Classifier: Intended Audience :: Developers
|
|
|
|
Classifier: Natural Language :: English
|
|
|
|
Classifier: Programming Language :: Python
|
|
|
|
Classifier: Programming Language :: Python :: 2.5
|
|
|
|
Classifier: Programming Language :: Python :: 2.6
|
|
|
|
Classifier: Programming Language :: Python :: 2.7
|
|
|
|
Classifier: Programming Language :: Python :: 3.0
|
|
|
|
Classifier: Programming Language :: Python :: 3.1
|
|
|
|
Classifier: Programming Language :: Python :: 3.2
|
|
|
|
Classifier: Programming Language :: Python :: 3.3
|
|
|
|
Classifier: Programming Language :: Python :: 3.4
|
|
|
|
|
|
|
|
Certifi: Python SSL Certificates
|
|
|
|
================================
|
|
|
|
|
|
|
|
`Certifi`_ is a carefully curated collection of Root Certificates for
|
|
|
|
validating the trustworthiness of SSL certificates while verifying the identity
|
|
|
|
of TLS hosts. It has been extracted from the `Requests`_ project.
|
|
|
|
|
|
|
|
Installation
|
|
|
|
------------
|
|
|
|
|
2015-11-23 21:13:53 +00:00
|
|
|
``certifi`` is available on PyPI. Simply install it with ``pip``::
|
2015-11-04 12:01:55 +00:00
|
|
|
|
|
|
|
$ pip install certifi
|
|
|
|
|
|
|
|
Usage
|
|
|
|
-----
|
|
|
|
|
|
|
|
To reference the installed CA Bundle, you can use the built-in function::
|
|
|
|
|
|
|
|
>>> import certifi
|
|
|
|
|
|
|
|
>>> certifi.where()
|
|
|
|
'/usr/local/lib/python2.7/site-packages/certifi/cacert.pem'
|
|
|
|
|
|
|
|
Enjoy!
|
|
|
|
|
2015-11-23 21:13:53 +00:00
|
|
|
1024-bit Root Certificates
|
|
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
|
|
|
|
Browsers and certificate authorities have concluded that 1024-bit keys are
|
|
|
|
unacceptably weak for certificates, particularly root certificates. For this
|
|
|
|
reason, Mozilla has removed any weak (i.e. 1024-bit key) certificate from its
|
|
|
|
bundle, replacing it with an equivalent strong (i.e. 2048-bit or greater key)
|
|
|
|
certifiate from the same CA. Because Mozilla removed these certificates from
|
|
|
|
its bundle, ``certifi`` removed them as well.
|
|
|
|
|
|
|
|
Unfortunately, old versions of OpenSSL (less than 1.0.2) sometimes fail to
|
|
|
|
validate certificate chains that use the strong roots. For this reason, if you
|
|
|
|
fail to validate a certificate using the ``certifi.where()`` mechanism, you can
|
|
|
|
intentionally re-add the 1024-bit roots back into your bundle by calling
|
|
|
|
``certifi.old_where()`` instead. This is not recommended in production: if at
|
|
|
|
all possible you should upgrade to a newer OpenSSL. However, if you have no
|
|
|
|
other option, this may work for you.
|
|
|
|
|
2015-11-04 12:01:55 +00:00
|
|
|
.. _`Certifi`: http://certifi.io/en/latest/
|
|
|
|
.. _`Requests`: http://docs.python-requests.org/en/latest/
|
|
|
|
|
|
|
|
|