-
Notifications
You must be signed in to change notification settings - Fork 1.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[feature request] take back ssl binding "SSL_CTX_set_cert_store" #8675
Comments
Do you use this in conjunction with pyopenssl? If so, it would be desirable to add it as a feature there and use the binding from pyopenssl. That way we understand how it’s being used, can test for it, etc. |
@reaperhulk Yes, I use it with pyOpenSSL. And, you suggest me make a feature/pull request to pyOpenSSL project (not its dependency). Do I understand correct? If so, could you transport this issue to pyOpenSSL repository? I will change the title then. |
This is a multi-step process, so we'll need work on both sides:
First we figure out what API pyOpenSSL should have. Then we add the
binding here. Then we add that API to pyOpenSSL.
…On Thu, Apr 6, 2023 at 7:36 AM SeaHOH ***@***.***> wrote:
@reaperhulk Yes, I use it with pyOpenSSL. And, you suggestion me make a feature/pull request to pyOpenSSL project (not its dependency). Do I understand correct? If so, could you transport this issue to pyOpenSSL repository? I will change the title then.
—
Reply to this email directly, view it on GitHub, or unsubscribe.
You are receiving this because you are subscribed to this thread.Message ID: ***@***.***>
--
All that is necessary for evil to succeed is for good people to do nothing.
|
So, we donot need to transport this issue. OK, let's go on. I think a context configurable cert store will be most useful. There is already |
FWIW for @mitmproxy we're reusing one SSL.Context for all client connections. |
@mhils Thanks for your suggestion. But I think session reuse will not be work between different servers in your case. BTW, |
Having an SSL.Context.set_cert_store seems reasonable to me. Let's assume that's what we're going to do. Do you have time to implement that on the pyOpenSSL side? As Alex mentioned we need to add the binding here and then add the API in pyOpenSSL. Complicating matters a bit is that we also need to fix a pyOpenSSL test issue, but we can work around that during dev. We'll also have to have an extra branch in |
Me? I can write the funticon code, but I am not good at English as you see, I cannot use accurate/seemly wording into the code comment. And I am not a programer, write unit tests is hard to me. |
The binding has been re-added in 40.0.2 and we'll do a pyopenssl release soon to add the new method. |
New releases of pyOpenSSL did not implemented |
This issue tracks adding the appropriate binding, which is available in cryptography. Any work in pyopenssl needs to be tracked there. |
I am using
SSL_CTX_set_cert_store
which allow me could maintain only one strore. This is very convenient and functional, but removed from v40. Please, could you take it back to new releases?The text was updated successfully, but these errors were encountered: