METADATA 2.3 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768
  1. Metadata-Version: 2.0
  2. Name: certifi
  3. Version: 2017.4.17
  4. Summary: Python package for providing Mozilla's CA Bundle.
  5. Home-page: http://certifi.io/
  6. Author: Kenneth Reitz
  7. Author-email: me@kennethreitz.com
  8. License: ISC
  9. Platform: UNKNOWN
  10. Classifier: Development Status :: 5 - Production/Stable
  11. Classifier: Intended Audience :: Developers
  12. Classifier: Natural Language :: English
  13. Classifier: Programming Language :: Python
  14. Classifier: Programming Language :: Python :: 2.6
  15. Classifier: Programming Language :: Python :: 2.7
  16. Classifier: Programming Language :: Python :: 3.3
  17. Classifier: Programming Language :: Python :: 3.4
  18. Classifier: Programming Language :: Python :: 3.5
  19. Certifi: Python SSL Certificates
  20. ================================
  21. `Certifi`_ is a carefully curated collection of Root Certificates for
  22. validating the trustworthiness of SSL certificates while verifying the identity
  23. of TLS hosts. It has been extracted from the `Requests`_ project.
  24. Installation
  25. ------------
  26. ``certifi`` is available on PyPI. Simply install it with ``pip``::
  27. $ pip install certifi
  28. Usage
  29. -----
  30. To reference the installed certificate authority (CA) bundle, you can use the
  31. built-in function::
  32. >>> import certifi
  33. >>> certifi.where()
  34. '/usr/local/lib/python2.7/site-packages/certifi/cacert.pem'
  35. Enjoy!
  36. 1024-bit Root Certificates
  37. ~~~~~~~~~~~~~~~~~~~~~~~~~~
  38. Browsers and certificate authorities have concluded that 1024-bit keys are
  39. unacceptably weak for certificates, particularly root certificates. For this
  40. reason, Mozilla has removed any weak (i.e. 1024-bit key) certificate from its
  41. bundle, replacing it with an equivalent strong (i.e. 2048-bit or greater key)
  42. certificate from the same CA. Because Mozilla removed these certificates from
  43. its bundle, ``certifi`` removed them as well.
  44. Unfortunately, old versions of OpenSSL (less than 1.0.2) sometimes fail to
  45. validate certificate chains that use the strong roots. For this reason, if you
  46. fail to validate a certificate using the ``certifi.where()`` mechanism, you can
  47. intentionally re-add the 1024-bit roots back into your bundle by calling
  48. ``certifi.old_where()`` instead. This is not recommended in production: if at
  49. all possible you should upgrade to a newer OpenSSL. However, if you have no
  50. other option, this may work for you.
  51. .. _`Certifi`: http://certifi.io/en/latest/
  52. .. _`Requests`: http://docs.python-requests.org/en/latest/