Paul Rubin wrote:
> John Nagle <[EMAIL PROTECTED]> writes:
>
>>The reason this now matters is that new "high assurance" certs,
>>the ones that tell you how much a site can be trusted, are now being
>>deployed,
>
>
> Oh my, I hadn't heard about this. They come up with new scams all the
> time. I guess I'll check for info. It sounds sort of like the terror
> alert system, which tells us how scared to be on any particular day ;-)
Anyway, I've submitted it as a Python bug report:
[1583946] SSL "issuer" and "server" functions problems - security
And for the record, here's a workaround: do a split with this
regular expression:
pparsecertstringre = re.compile(
r"""(?:/)(\w(?:\w|))(?:=)""")
You'll get lists of the form
['', key1, value1, key2, value2 ...]
This isn't totally unspoofable, and won't work for Unicode certs,
but it works for the few dozen common certs I've run through it.
John Nagle
Animats
--
http://mail.python.org/mailman/listinfo/python-list