Skip to content

Fixes #325, #318 - don't download cacert.pem#328

Merged
juliandunn merged 1 commit intomasterfrom
jtimberman/use-default-ca-bundle
Feb 24, 2015
Merged

Fixes #325, #318 - don't download cacert.pem#328
juliandunn merged 1 commit intomasterfrom
jtimberman/use-default-ca-bundle

Conversation

@jtimberman
Copy link

This addresses both concerns of #318 and #325. We were downloading the
SSL CA bundle over http because at the point in time when we wanted to
even do that we might not have been in a state where the SSL
certificates from curl.haxx.se could be verified. Using http is just
as good at that point as using SSL without verification. However...

This addresses the concern raised in #325, whereby the upstream
cacert.pem removed certificates used by services such as AWS S3,
causing SSL connections to those sites to fail to verify. We should
rely on the ca-bundle.crt that comes with the openssl package on the
platforms in question (centos/fedora).

This addresses both concerns of #318 and #325. We were downloading the
SSL CA bundle over http because at the point in time when we wanted to
even do that we might not have been in a state where the SSL
certificates from curl.haxx.se could be verified. Using http is just
as good at that point as using SSL without verification. However...

This addresses the concern raised in #325, whereby the upstream
cacert.pem removed certificates used by services such as AWS S3,
causing SSL connections to those sites to fail to verify. We should
rely on the ca-bundle.crt that comes with the openssl package on the
platforms in question (centos/fedora).
@jtimberman
Copy link
Author

@juliandunn Here we go.

juliandunn added a commit that referenced this pull request Feb 24, 2015
@juliandunn juliandunn merged commit 8f09552 into master Feb 24, 2015
@jtimberman jtimberman deleted the jtimberman/use-default-ca-bundle branch February 24, 2015 18:21
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants