Metadata-Version: 2.0 Name: certifi Version: 2017.11.5 Summary: Python package for providing Mozilla's CA Bundle. Home-page: http://certifi.io/ Author: Kenneth Reitz Author-email: me@kennethreitz.com License: MPL-2.0 Platform: UNKNOWN Classifier: Development Status :: 5 - Production/Stable Classifier: Intended Audience :: Developers Classifier: Natural Language :: English Classifier: Programming Language :: Python Classifier: Programming Language :: Python :: 2 Classifier: Programming Language :: Python :: 2.6 Classifier: Programming Language :: Python :: 2.7 Classifier: Programming Language :: Python :: 3 Classifier: Programming Language :: Python :: 3.3 Classifier: Programming Language :: Python :: 3.4 Classifier: Programming Language :: Python :: 3.5 Classifier: Programming Language :: Python :: 3.6 Certifi: Python SSL Certificates ================================ `Certifi`_ is a carefully curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. It has been extracted from the `Requests`_ project. Installation ------------ ``certifi`` is available on PyPI. Simply install it with ``pip``:: $ pip install certifi Usage ----- To reference the installed certificate authority (CA) bundle, you can use the built-in function:: >>> import certifi >>> certifi.where() '/usr/local/lib/python2.7/site-packages/certifi/cacert.pem' Enjoy! 1024-bit Root Certificates ~~~~~~~~~~~~~~~~~~~~~~~~~~ Browsers and certificate authorities have concluded that 1024-bit keys are unacceptably weak for certificates, particularly root certificates. For this reason, Mozilla has removed any weak (i.e. 1024-bit key) certificate from its bundle, replacing it with an equivalent strong (i.e. 2048-bit or greater key) certificate from the same CA. Because Mozilla removed these certificates from its bundle, ``certifi`` removed them as well. Unfortunately, old versions of OpenSSL (less than 1.0.2) sometimes fail to validate certificate chains that use the strong roots. For this reason, if you fail to validate a certificate using the ``certifi.where()`` mechanism, you can intentionally re-add the 1024-bit roots back into your bundle by calling ``certifi.old_where()`` instead. This is not recommended in production: if at all possible you should upgrade to a newer OpenSSL. However, if you have no other option, this may work for you. .. _`Certifi`: http://certifi.io/en/latest/ .. _`Requests`: http://docs.python-requests.org/en/latest/