https://bugzilla.redhat.com/show_bug.cgi?id=1529425

            Bug ID: 1529425
           Summary: Review Request: python3-backports-ssl_match_hostname -
                    The ssl.match_hostname() function from Python 3
           Product: Fedora
           Version: rawhide
         Component: Package Review
          Severity: medium
          Priority: medium
          Assignee: nob...@fedoraproject.org
          Reporter: carl@george.computer
        QA Contact: extras...@fedoraproject.org
                CC: package-review@lists.fedoraproject.org



Spec URL:
https://carlwgeorge.fedorapeople.org/python3-backports-ssl_match_hostname.spec
SRPM URL:
https://carlwgeorge.fedorapeople.org/python3-backports-ssl_match_hostname-3.5.0.1-1.el7.centos.src.rpm
Scratch build: https://koji.fedoraproject.org/koji/taskinfo?taskID=23926041
COPR:
https://copr.fedorainfracloud.org/coprs/carlwgeorge/python3-backports-ssl_match_hostname/

Description:
The Secure Sockets layer is only actually secure if you check the hostname in   
the certificate returned by the server to which you are connecting, and verify  
that it matches to hostname that you are trying to reach.           

But the matching logic, defined in RFC2818, can be a bit tricky to implement on 
your own. So the ssl package in the Standard Library of Python 3.2 now includes 
a match_hostname() function for performing this check instead of requiring      
every application to implement the check separately.                

This backport brings match_hostname() to users of earlier versions of Python.   
The actual code is only slightly modified from Python 3.5.

Fedora Account System Username: carlwgeorge

This is an EPEL7 only package.

-- 
You are receiving this mail because:
You are on the CC list for the bug.
You are always notified about changes to this product and component
_______________________________________________
package-review mailing list -- package-review@lists.fedoraproject.org
To unsubscribe send an email to package-review-le...@lists.fedoraproject.org

Reply via email to