** Description changed:
[Impact]
Users of urllib3 are unable to securely access websites who's certificates
use IP based subject alternative names; this includes openstack client tooling
which uses urllib3 via requests.
[Test Case]
- TBD
+ Deploy and configure a server with TLS and an IP based SAN cert with a
locally trusted CA.
+
+ import urllib3
+
+ http = urllib3.PoolManager()
+ r = http.request('GET', 'https://192.168.1.2')
+
+ will fail
+
[Regression Potential]
Cherry picked fix comes from a later urllib3 release which has tested fine
for IP SAN usage in later OpenStack release deployments.
[Original Bug Report]
urllib3 fails to validate certificates with IP address based SAN's.
Fixed upstream:
https://github.com/urllib3/urllib3/commit/c74bd70c3a97e30f0560bee9b7fa1bfc767ebf0b
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1771988
Title:
certificate validation with IP address based SAN's fails
To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-archive/+bug/1771988/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs