]> sipb.mit.edu Git - ikiwiki.git/blobdiff - doc/bugs/ssl_certificates_not_checked_with_openid.mdwn
Replace weirdness section with link to Debian bug report.
[ikiwiki.git] / doc / bugs / ssl_certificates_not_checked_with_openid.mdwn
index 2dc74a984e3e088cb0e8ad9a6f6bc7ee436bf00f..80390622a12bdffa5ee54d403eff1c2bd635b020 100644 (file)
@@ -65,4 +65,19 @@ significantly harder than the network based attacks."
 
 With regards to implementation, I am surprised that the libraries don't seem to
 do this checking, already, and by default. Unfortunately, I am not sure how to test
-this adequately, see <http://bugs.debian.org/466055>. -- Brian May
+this adequately, see [[!debbug 466055]]. -- Brian May
+
+--- 
+
+I think [[!cpan Crypt::SSLeay]] already supports checking the certificate. The trick
+is to get [[!cpan LWP::UserAgent]], which is used by [[!cpan LWPx::ParanoidAgent]] to
+enable this checking.
+
+I think the trick is to set on of the the following environment variables before retrieving
+the data:
+
+$ENV{HTTPS\_CA\_DIR} = "/etc/ssl/certs/";  
+$ENV{HTTPS\_CA\_FILE} = "/etc/ssl/certs/file.pem";  
+
+Unfortunately I get weird results if the certificate verification fails [[!debbug 503440]].
+It still seems to work though, regardless.