You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When trying the URI https://www.cs.odu.edu, which is a valid URI-R, MementoEmbed displays the error MementoEmbed could not reach the server to download https://www.cs.odu.edu.
In response, the application logs this message:
[2018-07-07 00:44:45,922] WARNING in __init__: The server for URI-M https://www.cs.odu.edu could not be reached, details: HTTPSConnectionPool(host='www.cs.odu.edu', port=443): Max retries exceeded with url: / (Caused by SSLError(SSLError(1, '[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:841)'),))
This is because the certificate authority is not registered with certifi, the package that requests uses to do certificate verification. The certifi package gets its certificates from the Mozilla Included CA Certificate List.
The application has no issues with HTTPS URIs with domains that correspond to trusted certificates (e.g., https://www.google.com, https://www.odu.edu, https://www.washingtonpost.com).
Certificates can be ignored by passing verify=False to requests.get. Here is an example from the requests documentation:
When trying the URI https://www.cs.odu.edu, which is a valid URI-R, MementoEmbed displays the error
MementoEmbed could not reach the server to download https://www.cs.odu.edu
.In response, the application logs this message:
This is because the certificate authority is not registered with
certifi
, the package thatrequests
uses to do certificate verification. Thecertifi
package gets its certificates from the Mozilla Included CA Certificate List.The application has no issues with HTTPS URIs with domains that correspond to trusted certificates (e.g.,
https://www.google.com
,https://www.odu.edu
,https://www.washingtonpost.com
).Certificates can be ignored by passing
verify=False
torequests.get
. Here is an example from therequests
documentation:This is easy to centralize thanks to changes included from pull request #92.
At a minimum, the error message displayed to the user should change and I am already working on an interface update.
The question is, should we ignore all certificate verification issues?
The text was updated successfully, but these errors were encountered: