Python requests.post证书验证失败

时间:2015-09-16 14:37:49

标签: python ssl https python-requests

我有一个python应用程序通过HTTPS连接到网页(wikis.xxx.yyy)以检索和解析数据。我可以浏览到网页,因为需要的证书链在浏览器中(我的系统使用Ubuntu 14.04 LTS)。

$ python --version
Python 2.7.6

连接呼叫:

data = requests.post(URL, data=payload) 

失败,出现以下错误:

requests.exceptions.SSLError: [Errno bad handshake] [('SSL routines', 'SSL3_GET_SERVER_CERTIFICATE', 'certificate verify failed')]

我无法使用verify=False,如果我这样做,我会收到此错误:

/usr/local/lib/python2.7/dist-packages/requests/packages/urllib3/connectionpool.py:768: InsecureRequestWarning: Unverified HTTPS request is being made. Adding certificate verification is strongly advised. See: https://urllib3.readthedocs.org/en/latest/security.html InsecureRequestWarning)

我尝试将验证中的证书作为客户端证书(http://docs.python-requests.org/en/latest/user/advanced/)传递:data = requests.post(radio_status_URL, data=payload, verify="/home/user/.cert/foo.pem") 但它没有连接,实际上也没有返回任何错误。

认为我需要将证书链安装到受信任的Ubuntu CA商店中,我按照以下说明操作:https://askubuntu.com/questions/73287/how-do-i-install-a-root-certificate 我添加的foo.cert证书具有以下格式:

-----BEGIN CERTIFICATE-----
<....>
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
<....>
-----END CERTIFICATE-----

使用openssl我可以看到证书链正常,我可以连接到wikis.xxx.yyy: - )

$ openssl s_client -CApath ~/.cert/ -connect wikis.xxx.yyy:443
CONNECTED(00000003)
depth=2 DC = local, DC = windows, CN = RIM Root CA MCA01YKF
verify return:1
depth=1 DC = net, DC = rim, CN = RIM Subordinate CA MCA03YKF
verify return:1
depth=0 C = CA, ST = Ontario, L = Waterloo, O = BlackBerry, OU = BTS Operations, CN = wikis.xxx.yyy, emailAddress = no-reply@xxx.yyy

verify return:1
---
Certificate chain
 0 s:/C=CA/ST=Ontario/L=Waterloo/O=BlackBerry/OU=BTS Operations/CN=wikis.xxx.yyy/emailAddress=no-reply@xxx.yyy
   i:/DC=net/DC=rim/CN=RIM Subordinate CA MCA03YKF
---
Server certificate
-----BEGIN CERTIFICATE-----
<...>
-----END CERTIFICATE-----
subject=/C=CA/ST=Ontario/L=Waterloo/O=BlackBerry/OU=BTS Operations/CN=wikis.xxx.yyy/emailAddress=no-reply@xxx.yyy
issuer=/DC=net/DC=rim/CN=RIM Subordinate CA MCA03YKF
---
No client certificate CA names sent
---
SSL handshake has read 1810 bytes and written 609 bytes
---
New, TLSv1/SSLv3, Cipher is RC4-SHA
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
SSL-Session:
    Protocol  : TLSv1.2
    Cipher    : RC4-SHA
    Session-ID: FFD3D3EAC3807427D2D5E5BB2D70F064E2BB14218A368676A3225FBC5E5F1078
    Session-ID-ctx: 
    Master-Key: 930FBFB110BFC861E06C6A27DEBB15C2524A86F7EFC56693F4E52BA33F0AD236E5182169039909EC1BB3DE89C4C96B2B
    Key-Arg   : None
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    Start Time: 1442413894
    Timeout   : 300 (sec)
    Verify return code: 0 (ok)

所以它的工作原理并提供了一个0的ret代码。不幸的是python无法做同样的事情,我不知道如何连接: - (

我该如何解决这个问题?

1 个答案:

答案 0 :(得分:1)

从上一个测试用例中可以看出wikis.xxx.yyy使用的是TLSv1.2,但是Requests模块需要稍加修改才能使用它。

请参阅这篇文章: https://lukasa.co.uk/2013/01/Choosing_SSL_Version_In_Requests/

有一个很好的插件可以做到这一点: https://toolbelt.readthedocs.org/en/latest/user.html#ssladapter

顺便说一句,如果您已经安装了urllib3,请求将使用它,但urllib3目前还不支持TLS v1.2。

相关问题