-
Notifications
You must be signed in to change notification settings - Fork 462
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
"CryptographyDeprecationWarning: Parsed a negative serial number, which is disallowed by RFC 5280" #656
Comments
It was added here:
Basically @pyca says "we don't like it so we're loud about it" but it was actually deemed correct to add that and keep it maintained (originally only "for some time" until all such certs get phased out, but it now seems there are some of these hardcoded in more root stores than originally thought, so I don't see them going away anytime soon…), what I don't like is the "Loading this certificate will cause an exception in the next release of cryptography" wording as no matter how I look at it, it's not true and should have been worded otherwise. Anyways it's going away at some point so it's good it raises warnings for now, to draw more attention to the issue… More info:
So basically, yea, if there are no plans depending on |
Hello. Same observavtion while executing |
Hi ! I agree that this a problem, but there isn't much that SSLyze can do about it - it's up to pyca. I would argue that they shouldn't remove support for negative serial numbers as it will break a bunch of tools (including SSLyze) for (to me) no obvious win. |
Agreed. One "problem" though is that this causes sslyze to return exit code 1 instead of 0. Can this be overriden somehow @nabla-c0d3 ? I'm currently trying to update the sslyze homebrew formula and the test steps will fail the way it is now. |
Oh! Right, a deprecation warning should not possibly exit with code:( BTW, there's finally a plan on their side, i.e. timing / being blocked on MSFT, and changing the wording to better reflect the fact:
— Originally posted by reaperhulk in pyca/cryptography#10247 (comment) |
Describe the bug
Things work as expected overall, but I get a warning, both on Mac Intel & Mac Silicon.
To Reproduce
It appears I have a reproduction with non-vagrant domains as well:
Expected behavior
Same output but without the warning.
Python environment (please complete the following information):
Additional context
Happy to provide additional output if needed!
The text was updated successfully, but these errors were encountered: