Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:69584 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 66591 invoked from network); 16 Oct 2013 14:30:17 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 16 Oct 2013 14:30:17 -0000 Authentication-Results: pb1.pair.com header.from=me@evancoury.com; sender-id=unknown Authentication-Results: pb1.pair.com smtp.mail=me@evancoury.com; spf=permerror; sender-id=unknown Received-SPF: error (pb1.pair.com: domain evancoury.com from 209.85.216.51 cause and error) X-PHP-List-Original-Sender: me@evancoury.com X-Host-Fingerprint: 209.85.216.51 mail-qa0-f51.google.com Received: from [209.85.216.51] ([209.85.216.51:34713] helo=mail-qa0-f51.google.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id F9/47-31591-8F2AE525 for ; Wed, 16 Oct 2013 10:30:16 -0400 Received: by mail-qa0-f51.google.com with SMTP id ii20so687378qab.17 for ; Wed, 16 Oct 2013 07:30:13 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-type; bh=IlxX6B538jTmmUlMBLg1IWzB1Nx1BhitdoRRee9+oFo=; b=e6TjzUdVtyq0bDqeGVQORIPFWuKsFKj7dHyXvvDbWkJ/A/UwvyFmwAGZ2Hr9QqlcEc COoTEFMPaQHjWQCGA7/uzbot34aoG1+NHqjPQcLF3mVvCIgiu9pO0SFnptDyccOBKy3A P5DpCI3St+y7wE+DPPJp8AVj8m4Y28oZQA9CyhZdjh2GeNAPNM98vPUnEXFqNupp785W 44saKGfco2jlcHQ5ufyo2Ruf7p0joglJXlgxgNNFsJsW/ihm4EB09bqWOZbjkKRDLz9s /ceNz4o0fa+rXtLmjY9chFZ8aJvkhw1TIwlshtVL70GKXfUh0nzhGbSqB8hVufiw/D5J /p8A== X-Gm-Message-State: ALoCoQnBATWEO3z4ZKf5zSC6S7lblpp9rj8eZYRB7YL7+Ck84Q/zZNu3Cgn4KgXGmJQ8FoguDWyQ X-Received: by 10.224.167.206 with SMTP id r14mr5180113qay.4.1381933813197; Wed, 16 Oct 2013 07:30:13 -0700 (PDT) Received: from mail-qc0-x230.google.com (mail-qc0-x230.google.com [2607:f8b0:400d:c01::230]) by mx.google.com with ESMTPSA id og1sm121447576qeb.3.1969.12.31.16.00.00 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Wed, 16 Oct 2013 07:30:11 -0700 (PDT) Received: by mail-qc0-f176.google.com with SMTP id t7so652789qcv.7 for ; Wed, 16 Oct 2013 07:30:11 -0700 (PDT) X-Received: by 10.224.151.82 with SMTP id b18mr451491qaw.125.1381933811469; Wed, 16 Oct 2013 07:30:11 -0700 (PDT) MIME-Version: 1.0 Received: by 10.49.119.167 with HTTP; Wed, 16 Oct 2013 07:29:51 -0700 (PDT) In-Reply-To: References: Date: Wed, 16 Oct 2013 07:29:51 -0700 Message-ID: To: Daniel Lowrey Cc: "internals@lists.php.net" Content-Type: multipart/alternative; boundary=089e0149ced6efaa3404e8dc89d2 Subject: Re: [PHP-DEV] [RFC] TLS Peer Verification From: me@evancoury.com (Evan Coury) --089e0149ced6efaa3404e8dc89d2 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable On Wed, Oct 16, 2013 at 6:38 AM, Daniel Lowrey wrote: > To those interested, a patch enabling TLS peer verification by default fo= r > client streams is now available here: > > https://wiki.php.net/rfc/tls-peer-verification > > I just wanted to say thank you for taking the time to do put this RFC and pull request together. It makes me happy to see movement in this direction =E2=80=94 I think it goes without saying how desperately we need improvemen= ts and consistency in this area. As mentioned in the RFC, having global defaults in the ini will be perfect for distribution package maintainers. Thanks again, -- Evan Coury --089e0149ced6efaa3404e8dc89d2--