Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:72113 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 23513 invoked from network); 3 Feb 2014 20:09:20 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 3 Feb 2014 20:09:20 -0000 Authentication-Results: pb1.pair.com header.from=rdlowrey@gmail.com; sender-id=pass Authentication-Results: pb1.pair.com smtp.mail=rdlowrey@gmail.com; spf=pass; sender-id=pass Received-SPF: pass (pb1.pair.com: domain gmail.com designates 209.85.223.171 as permitted sender) X-PHP-List-Original-Sender: rdlowrey@gmail.com X-Host-Fingerprint: 209.85.223.171 mail-ie0-f171.google.com Received: from [209.85.223.171] ([209.85.223.171:32930] helo=mail-ie0-f171.google.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id 38/40-35654-E67FFE25 for ; Mon, 03 Feb 2014 15:09:19 -0500 Received: by mail-ie0-f171.google.com with SMTP id as1so6684561iec.16 for ; Mon, 03 Feb 2014 12:09:16 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:date:message-id:subject :from:to:content-type; bh=LrD7atjBgdFdnTg3BiSbaG8HEHww/rhpQMUAGaAhfw4=; b=sxCMgWWjvwvrvLnyYrm76UxCMP/3WFkKtyr4vfX+eFlMBQ8sAXl1/caQUPiIL1xitf EnUCu5FhRmb7EIuBCRwgUOEGpecSx0mD0FrV79APlWCyaoYjUEKR0PKOR8GyZioCWFKw kTFxQicWdbXpTDjTfyMRLgRmiEtHZ1jdh939H7w6EoHk0ZvWOh13mUWk2Ui4zMvhG36a C47DUDxbI6GPkn3azk0afYISgDCW/Cun2S5Kl6D3fRboSKuNNt5URJU8toMhEkhH2Msy Kx4/1jWhT2ubHc9NfZE5Ua/19tBLdeoTPVQBN9cUy0Uy037GnwU6Qc3CtYDidAY7LtxS 9Zcg== MIME-Version: 1.0 X-Received: by 10.43.155.84 with SMTP id lh20mr1745073icc.81.1391458156368; Mon, 03 Feb 2014 12:09:16 -0800 (PST) Sender: rdlowrey@gmail.com Received: by 10.50.29.140 with HTTP; Mon, 3 Feb 2014 12:09:16 -0800 (PST) In-Reply-To: References: Date: Mon, 3 Feb 2014 15:09:16 -0500 X-Google-Sender-Auth: RcpM_uUQAeS9sDDNU7qdJXTtEGM Message-ID: To: "internals@lists.php.net" Content-Type: multipart/alternative; boundary=001a11c2d3de21d08604f18619dc Subject: Re: [PHP-DEV] Re: Improved TLS Defaults From: rdlowrey@php.net (Daniel Lowrey) --001a11c2d3de21d08604f18619dc Content-Type: text/plain; charset=ISO-8859-1 I forgot to mention it, but I've also added another function to the Improved TLS Defaults RFC: openssl_get_cert_locations() This should make it easier to debug CA file issues by coalescing all the locations where PHP might look for a CA cert in one place. The new function allows easier debugging as well as tooling to check if existing php.ini settings or OS-assigned defaults can locate CA files are appropriate to allow secure peer verification. The update can be seen here: https://wiki.php.net/rfc/improved-tls-defaults#expose_default_cert_paths --001a11c2d3de21d08604f18619dc--