Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:72338 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 74830 invoked from network); 6 Feb 2014 13:55:41 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 6 Feb 2014 13:55:41 -0000 Authentication-Results: pb1.pair.com smtp.mail=rdlowrey@gmail.com; spf=pass; sender-id=pass Authentication-Results: pb1.pair.com header.from=rdlowrey@gmail.com; sender-id=pass Received-SPF: pass (pb1.pair.com: domain gmail.com designates 209.85.213.171 as permitted sender) X-PHP-List-Original-Sender: rdlowrey@gmail.com X-Host-Fingerprint: 209.85.213.171 mail-ig0-f171.google.com Received: from [209.85.213.171] ([209.85.213.171:48485] helo=mail-ig0-f171.google.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id 0A/81-00209-B5493F25 for ; Thu, 06 Feb 2014 08:55:39 -0500 Received: by mail-ig0-f171.google.com with SMTP id uy17so15676020igb.4 for ; Thu, 06 Feb 2014 05:55:36 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:date:message-id:subject:from:to:content-type; bh=yWgR8Twmuo9LVU2rnW1Cao0DY2iS6sISeiSWYkNFAmE=; b=AXAaiCc7qpB2Ud1QmVO8xvg2WB+sOpmOoawDS/RQOJBzVtrOLjbNXD4pHdchTLLrtA S7Acf/gyBN+6SFgHy1pxR7WS/dt6S6AWIAON+WiCAdL4HIz+G5w/60+vUK7V6qyha4pw F+RoW8wML7UfBtEozQ3kXu6dQajYY5OafBDXV8xJoKJUPFMjShC8yHdHBWW+6gpCYy1O wXBRfMcjO0Q10MfhrhjnM3tX905hGTC/xvy3I3jbOYw1aHbG6x9OaX2TWd35yOq354X4 WThpX5+fTbFIgJ4jACcRpid1qSWWp5LMQ4yzO0cYF79BN9o8OhkaAbmw6VXbPs2e3MKm 0ZKA== MIME-Version: 1.0 X-Received: by 10.50.30.234 with SMTP id v10mr12043053igh.23.1391694935889; Thu, 06 Feb 2014 05:55:35 -0800 (PST) Received: by 10.50.29.140 with HTTP; Thu, 6 Feb 2014 05:55:35 -0800 (PST) Date: Thu, 6 Feb 2014 08:55:35 -0500 Message-ID: To: "internals@lists.php.net" Content-Type: multipart/alternative; boundary=047d7bdc08aa4a21de04f1bd3a67 Subject: Re: Re: Windows Peer Verification From: rdlowrey@gmail.com (Daniel Lowrey) --047d7bdc08aa4a21de04f1bd3a67 Content-Type: text/plain; charset=ISO-8859-1 > Neither plain-text download nor unverified TLS should be used for > the trusted CA root list. What follows is more general information than an answer. I'm simply copy/pasting curl's explanation for this question. The original can be found here (http://curl.haxx.se/docs/caextract.html): Yes, pointing out that this contents is not hosted on a HTTPS site is a popular thing to do but really it doesn't help anyone, nor does it bring any news. If you don't trust the data or want to be more certain: run the script yourself. Offering the data over HTTPS would give you a chicken-and-egg problem as which CAs would you trust when you download the bundle? You're free to run your own caextract service on a HTTPS site to redeem this. The scripts and everything we use to offer data on this page are available in the curl source code tree. --047d7bdc08aa4a21de04f1bd3a67--