This file is indexed.

/usr/lib/python3/dist-packages/certifi-2015.11.20.1.egg-info/PKG-INFO is in python3-certifi 2015.11.20.1-2.

This file is owned by root:root, with mode 0o644.

The actual contents of the file can be viewed below.

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
Metadata-Version: 1.1
Name: certifi
Version: 2015.11.20.1
Summary: Python package for providing Mozilla's CA Bundle.
Home-page: http://certifi.io/
Author: Kenneth Reitz
Author-email: me@kennethreitz.com
License: ISC
Description: Certifi: Python SSL Certificates
        ================================
        
        `Certifi`_ is a carefully curated collection of Root Certificates for
        validating the trustworthiness of SSL certificates while verifying the identity
        of TLS hosts. It has been extracted from the `Requests`_ project.
        
        Installation
        ------------
        
        ``certifi`` is available on PyPI. Simply install it with ``pip``::
        
            $ pip install certifi
        
        Usage
        -----
        
        To reference the installed CA Bundle, you can use the built-in function::
        
            >>> import certifi
        
            >>> certifi.where()
            '/usr/local/lib/python2.7/site-packages/certifi/cacert.pem'
        
        Enjoy!
        
        1024-bit Root Certificates
        ~~~~~~~~~~~~~~~~~~~~~~~~~~
        
        Browsers and certificate authorities have concluded that 1024-bit keys are
        unacceptably weak for certificates, particularly root certificates. For this
        reason, Mozilla has removed any weak (i.e. 1024-bit key) certificate from its
        bundle, replacing it with an equivalent strong (i.e. 2048-bit or greater key)
        certifiate from the same CA. Because Mozilla removed these certificates from
        its bundle, ``certifi`` removed them as well.
        
        Unfortunately, old versions of OpenSSL (less than 1.0.2) sometimes fail to
        validate certificate chains that use the strong roots. For this reason, if you
        fail to validate a certificate using the ``certifi.where()`` mechanism, you can
        intentionally re-add the 1024-bit roots back into your bundle by calling
        ``certifi.old_where()`` instead. This is not recommended in production: if at
        all possible you should upgrade to a newer OpenSSL. However, if you have no
        other option, this may work for you.
        
        .. _`Certifi`: http://certifi.io/en/latest/
        .. _`Requests`: http://docs.python-requests.org/en/latest/
        
Platform: UNKNOWN
Classifier: Development Status :: 5 - Production/Stable
Classifier: Intended Audience :: Developers
Classifier: Natural Language :: English
Classifier: Programming Language :: Python
Classifier: Programming Language :: Python :: 2.5
Classifier: Programming Language :: Python :: 2.6
Classifier: Programming Language :: Python :: 2.7
Classifier: Programming Language :: Python :: 3.0
Classifier: Programming Language :: Python :: 3.1
Classifier: Programming Language :: Python :: 3.2
Classifier: Programming Language :: Python :: 3.3
Classifier: Programming Language :: Python :: 3.4