Description
While looking at the MicroPython Requests module (on the git HEAD), I noticed this nightmare:
context = tls.SSLContext(tls.PROTOCOL_TLS_CLIENT)
context.verify_mode = tls.CERT_NONE
s = context.wrap_socket(s, server_hostname=host)
Assuming that it has the same meaning in MicroPython as cPython (I haven't checked), that line in the middle totally disables TLS security. The attacker pretending to be the server can send any certificate they like, and the client will blindly accept it.
If people are using HTTPS as "the new HTTP", and are happy with the HTTP you-get-no-security model, that's fine. But anyone relying on HTTPS for security, and expecting the normal level of security you'd get from HTTPS, is going to be in trouble.
At a minimum this should be documented clearly on the MicroPython requests documentation ... which doesn't seem to exist anywhere?
Ideally, MicroPython should default to a proper secure HTTPS implementation, including certificate verification, and have a way to opt-out.