
Security News
Follow-up and Clarification on Recent Malicious Ruby Gems Campaign
A clarification on our recent research investigating 60 malicious Ruby gems.
A Community-updated Net::HTTP
certificate authority file hack. Very useful for
authoring Ruby-based HTTP clients that must run on Windows.
Get rid of this lovely error for good, especially on Windows:
SSL_connect returned=1 errno=0 state=SSLv3 read server certificate B: certificate verify failed
No more / (╯°□°)╯︵ ┻━┻
!
This gem basically configures Net::HTTP to use a certificate authority PEM file downloaded from the cURL project and included directly into the gem. This requires that you periodically update this gem as we do.
Add to your Gemfile
:
gem 'net_http_ssl_fix', require: 'net_http_ssl_fix'
Then run bundle install
.
No more :cry:.
cacert.pem
Every now and then, you may get the SSL_connect
error again, especially if you
don't make any attempts to update your install of this gem.
In the event that this gem isn't updated with the latest cacert.pem
from the
cURL project, you can submit a pull request with the file at data/cacert.pem
replaced with a freshly-downloaded version from this URL:
https://curl.haxx.se/ca/cacert.pem
This tiny gem is indebted to John Bachir, particularly his Earth-shattering Gist, How to set the certificate file for Net::HTTP library-wide.
The MIT License (MIT)
Copyright (c) 2016-2018 Minimal Orange, LLC
FAQs
Unknown package
We found that net_http_ssl_fix demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
A clarification on our recent research investigating 60 malicious Ruby gems.
Security News
ESLint now supports parallel linting with a new --concurrency flag, delivering major speed gains and closing a 10-year-old feature request.
Research
/Security News
A malicious Go module posing as an SSH brute forcer exfiltrates stolen credentials to a Telegram bot controlled by a Russian-speaking threat actor.