aspiers has joined #rubygems
newUser1234 has quit [Remote host closed the connection]
newUser1234 has joined #rubygems
newUser1234 has quit [Read error: Connection reset by peer]
newUser1234 has joined #rubygems
yerhot has quit [Remote host closed the connection]
newUser1234 has quit [Remote host closed the connection]
newUser1234 has joined #rubygems
newUser1234 has quit [Ping timeout: 256 seconds]
newUser1234 has joined #rubygems
havenwood has joined #rubygems
newUser1234 has quit [Remote host closed the connection]
newUser1234 has joined #rubygems
newUser1234 has quit [Ping timeout: 252 seconds]
newUser1234 has joined #rubygems
azool has quit [Ping timeout: 255 seconds]
azool has joined #rubygems
havenwood has quit [Remote host closed the connection]
dvu has joined #rubygems
drbrain has quit [Quit: Goodbye]
drbrain has joined #rubygems
vanstee has joined #rubygems
newUser1234 has quit [Remote host closed the connection]
newUser1234 has joined #rubygems
havenwood has joined #rubygems
newUser1234 has quit [Ping timeout: 255 seconds]
newUser1234 has joined #rubygems
newUser1234 has quit [Remote host closed the connection]
newUser1234 has joined #rubygems
newUser1234 has quit [Ping timeout: 256 seconds]
tkramer has quit [Quit: Leaving]
charliesome has joined #rubygems
hltbra has quit [Remote host closed the connection]
ckrailo has quit [Quit: Computer has gone to sleep.]
vanstee has quit [Quit: Computer has gone to sleep.]
hakunin has quit [Remote host closed the connection]
hakunin has joined #rubygems
kgrz has joined #rubygems
kgrz has quit [Ping timeout: 246 seconds]
kgrz has joined #rubygems
kgrz has quit [Quit: Computer has gone to sleep.]
qmx|away is now known as qmx
nirvdrum has quit [Ping timeout: 260 seconds]
kgrz has joined #rubygems
vanstee has joined #rubygems
kgrz has quit [Quit: Computer has gone to sleep.]
teancom has quit [Read error: Connection reset by peer]
teancom_ has joined #rubygems
qmx is now known as qmx|away
bhaak has quit [Ping timeout: 256 seconds]
bhaak has joined #rubygems
charliesome has quit [Quit: Textual IRC Client: www.textualapp.com]
vertis has quit [Quit: Leaving.]
teancom has joined #rubygems
vertis has joined #rubygems
teancom_ has quit [Ping timeout: 260 seconds]
vanstee has quit [Quit: Computer has gone to sleep.]
newUser1234 has joined #rubygems
nirvdrum has joined #rubygems
havenwood has quit [Remote host closed the connection]
nirvdrum has quit [Ping timeout: 252 seconds]
charliesome has joined #rubygems
kgrz has joined #rubygems
newUser1234 has quit [Remote host closed the connection]
newUser1234 has joined #rubygems
newUser1234 has quit [Ping timeout: 245 seconds]
havenwood has joined #rubygems
kgrz has quit [Quit: Computer has gone to sleep.]
havenwood has quit [Remote host closed the connection]
Elhu has joined #rubygems
havenwood has joined #rubygems
ddv has left #rubygems [#rubygems]
tbuehlmann has joined #rubygems
yerhot has joined #rubygems
mockra has joined #rubygems
havenwood has quit [Read error: Connection reset by peer]
yerhot has quit [Remote host closed the connection]
havenwood has joined #rubygems
newUser1234 has joined #rubygems
newUser1234 has quit [Remote host closed the connection]
mockra has quit [Ping timeout: 252 seconds]
Elhu has quit [Quit: Computer has gone to sleep.]
havenwood has quit [Remote host closed the connection]
newUser1234 has joined #rubygems
Elhu has joined #rubygems
Elhu has quit [Client Quit]
newUser1234 has quit [Remote host closed the connection]
<vertis> evan, qrush: Are you across the problem certain people are having with the SSL certs on rubygems.org?
stayarrr has joined #rubygems
wolfeidau has joined #rubygems
<wolfeidau> vertis: I just ran this site https://www.ssllabs.com/ssltest/analyze.html?d=rubygems.org looks like it is serving the bundle digging in further now could be a geotrust/openssl issue after all
<wolfeidau> vertis: I would look into those issues raised at some stage though, I have used that service before they know what they are doing.
Elhu has joined #rubygems
<vertis> wolfeidau: mmm
<vertis> wolfeidau: I'm going to crash for now.
<wolfeidau> vertis: np mate
lsegal has quit [Quit: Quit: Quit: Quit: Stack Overflow.]
Elhu has quit [Quit: Computer has gone to sleep.]
stayarrr has quit [Quit: Leaving...]
Elhu has joined #rubygems
torarne1 has quit [Quit: Leaving.]
terceiro has quit [Read error: Connection reset by peer]
terceiro has joined #rubygems
Elhu has quit [Quit: Computer has gone to sleep.]
workmad3 has joined #rubygems
Elhu has joined #rubygems
Elhu has quit [Quit: Computer has gone to sleep.]
azool has quit [Quit: leaving]
charliesome has quit [Quit: Textual IRC Client: www.textualapp.com]
torarne1 has joined #rubygems
torarne1 has quit [Client Quit]
workmad3 has quit [Ping timeout: 245 seconds]
hltbra has joined #rubygems
workmad3 has joined #rubygems
newUser1234 has joined #rubygems
newUser1234 has quit [Remote host closed the connection]
Elhu has joined #rubygems
newUser1234 has joined #rubygems
Elhu has quit [Quit: Computer has gone to sleep.]
Elhu has joined #rubygems
newUser1234 has quit [Ping timeout: 252 seconds]
newUser1234 has joined #rubygems
theartisan has quit [Ping timeout: 276 seconds]
theartisan has joined #rubygems
Elhu has quit [Quit: Computer has gone to sleep.]
Elhu has joined #rubygems
newUser1234 has quit [Remote host closed the connection]
workmad3 has quit [Read error: Operation timed out]
newUser1234 has joined #rubygems
rohrer has joined #rubygems
adkron has joined #rubygems
Elhu has quit [Quit: Computer has gone to sleep.]
adkron has quit [Ping timeout: 255 seconds]
adkron has joined #rubygems
workmad3 has joined #rubygems
adkron has quit [Ping timeout: 260 seconds]
newUser1234 has quit [Remote host closed the connection]
newUser1234 has joined #rubygems
newUser1234 has quit [Remote host closed the connection]
workmad3 has quit [Ping timeout: 252 seconds]
newUser1234 has joined #rubygems
newUser1234 has quit [Remote host closed the connection]
newUser1234 has joined #rubygems
newUser1234 has quit [Remote host closed the connection]
rohrer has quit [Quit: leaving]
x0F_ has joined #rubygems
x0F has quit [Disconnected by services]
x0F_ is now known as x0F
imperator has joined #rubygems
Elhu has joined #rubygems
<qrush> yikes, an F? :(
<qrush> "This server is vulnerable to the BEAST attack"
<qrush> wtf
dangerousdave has joined #rubygems
<swills> ouch
<swills> where's that?
<qrush> i'm really not sure how to act on this but it sounds pretty bad
<swills> means you need new openssl
<swills> where does your openssl come from?
newUser1234 has joined #rubygems
workmad3 has joined #rubygems
<qrush> seeing no references to openssl in https://github.com/rubygems/rubygems-aws
<swills> it's a system thing
<swills> are those custom AMIs? what OS are you on?
<qrush> i think they are opscode AMIs
<swills> that is, unless the chef stuff is installing whatever web server itself
<qrush> Ubuntu 12.04.1 LTS
<swills> or perhaps you're using amazons load balancers?
<qrush> i'm honestly not sure
<swills> check for updates in the VMs?
<swills> if it lists openssl, i guess i'd install them
<qrush> 65 packages can be updated.
<qrush> 23 updates are security updates.
<swills> i don't know a lot about Ubuntu
<swills> openssl in that list?
<qrush> not sure how to check
<qrush> i also dont want to do anything without someone who knows what they're doing online
<qrush> i am not an ops guy
<swills> yeah
<swills> i do ops stuff, but i don't know ubuntu well enough to help, sorry
<pencil> aptitude upgrade -s (Simulate actions, but do not actually perform them)
<swills> i would say it might be a good idea to regularly install those updates tho
Elhu has quit [Quit: Computer has gone to sleep.]
<swills> it would be nice if you could get DNSSEC setup too
<qrush> is that something that can be chef'd up?
<swills> i have no idea, i don't know chef
<swills> us doing it with chef a requirement?
<swills> s/us/is/
<swills> interesting ssl test site tho
<qrush> i dont know what that is, but using chef is a huge win
<swills> my server that i barely think about gets a B, hah :)
<qrush> https://github.com/rubygems/rubygems-aws has a vagrant setup if you want to play with it locally
<qrush> after years of being handrolled we finally have a community built and run infrastructure - i'd say yes, if you want to see something happen, it has to happen in chef
<swills> don't know what what is?
<swills> ok
<swills> having a Mac is a requirement to using Vagrant, right?
<qrush> DNSSEC. googlin's
<qrush> doesnt seem to according to http://www.vagrantup.com/
<swills> oh
newUser1234 has quit [Remote host closed the connection]
<swills> hmm, interesting
<swills> i thought vagrant only worked on Mac, but I guess that's changed
<swills> does it support VirtualBox?
<swills> oh yes, right
<swills> i couldn't remember if it wanted vbox or vmware, but it looks like vbox
<swills> maybe i'll try to get that working eventually
<swills> can't right now tho
<swills> busy doing security updates for Ruby...
newUser1234 has joined #rubygems
Elhu has joined #rubygems
dvu has quit [Ping timeout: 252 seconds]
<raggi> qrush: re the ssl stuff, just disable the bad ciphers in the nginx conf
<swills> you're using default ciphers? oh, never do that.
<raggi> god only knows why that was done
<raggi> FTR, the defaults in nginx have been fine since like 1.0
<swills> oh, i hate when people pick up defaults in 0.1 or something and carry them forever
yerhot has joined #rubygems
vanstee has joined #rubygems
yerhot has quit [Read error: Connection reset by peer]
newUser1234 has quit [Remote host closed the connection]
yerhot has joined #rubygems
havenwood has joined #rubygems
Elhu has quit [Quit: Computer has gone to sleep.]
yerhot has quit [Remote host closed the connection]
rohrer has joined #rubygems
Elhu has joined #rubygems
hltbra has quit [Remote host closed the connection]
Elhu has quit [Quit: Computer has gone to sleep.]
nirvdrum has joined #rubygems
workmad3 has quit [Ping timeout: 245 seconds]
<rohrer> just watching the ops mtg. hangout. anything I can do to help with cheffing things up?
newUser1234 has joined #rubygems
Elhu has joined #rubygems
teancom has quit [Read error: Connection reset by peer]
teancom_ has joined #rubygems
adkron has joined #rubygems
mephux has quit [Excess Flood]
Elhu has quit [Quit: Computer has gone to sleep.]
mephux has joined #rubygems
mockra has joined #rubygems
mockra has quit [Remote host closed the connection]
ddv has joined #rubygems
<dwradcliffe> qrush/raggi/swills so should we use default ciphers or a custom list?
<swills> custom list
<swills> well, i haven't see what the default ones in nginx are
<swills> the new defaults may be OK
<swills> you should always check for new defaults...
qmx|away is now known as qmx
qmx has quit [Changing host]
qmx has joined #rubygems
<dwradcliffe> docs say default is "HIGH:!aNULL:!MD5;"
<swills> hmm, i wonder if that excludes eNULL
<swills> and ADH
<swills> worth a try at least
<swills> ssl_prefer_server_ciphers on; sounds liek a nice option too
<dwradcliffe> yeah, I've used that before
<dwradcliffe> maybe this? "RC4:HIGH:!aNULL:!MD5:!kEDH;"
<swills> dunno
* dwradcliffe checking some of my client sites
<dwradcliffe> FYI the balancer is using OpenSSL 1.0.1 14 Mar 2012
<dwradcliffe> 1.0.1-4ubuntu5.5
lsegal has joined #rubygems
havenwood has quit [Remote host closed the connection]
sikachu has joined #rubygems
workmad3 has joined #rubygems
<sikachu> Hi. How do I fix the error with my OpenSSL? Do I need to get cert from somewhere?
vanstee has quit [Quit: Computer has gone to sleep.]
<sikachu> >/Users/sikachu/.rvm/rubies/ruby-2.0.0-p0/lib/ruby/2.0.0/net/http.rb:917:in `connect': SSL_connect returned=1 errno=0 state=SSLv3 read server certificate B: certificate verify failed (OpenSSL::SSL::SSLError)
fromonesrc has joined #rubygems
fromonesrc has quit [Client Quit]
<sikachu> yeah, I've seen that. my ruby installed fine though, but it seems like i need to grab rubygems cert from somewhere
<sikachu> it's failing after >Fetching from: https://rubygems.org/api/v1/dependencies
fromonesrc has joined #rubygems
<mpapis> sikachu, It's on my list, the other trick was rvm pkg install openssl; rvm reinstall ruby --with-opensll-dir=$rvm_path/usr
<mpapis> sikachu, I will be working on it later
<sikachu> ahhh ok
<sikachu> let me try that
<sikachu> yeah, i think 2.0rc2 was installed based on rvm's openssl, while final version switched to use homebrew
fromonesrc has quit [Quit: fromonesrc]
newUser1234 has quit [Remote host closed the connection]
mockra has joined #rubygems
workmad3 has quit [Ping timeout: 255 seconds]
mockra has quit [Ping timeout: 252 seconds]
jcaudle has joined #rubygems
twoism has joined #rubygems
adkron has quit [Ping timeout: 246 seconds]
the_mentat has joined #rubygems
twoism has quit [Ping timeout: 245 seconds]
jcaudle has quit [Quit: jcaudle]
jcaudle has joined #rubygems
jcaudle has quit [Client Quit]
rohrer has quit [Quit: leaving]
<dwradcliffe> Tried changing the ciphers but the results didn't change. I wonder if the test is skewed by the 405 status code when HEAD is used.
<swills> shoudln't be
dvu has joined #rubygems
<swills> all the ssl stuff happens above the HTTP stuff
<nirvdrum> Is CloudFront not used for SSL gem fetching just a cost concern? Or is there a deeper reason than that?
erichmenge has quit [Quit: Arrivederci!]
<nirvdrum> *just as a
<vertis> qrush: you around
adkron has joined #rubygems
yerhot has joined #rubygems
workmad3 has joined #rubygems
erichmenge has joined #rubygems
yerhot has quit [Remote host closed the connection]
rohrer has joined #rubygems
Elhu has joined #rubygems
<vertis> dwradcliffe: quite a few people having problems with ssl certs
<dwradcliffe> vertis: do we need to change the config?
adkron has quit [Ping timeout: 245 seconds]
mockra has joined #rubygems
<vertis> dwradcliffe: well they weren't complaining before the breach
<vertis> and new certs were generated at that point
mockra has quit [Ping timeout: 260 seconds]
yerhot has joined #rubygems
<vertis> dwradcliffe: wolfeidau had some interesting thoughts on the matter last night
<vertis> (also Australian)
<dwradcliffe> vertis: yeah I was looking at that site. Changing our cipher list didn't change the scan results at all.
<vertis> hmmmm
<dwradcliffe> looks like the rackspace setup used the defaults
<vertis> two seperate problems
<vertis> separate
<vertis> the vulnerability to that attack
<vertis> and then the fact people are getting cert errors
<vertis> or is it all the same?
qmx is now known as qmx|away
<dwradcliffe> not sure :(
<vertis> have to commute to work now
<vertis> will talk to you in an hour if you're still around
<dwradcliffe> sure, I'll be in and out
<vertis> have a look at what wolfeidau was tweeting last night
vertis has quit [Quit: Leaving.]
<sikachu> >export SSL_CERT_FILE=/usr/local/Cellar/curl-ca-bundle/1.87/share/ca-bundle.crt
<sikachu> this fixed mine .. so openssl couldn't find cert file :(
<raggi> eww
<raggi> i just spotted that airbrake is shipping it's own ca bundle in the gem
<pencil> dito
<raggi> that...
<raggi> :'(
<raggi> wtf
<pencil> export SSL_CERT_FILE=/usr/local/share/ca-bundle.crt
<raggi> makes me want to pull a damato and go around screaming REEWWWBBYY!!!
newUser1234 has joined #rubygems
tux91 has joined #rubygems
<pencil> :)
havenwood has joined #rubygems
tux91 has quit [Remote host closed the connection]
<raggi> why doesn't brew link curl-ca-bundle link the ca-bundle.crt into /usr/local/etc/certs ?
tux91 has joined #rubygems
<raggi> s/certs/openssl\/certs/
<tux91> 'gem update' asks me if I want to overwrite certain executables, shouldn't it do it automatically if it's installing a newer version, and skip if it's an older one?
tux91 has quit [Remote host closed the connection]
stevenharman has joined #rubygems
<sikachu> raggi: i'm not sure. if that's the location that openssl will look for certs, then i think we should submit them a pull request.
<sikachu> maybe i should test that
<sikachu> brb
<raggi> sikachu: they will want to be bundled in a pem, and then run rehash afterward
<sikachu> oh
<raggi> i'm sure there's some appallingly written docs around somewhere
mockra has joined #rubygems
mockra has quit [Remote host closed the connection]
<sikachu> yeah, maybe i should look at it afterward … try to find the way to sooth this pain for others. that took me quite a while to find that ENV VAR
<sikachu> anyway, froyo and coffee time.
dvu has quit [Remote host closed the connection]
dvu has joined #rubygems
yerhot has quit [Remote host closed the connection]
dvu has quit [Ping timeout: 276 seconds]
wolfeidau has quit [Remote host closed the connection]
yerhot has joined #rubygems
yerhot has quit [Remote host closed the connection]
cowboyd has joined #rubygems
huoxito has joined #rubygems
wolfeidau has joined #rubygems
cowboyd has quit [Remote host closed the connection]
mockra has joined #rubygems
nirvdrum has quit [Read error: No route to host]
postmodern has joined #rubygems
<postmodern> man good job on rubygems 2.0.0!
<postmodern> like how documentation is generated after each gem is installed
<postmodern> and `gem clean` doesn't remove necessary dependencies accidentally anymore
mockra has quit [Ping timeout: 256 seconds]
<postmodern> hey where did rubygems/builder go in 2.0.0?
mockra has joined #rubygems
mockra has quit [Remote host closed the connection]
fromonesrc_tmp has joined #rubygems
fromonesrc_tmp has quit [Client Quit]
<wolfeidau> qrush: Heya you around, been lookin at that cert issue
fromonesrc has joined #rubygems
fromonesrc has quit [Client Quit]
<wolfeidau> raggi: It is a very interesting issue, using a different bundle is an interesting solution
fromonesrc has joined #rubygems
<raggi> wolfeidau: well, rubygems should probably ship wiht the CF ones too
<raggi> as we ship certs to avoid this on our side
<raggi> but, for users in general, if they're goign to rely on brew installed ssl, they probably want to configure their system properly
<wolfeidau> raggi: The thing is you should only need to ship the intermediate cert for your rapid ssl
<wolfeidau> raggi: Have you tried that?
<raggi> wolfeidau: have you looked at the rubygems source?
yerhot has joined #rubygems
<wolfeidau> raggi: Not yet mate, just looking from the outside in atm :P
yerhot has quit [Remote host closed the connection]
<wolfeidau> raggi: Those aren't the intermediates for your cert though
<wolfeidau> raggi: Links through to RapidSSL_CA_bundle.pem I would love to try this in that search path RapidSSL_CA_bundle.pem
<raggi> well who did that?
<wolfeidau> woops double paste lol
<raggi> heh
<raggi> lol
<wolfeidau> raggi: About to be dragged off to meeting sorry, just got to work after a holiday.. Does that look helpful?
fromonesrc has quit [Quit: fromonesrc]
the_mentat has quit [Quit: Computer has gone to sleep.]
newUser1234 has quit [Remote host closed the connection]
Elhu has quit [Quit: Computer has gone to sleep.]
<wolfeidau> wycats__: Yes a lot of people are having those cert issues, it MAY be due to ruby 2.0 requiring the new openssl and new certs used by rubygems.org
vertis has joined #rubygems
<wycats__> wolfeidau: hm
<wycats__> indirect: do we know anything more?
<wolfeidau> wycats__: I want to try adding that intermediate to rubygems sources but I am busy at work right now :(
<wolfeidau> wycats__: If you can read up a bit I linked it and raggi linked the folder existing intermediate certs bundled
<vertis> okay back
<wolfeidau> wycats__: This is the error you get when you try requesting rubygems.org with new openssl and s_client https://gist.github.com/wolfeidau/5023408
<wolfeidau> vertis: Got irc history to read above?
<vertis> wolfeidau: nope
newUser1234 has joined #rubygems
<vertis> wolfeidau: as I was saying on twitter, there was a new cert generated when the servers were moved.
<wolfeidau> vertis: http://pastebin.com/KNYc6Vpn
<wolfeidau> vertis: Rubygems bundles intermediate certs for the old certificate as far as i can tell
<vertis> ah
<wycats__> should bundler maybe ship the necessary .pem?
<wolfeidau> wycats__: IMO should be done by rubygems
<wycats__> or do people just need to upgrade rubygems?
<wolfeidau> wycats__: ahh yeah that is a hassle eh, once it is added to rubygems it would need to be upgraded
<vertis> wolfeidau: that's interesting
<wolfeidau> vertis: Can you try adding that intermediate to rubygems as linked above?
<wycats__> wolfeidau: it seems good to add it to rubygems, but maybe we should also ship in the interim?
<wycats__> hone: ^
<wolfeidau> wycats__: Yeah I don't think it would hurt depending on who can release more rapidly without breaking stuff :)
<wycats__> wolfeidau: indeed
<wycats__> wolfeidau: bundler upgrades are simple and painless
<wolfeidau> wycats__: As you can see https://knowledge.rapidssl.com/support/ssl-certificate-support/index?page=content&id=SO6252&actp=LIST&viewlocale=en_US supplies the intermediate for rubygems cert
<wycats__> weeeeird
<wolfeidau> wycats__: THat is just scary
<vertis> wolfeidau: If we put that intermediate on the server
<wolfeidau> vertis: It already is
<vertis> not the ones you linked
<wolfeidau> vertis: New openssl just doesn't do it that way anymore as far as i can tell
<vertis> that I can see anyway
<wycats__> I hate shit like this
<vertis> wolfeidau: ah
<wycats__> there's usually a flurry of (potentially dangerous) solutions
<wycats__> that people peddle
<wycats__> that then persist for YEARS
newUser1234 has quit [Remote host closed the connection]
<wolfeidau> wycats__: Agreed! and they work, but no one looks into why or how dangerous they are :(
newUser1234 has joined #rubygems
<wolfeidau> as mentioned above installing curl in brew and using export SSL_CERT_FILE=/usr/local/Cellar/curl-ca-bundle/1.87/share/ca-bundle.crt works too
<wolfeidau> I wish I had more time right now to look into it in more detail but just got to work
<wycats__> wolfeidau: do you know exactly WHY that works?
<vertis> wolfeidau: gives openssl access to the intermediate cert required to validate rubygems.org?
<wolfeidau> wycats__: Something has changed with the way ca certs are bundled with openssl as far as i can tell from the rather oblique answers on the openssl mailing list
<wolfeidau> wycats__: vertis: The issue is something has changed between openssl 0.x and 1.0.x in how it completes the chain of trust
<wolfeidau> wycats__: As far as i can tell applications now need to bundle the intermediate cert to complete the chain, this can't be completed by bundling the cert from the server
<vertis> wolfeidau: yeah, so previously it would be happy with the download from the server and now...
newUser1234 has quit [Remote host closed the connection]
<wolfeidau> vertis: Exactly
<wycats__> wolfeidau: and why does moving the file to cert.pem work?
<wolfeidau> wycats__: I think that is a ca-bundle file
<wolfeidau> will grab it down and look
<wycats__> ok :)
<wolfeidau> wycats__: That ca-bundle.crt -- Bundle of CA Root Certificates
<wolfeidau> wycats__: From mozilla
<wolfeidau> wycats__: Hence it working
<wycats__> wolfeidau: so why doesn't OpenSSL stick it where it looks?
<wolfeidau> wycats__: Probably bundles the intermeidate certs
<wycats__> it bundles it for the heck of it but you need to move it into place?
<wolfeidau> wycats__: I think the crypto people are bundling less in thier cert chain than the browsers at the moment
<wycats__> I think I'm missing something critical here :/
<wolfeidau> wycats__: Browsers always bundle more as it anoys big companies when they don't work
<wolfeidau> wycats__: And users of course
<wycats__> wolfeidau: so OpenSSL includes the moz certs
<wycats__> but doesn't look at them by default
<wycats__> confirm?
<wolfeidau> wycats__: That cert chain is the entire chain from a mozilla app
<wolfeidau> wycats__: not 'mozilla' certs
<swills> um
<wycats__> wolfeidau: I know
<wycats__> I was using shorthand :P
<swills> are you guys sending your intermediary cert?
<wolfeidau> wycats__: Sorry mate
<wycats__> "the cert chain mozilla ships with Firefox"
<wycats__> is what I meant
<wycats__> wolfeidau: no problem
yerhot has joined #rubygems
<wycats__> so is ^ true? they're shipping the cert chain mozilla ships but don't want it to be used by default?
<sikachu> >might not be the right solution
<vertis> swills: as I understand it, yes we are
<sikachu> but somewhat usable ruby > broken ruby
<swills> then i think the bundle file shouldn't be an issue
<sikachu> or else we can't test anything on ruby 2 ;_;
<wycats__> if you want "usable ruby" stick with 1.9 until a good solution is worked out
<wycats__> :P
<sikachu> but yeah, i don't know nothing about SSL stuff ...
<wolfeidau> wycats__: Yeah rvm looks like it is shipping that JUST for thier install of openssl
<sikachu> but i need to test stuff against ruby 2 :P
<wycats__> wolfeidau: makes sense
<wolfeidau> wycats__: And pushing it into the certs folder as a 'fix' of sorts
<wycats__> sikachu: "I don't know about SSL" should be a good reason not to apply hacks to OpenSSL
<sikachu> anyway, i can't wait to get rid of my hax though
<wycats__> we've had enough security issues lately
<sikachu> ha
<wycats__> ;)
<wycats__> it seems ok for testing
<wycats__> but I'm sure people are going to be applying some hack and then forgetting about it
<wycats__> and some of these hacks are probably not kosher
<sikachu> yeah, i'm totally agree by that -_-'
<swills> hmm, i don't see the intermediate
<wolfeidau> wycats__: You could isolate and bundle JUST the certs in the chain linked above to get gem working
<wolfeidau> If you go to https://rubygems.org in your browser and extract each of the certs to a .pem file then append them together and bundle that it will work
<swills> do you have SSLCertificateChainFile in the nginx config?
<wolfeidau> swills: no
<swills> there you go
<wolfeidau> swills: The chain is completed by apending all the certs together
<wolfeidau> swills: Rubygems is doing this now
<wolfeidau> swills: The issue is openssl out of the box isn't trusting that now for some reason
<swills> try the chain file
<wolfeidau> swills: That is an apache httpd thing
<wycats__> wolfeidau: we should figure out why openssl isn't trusting the rubygems certs
<swills> no
<wycats__> and fix that
<swills> nginx has the same option
<wolfeidau> swills: From what i have read that doesn't fix it
<wolfeidau> swills: O where is that option i had a search around
yerhot has quit [Ping timeout: 260 seconds]
<swills> oh, no, you're right, nginx does say to cat the files together, sorry, i misread.
<swills> weird
<swills> are you sure they're cat'd in the right order?
<swills> cause when i test with openssl s_client i don't see the chain
<wolfeidau> swills: yeah same
<wolfeidau> swills: Then use an older openssl
<wolfeidau> same command
<wolfeidau> wycats__: The issue seems to be with the either the intermeidate or parent cert these are issued by geotrust
<swills> sorry, i'm stupid, i do see the chain.
<swills> 1.0.1e fwiw
<swills> hmmph, seems valid. where are the issues?
<wolfeidau> swills: in the newer it is even more confusing
workmad3 has quit [Ping timeout: 252 seconds]
<wolfeidau> wycats__: It is one of the cheapest certs available, I would probably use a more reliable source for certs used on a canonical service but that is another thing
adkron has joined #rubygems
<wycats__> scumbag rubygems :P
<wolfeidau> wycats__: haha you said it :P
<wolfeidau> It is much easier when you get a certificate from a more reputable provider though
<wolfeidau> geotrust is pretty much the bottom of the tree
<sikachu> lolol
<wolfeidau> ROFL
<sikachu> maybe we should start a kickstarted project to get rubygems a better cert
* sikachu runs away
fromonesrc has joined #rubygems
<raggi> re
<swills> many "good" ssl sites are doing intermediate certs now to improve their cert management...
<raggi> i'm gunna head to a cafe, and i'll get a valid intermediate into the rubygems source
<raggi> and ask drbrain to roll a 2.0.1 after
<sikachu> :+1:
<swills> raggi: could you do it for rubygems 1.8 as well? and perhaps release a 1.8.26?
<sikachu>
<raggi> but that won't solve OSX users general problems with brew openssl
<swills> not everyone can move to rubygems 2.0 given all the breakages, right?
<raggi> swills: i'm not sure what the branch arragements are, but in principle, yes
<sikachu> yeah, nor ruby 2, unless you use http connection to Rubygems (don't)
<wolfeidau> swills: Intermediate isn't the problem i am guessing it mite be that geotrust top level ca cert isn't bundled in openssl?
<raggi> so that solution in ruby-build is actually reasonable
<raggi> other than the fact that it won't get up to date CRLs
<swills> wolfeidau: that would definitely cause a problem, but i'd think it would be bundled...
<raggi> if it was cron'd up, i wouldn't have much of an issue wiht it
<raggi> having a brew package handle this would also be valid
<raggi> (one that expands the curl bundle into a valid pem, links into the right place, and runs rehash)
havenwood has quit [Remote host closed the connection]
<raggi> or one that pulls the mozilla bundles properly, more like debian does
<raggi> but managing ssl certs is something you want someone to /own/
<raggi> and i doubt that can be said for brew, generally
<raggi> did our odl cert actualy run out?
<wolfeidau> raggi: I can check it at lunch time but I am putting out fires at the moment :(
<raggi> omg
<raggi> lol
<raggi> curl.haxx.se has no ssl
* raggi shakes head
<wycats__> that's hilarious
<wycats__> raggi: what's the tl;dr?
<raggi> wycats__: "welcome to the political fearmongering clusterfuck that is ssl CA lists"
<raggi> wycats__: two valid solutions
<swills> raggi: +1
<raggi> wycats__: 1. use curl-ca-bundle from homebrew, despite it's appalling trust model - you can do this two ways, 1. use the env var to set CAfile, or 2. expand the installed cert list into .pems in the right place and run rehash
<raggi> wycats__: 2. use the ruby-build approach to extract the system certs into files, and run rehash
<raggi> with 2, there's the caveat that you're in danger of those not being updated, so i'd recommend you cron that up or something
<wycats__> raggi: it seems like doing your own downloading and moving opts you into also handling revocation
<wycats__> which really 0% of the Ruby community will realize that they're doing
<raggi> with 1, there's the caveat that you're pulling certs from curl.haxx.se that were pulled without ssl, and then rebundled by *someone* (i have no idea who), and mounted on sf.net
<wycats__> raggi: and that you are now opting into keeping it up to date
<raggi> in short, there's no ideal option, openssl will never ship with a cert bundle by default
<wycats__> which, again, nobody is going to do
<raggi> agreed
<wycats__> "it works" is gonna be good enough
<raggi> but, to follow the usual political fearmongering
<swills> so adding the bundle to rubygems makes sense
<raggi> do we really want to become an authoritative source of a ca bundle?
<raggi> swills: no, hold up
<wycats__> which means that a future MITM exploit for rubygems is: wait for a cert to get exposed and revoked, then use that cert knowing that the entire Ruby community will have it in their cert chain
<raggi> (for some value of "we" that includes ruby/rubygems)
<raggi> wycats__: for rubygems itself, we can package certs we *know* to trust
<wolfeidau> wycats__: raggi: you don't need the entire bundle just the relavent certs
<raggi> wycats__: that is, our CAs cert, as we've already done
<raggi> wolfeidau: i know
<swills> raggi: i don't mean the whole bundle
<raggi> wycats__: but people are still going to have trouble wiht ruby 2.0+ on OSX wiht `require "open-uri"; open("https://google.com/")`
<wycats__> the solution I've considered in the past (for Tokaido) is to use Apple's OpenSSL which uses the keychain
<wycats__> for OSC
<swills> just the geotrust root
<wycats__> OSX*
<raggi> wycats__: not compatible with ruby 2.0
<wycats__> raggi: I know
<raggi> wycats__: the openssl patch doesn't apply
<wycats__> that's why I said "in the past"
* raggi nods
<raggi> c
<wycats__> someone can try to figure out how to rebuild it against 1.0e?
<swills> 1.0.1e
<wycats__> surely we're not the only ones in this predicament?
<wycats__> 1.0.1e
<raggi> i think adding a brew that "sorts this out", by adding a cron to extract from keychain regularly, seems fine
<raggi> wycats__: ^^^
<wycats__> raggi: that seems fine, except that I don't trust homebrew to actually do the work
<wycats__> :/
<wycats__> ah
<wycats__> from keychain
<wycats__> seems good
<wycats__> +1
<raggi> yep
<wycats__> that works
<wycats__> someone should do that
<raggi> it's the ruby-build solution, but updated regularly
<raggi> i'll do it when i get a decent coffee
<wycats__> yeah... doing it once is a non-starter for me
<raggi> this homebrew (lol) shit isn't doing it for me
<wycats__> I'm horrified that people are like "seems gooooood"
<raggi> wycats__: totally
yerhot has joined #rubygems
<raggi> i get the feelign installing cron's from homebrew is going to be a ... horrible ticket
<wycats__> raggi: I could tell from the first tweet that I saw that this was going to be "one of those"
<raggi> yep
<wycats__> like the encoding issue
<raggi> wycats__: and we only just got most of the verify_nones out the way
<raggi> wycats__: although
<wycats__> force_encoding("UTF-8") done
<wycats__> and verify_none
<wycats__> indeed
<raggi> wycats__: do something else - do a locate(1)/find(1)/whatever for .pems
<raggi> wycats__: the mozilla bundle is also shipped inside the airbrake gem
<raggi> wycats__: srsly bro
<wycats__> raggi: but that has the same issue
<raggi> shoot me
<wycats__> not updated
<raggi> yep
<raggi> exactly
<raggi> just because osx had to do it different
<raggi> for some notion of "keychain is more secure than files"
<wycats__> I mean, it's fair enough
<wycats__> keychain is actually a good feature
<raggi> sure
<raggi> keychain is a good feature
<raggi> but it's not largely different from files
<wycats__> OSX is allowed to have a system security feature
<raggi> which is the supposition
<wolfeidau> wycats__: raggi: I think ubuntu 12.10 has the same error btw bundled openssl is very new
<raggi> integration != replacement
<wycats__> I'm not crying too hard
<wycats__> it is what it is
<raggi> wolfeidau: huh?
<wycats__> OpenSSL should have been managing the OSX support
<wycats__> instead of making Apple do it
<wycats__> Ruby has OSX stuff all over the place
<raggi> wolfeidau: 12.10 just needs the ca bundle package installed
sferik has joined #rubygems
<wolfeidau> raggi: I will try that and see if it works
<wycats__> raggi: I think Apple would also tell you that the extraction approach is easy enough
<raggi> wolfeidau: apt-get install ca-certificates
<swills> wycats__: that's backwards, openssl can't control what apple does.
<raggi> wolfeidau: that should install them into /etc/ssl/cert/* and run c_rehash
<raggi> swills: they could make it easier to plug
<wolfeidau> raggi: Yeah i have certs in that location
<raggi> wolfeidau: do you have the id links?
<wolfeidau> raggi: Just rebooting as i moved network
<raggi> o0
<swills> what's easier than installing some crt bundles?
<raggi> wolfeidau: also, how did you install ruby?
havenwood has joined #rubygems
<wycats__> swills: keychain is not a new feature
<raggi> wolfeidau: if you installed wiht something that builds it's own openssl, then your openssl probably has a different prefix and won't pick up system chains
<wolfeidau> raggi: I am only testing with openssl s_client at the moment
<raggi> wolfeidau: s_client should pick up certs from /etc/ssl/certs
<raggi> oooh
<wolfeidau> raggi: Yes and it complains
<swills> keychain is great, but not the kind of thing openssl typically has to work with, so without someone sending them patches it isn't going to happen *shrug*
<raggi> omg lol
<raggi> don't tell me
<wolfeidau> raggi: What?
<swills> perhaps you could say Apple should have added keychain support to openssl
<raggi> wolfeidau: um, yeah, s_client bug
<wycats__> swills: they did!
<wycats__> there was a patch set ages ago
<raggi> wolfeidau: do this: `openssl s_client -connect rubygems.org:443 -CApath a`
<wycats__> it just doesn't apply to 1.0
<raggi> wolfeidau: where 'a' is any char you like
<wycats__> Apple has abandoned OpenSSL
<wycats__> I'm saying OpenSSL should have picked up that patch
<swills> oh, that's right, didn't they have a replacement, i forgot that
<raggi> wolfeidau: or a path, which would be more valid...