TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Making popular Ruby packages more secure

189 pointsby tomstuartalmost 3 years ago

10 comments

ievansalmost 3 years ago
This is great news! I like how the article cites evidence that MFA is disproportionately effective against account takeover.<p>If the rubygems devs are looking for other highly effective wins against supply chain attacks: I think the next thing is deeper support for lockfiles. Although Ruby has Gemfile.lock, it&#x27;s not a true lockfile in the same way that package managers in the javascript&#x2F;go&#x2F;python ecosystems are. Specifically, locking versions is optional, there&#x27;s no locking by hash (Github issue: <a href="https:&#x2F;&#x2F;github.com&#x2F;rubygems&#x2F;rubygems&#x2F;issues&#x2F;3379" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;rubygems&#x2F;rubygems&#x2F;issues&#x2F;3379</a>), and there&#x27;s no capability to lock local or source-only dependencies by hash. By comparison: go modules, pipenv, npm, yarn, nuget, composer, and gradle already support locking by hash.
评论 #31734787 未加载
ufukalmost 3 years ago
This is a great first step to making dependencies more secure in the Ruby ecosystem. Congrats to the whole team for getting this done!
评论 #31732585 未加载
评论 #31732672 未加载
kyrofaalmost 3 years ago
I applaud the move in the right direction, but please add support for webauthn. OTPs are really inconvenient in comparison.<p>It looks like maybe it&#x27;s been in flight for a while? <a href="https:&#x2F;&#x2F;github.com&#x2F;rubygems&#x2F;rubygems.org&#x2F;pull&#x2F;2108" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;rubygems&#x2F;rubygems.org&#x2F;pull&#x2F;2108</a>
评论 #31733348 未加载
captn3m0almost 3 years ago
I really wish more package managers added support for OIDC based authentication+authorization for package publishing. PyPi has an ongoing PR for this: <a href="https:&#x2F;&#x2F;github.com&#x2F;pypa&#x2F;warehouse&#x2F;issues&#x2F;10970" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;pypa&#x2F;warehouse&#x2F;issues&#x2F;10970</a> with some really great UX. You specify a repository name on GitHub and GitHub actions there get publishing rights automatically.<p>While 2FA is good, having a purpose limited JIT token for publishing packages is what will actually reduce risk. Otherwise, as it stands - PATs leaked from one project can be used across any of your other packages on all package managers.
评论 #31743906 未加载
woodruffwalmost 3 years ago
Fantastic work by the RubyGems maintainers. Congratulations on the rollout, and please consider WebAuthn support in a future iteration!
codebeakeralmost 3 years ago
As part of a team of maintainers of a popular (declining) gem, shame they don&#x27;t make a mention of the extremely valid &quot;gem is owned by a team, and anyone may push&quot; model. I regret that the MFA token for many gems such as this may end-up in 1Password or similar, shared, along side the other credentials, rather than on a separate device or similar.
评论 #31731417 未加载
评论 #31733041 未加载
评论 #31731220 未加载
mhoadalmost 3 years ago
Throwing the black hat on for a moment surely I would just move towards the subdependencies of these popular gems (which realistically is where you would be targeting anyways I imagine) and can fairly reliably expect that my malicious changes get picked up upstream in due course.<p>Am I missing something here?
评论 #31732392 未加载
评论 #31732297 未加载
评论 #31734924 未加载
评论 #31732964 未加载
评论 #31732680 未加载
capablewebalmost 3 years ago
Anyone know what happens to the people who won&#x27;t activate MFA within the time-period? I&#x27;m guessing they&#x27;ll be unable to publish, but still be able to login to their account to setup MFA, even after MFA started to become mandatory?
评论 #31736356 未加载
madmaniakalmost 3 years ago
Does MFA exists to force people to have&#x2F;carry all the time smart phones or there&#x27;s a way to use it without a phone? I mean in practice for repositories like npm or rubygems?
评论 #31735782 未加载
评论 #31736398 未加载
jupp0ralmost 3 years ago
How about cryptographically signed packages as the next step? It boggles my mind that most popular package managers like npm, pip and cargo don&#x27;t have verification of package authenticity before installing built in.
评论 #31733336 未加载
评论 #31733800 未加载
评论 #31734001 未加载
评论 #31733342 未加载
评论 #31733649 未加载
评论 #31733177 未加载
评论 #31733685 未加载