TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Making popular Ruby packages more secure

189 点作者 tomstuart将近 3 年前

10 条评论

ievans将近 3 年前
This is great news! I like how the article cites evidence that MFA is disproportionately effective against account takeover.<p>If the rubygems devs are looking for other highly effective wins against supply chain attacks: I think the next thing is deeper support for lockfiles. Although Ruby has Gemfile.lock, it&#x27;s not a true lockfile in the same way that package managers in the javascript&#x2F;go&#x2F;python ecosystems are. Specifically, locking versions is optional, there&#x27;s no locking by hash (Github issue: <a href="https:&#x2F;&#x2F;github.com&#x2F;rubygems&#x2F;rubygems&#x2F;issues&#x2F;3379" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;rubygems&#x2F;rubygems&#x2F;issues&#x2F;3379</a>), and there&#x27;s no capability to lock local or source-only dependencies by hash. By comparison: go modules, pipenv, npm, yarn, nuget, composer, and gradle already support locking by hash.
评论 #31734787 未加载
ufuk将近 3 年前
This is a great first step to making dependencies more secure in the Ruby ecosystem. Congrats to the whole team for getting this done!
评论 #31732585 未加载
评论 #31732672 未加载
kyrofa将近 3 年前
I applaud the move in the right direction, but please add support for webauthn. OTPs are really inconvenient in comparison.<p>It looks like maybe it&#x27;s been in flight for a while? <a href="https:&#x2F;&#x2F;github.com&#x2F;rubygems&#x2F;rubygems.org&#x2F;pull&#x2F;2108" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;rubygems&#x2F;rubygems.org&#x2F;pull&#x2F;2108</a>
评论 #31733348 未加载
captn3m0将近 3 年前
I really wish more package managers added support for OIDC based authentication+authorization for package publishing. PyPi has an ongoing PR for this: <a href="https:&#x2F;&#x2F;github.com&#x2F;pypa&#x2F;warehouse&#x2F;issues&#x2F;10970" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;pypa&#x2F;warehouse&#x2F;issues&#x2F;10970</a> with some really great UX. You specify a repository name on GitHub and GitHub actions there get publishing rights automatically.<p>While 2FA is good, having a purpose limited JIT token for publishing packages is what will actually reduce risk. Otherwise, as it stands - PATs leaked from one project can be used across any of your other packages on all package managers.
评论 #31743906 未加载
woodruffw将近 3 年前
Fantastic work by the RubyGems maintainers. Congratulations on the rollout, and please consider WebAuthn support in a future iteration!
codebeaker将近 3 年前
As part of a team of maintainers of a popular (declining) gem, shame they don&#x27;t make a mention of the extremely valid &quot;gem is owned by a team, and anyone may push&quot; model. I regret that the MFA token for many gems such as this may end-up in 1Password or similar, shared, along side the other credentials, rather than on a separate device or similar.
评论 #31731417 未加载
评论 #31733041 未加载
评论 #31731220 未加载
mhoad将近 3 年前
Throwing the black hat on for a moment surely I would just move towards the subdependencies of these popular gems (which realistically is where you would be targeting anyways I imagine) and can fairly reliably expect that my malicious changes get picked up upstream in due course.<p>Am I missing something here?
评论 #31732392 未加载
评论 #31732297 未加载
评论 #31734924 未加载
评论 #31732964 未加载
评论 #31732680 未加载
capableweb将近 3 年前
Anyone know what happens to the people who won&#x27;t activate MFA within the time-period? I&#x27;m guessing they&#x27;ll be unable to publish, but still be able to login to their account to setup MFA, even after MFA started to become mandatory?
评论 #31736356 未加载
madmaniak将近 3 年前
Does MFA exists to force people to have&#x2F;carry all the time smart phones or there&#x27;s a way to use it without a phone? I mean in practice for repositories like npm or rubygems?
评论 #31735782 未加载
评论 #31736398 未加载
jupp0r将近 3 年前
How about cryptographically signed packages as the next step? It boggles my mind that most popular package managers like npm, pip and cargo don&#x27;t have verification of package authenticity before installing built in.
评论 #31733336 未加载
评论 #31733800 未加载
评论 #31734001 未加载
评论 #31733342 未加载
评论 #31733649 未加载
评论 #31733177 未加载
评论 #31733685 未加载