Skip to content

Instantly share code, notes, and snippets.

@jjb
Created May 27, 2011 22:11
Show Gist options
  • Save jjb/996292 to your computer and use it in GitHub Desktop.
Save jjb/996292 to your computer and use it in GitHub Desktop.
How to securely acquire the Mozilla root certificate bundle for use with curl, Net::HTTP, etc.

If you want to use curl or net-http/open-uri to access https resources, you will often (always?) get an error, because they don't have the large number of root certificates installed that web browsers have.

You can manually install the root certs, but first you have to get them from somewhere. This article gives a nice description of how to do that. The source of the cert files it points to is hosted by the curl project, who kindly provide it in the .pem format.

problem: Sadly, ironically, and comically, it's not possible to access that file via https! Luckily, the awesome curl project does provide us with the script that they use to produce the file, so we can do it securely ourselves. Here's how.

  1. git clone https://github.com/bagder/curl.git

  2. cd curl/lib

  3. edit mk-ca-bundle.pl and change:

    my $url = 'http://mxr.mozilla.org/mozilla/source/security/nss/lib/ckfw/builtins/certdata.txt?raw=1';

    to

    my $url = 'https://mxr.mozilla.org/mozilla/source/security/nss/lib/ckfw/builtins/certdata.txt?raw=1';

    (change http to https)

  4. ./mk-ca-bundle.pl

Ta da!

@lech7
Copy link

lech7 commented Oct 18, 2012

Yes, that is quite ironic and I'm glad I was not the only one to see the irony and that I came across this post quickly enough (I could easily see myself scouring the internet obsessively looking for the answer).

Thank you for providing a solution. And I'm sure we can write a script from it and run it in a cronjob for automatic updates of the CA bundle.

As great as all of the Linux tools are, I'm a bit surprised that they often seem to miss something obvious (like auto update for the CA bundle) that complicates things, but then maybe I just don't understand.

Thanks again.

@viniciusgati
Copy link

./mk-ca-bundle.pl
Downloading 'certdata.txt' ...
Unable to download latest data: 500 - Can't verify SSL peers without knowning which Certificate Authorities to trust

@unimatrixZxero
Copy link

I get the same message.

@nfirvine
Copy link

And why do you think that is? There's basically no point in fetching over SSL if you can't tell who you're talking to.

http://research.zscaler.com/2008/10/ssl-encryption-without-authentication.html

@jocutajar
Copy link

The mozilla cert could be fingerprinted or included in the software so that other certs can be downloaded securely.

@anonyco
Copy link

anonyco commented Dec 31, 2024

The mozilla cert could be fingerprinted or included in the software so that other certs can be downloaded securely.

The idea is that you update your SSL root CAs regularly enough (at least once every 5 years is enough; once every month is prefered) to get the newly issued root CAs that will carry you far into the future using your existing soon-to-expire root CAs, thus perpetually bunny-hopping every 20-40 years or so from each iteration of each root CA.

If you have invalid SSL certificates or are trying to generate SSL certficates to bootstrap TLS in automated computer setup, then you're doing things wrong. Just flat out wrong! You should bundle the latest root CAs with all your deployment platforms and use ci/cd to keep them regularly updated so fresh installs receive a fresh root CA package ready-to-go.

If you can't do that for whatever reason, then the next best option is to rely on the GNU GPG keyring signed by Canonical or Redhat or whatever your favorite flavour of Linux icecream is. Update the package lists and install ca-certificates via plain insecure HTTP using any modern package manager, and the downloaded packages will be verified against a hashsum in a package list file whose checksum is GPG signed to guarentee perfect security. THEN you can use HTTPS / TLS safe and securely.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment