I work in a small group inside of a large company.
All network traffic goes through the company's firewall, who I think acts like a Man-in-the-middle when any traffic comes in.
One example where I see this is when using curl
c:\>curl https://www.google.com
curl: (60) SSL certificate problem: self signed certificate in certificate chain
So I check the certificate chain with:
c:\>openssl s_client -connect google.com:443
And get back (with some details removed)
Certificate chain
0 s:/C=US/ST=California/L=Mountain View/O=Google Inc/CN=*.google.com
i:/C=US/My Company's Intermediate CA
1 s:/C=US/My Company's Intermediate CA
i:/C=US/My Company's Root CA
2 s:/C=US/My Company's Root CA
i:/C=US/My Company's Root CA
This provides a challenge for using package managers like npm or composer because everything https
fails due to the self-signed certificate error, or simply not being able to verify the certificate
I can get npm to work by setting the config values ca=""
and strict-ssl=false
, but that's an insecure practice.
I'd like our development team to have access to package managers, specifically npm and composer
Given I'm not going to be able to change how the firewall works, are there any changes can I make on the local machine (Windows 7) or VM (Windows server 2008 R2) that will allow our development team to fully utilize these package managers securely.
Thanks!!