smicallef / spiderfoot

SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
http://www.spiderfoot.net
MIT License
13.25k stars 2.29k forks source link

self signed certificate in certificate chain when running with proxy #1823

Open eliuha opened 1 year ago

eliuha commented 1 year ago

I am running the scan within a proxied network and I get the following error. What is the best way to teach spiderfoot to trust my root certificate or stop testing for one?

2023-11-13 13:48:52,268 [INFO] sflib : Downloading configuration data from: https://publicsuffix.org/list/effective_tld_names.dat 2023-11-13 13:48:52,506 [ERROR] sflib : Unable to open option URL, https://publicsuffix.org/list/effective_tld_names.dat: HTTPSConnectionPool(host='publicsuffix.org', port=443): Max retries exceeded with url: /list/effective_tld_names.dat (Caused by SSLError(SSLCertVerificationError(1, '[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: self signed certificate in certificate chain (_ssl.c:997)'))) Process Process-2: Traceback (most recent call last): File "/Library/Frameworks/Python.framework/Versions/3.10/lib/python3.10/multiprocessing/process.py", line 314, in _bootstrap self.run() File "/Library/Frameworks/Python.framework/Versions/3.10/lib/python3.10/multiprocessing/process.py", line 108, in run self._target(*self._args, **self._kwargs) File "/Users/ichernyakov/tools/spiderfoot-4.0/sfscan.py", line 30, in startSpiderFootScanner return SpiderFootScanner(*args, **kwargs) File "/Users/ichernyakov/tools/spiderfoot-4.0/sfscan.py", line 206, in __init__ self.__sf.cachePut("internet_tlds", self.__config['_internettlds']) File "/Users/ichernyakov/tools/spiderfoot-4.0/sflib.py", line 291, in cachePut fp.write(data) TypeError: write() argument must be str, not None