It seems like someone is launching a man-in-the-middle attack on you, which means they're trying to trick your computer into making secure connections to them, and then they'll make a secure connection to the computer you're actually trying to connect to, which allows them to view the connection unencrypted. LNet is doing what any software should do in this case, which is drop the connection to this rogue third party.

I didn't see if you answered whether this was a work computer or not. If so, then this is perfectly normal. It's their computer, their network, their rules. You can edit LNet to make it accept this unsecured connection. However, they will be looking at this usual traffic on this unusual port. You should consider the terrible things that are said on LNet, and know that your employer will likely associate those things with you, and almost certainly have cause to fire you.

If you're not on a work computer, you probably have some spyware that wants to insert ads into encrypted websites, steal passwords and bank info, etc. You should probably do something about that.

Anyhow, to make it work:

replace
Code:
			if OpenSSL::SSL::VERIFY_PEER == OpenSSL::SSL::VERIFY_NONE
				# the plat_updater script redefines OpenSSL::SSL::VERIFY_PEER, disabling it for everyone
				ssl_context.verify_mode = 1 # probably right
			else
				ssl_context.verify_mode = OpenSSL::SSL::VERIFY_PEER
			end
with
Code:
			ssl_context.verify_mode = OpenSSL::SSL::VERIFY_NONE

and replace
Code:
				echo "error: server certificate hostname mismatch"
				ssl_socket.close
				exit
with
Code:
				echo "warning: server certificate hostname mismatch: #{ssl_socket.peer_cert.subject.to_a.join(', ')}"