On Mon, Jun 27, 2016 at 09:28:06AM +0200, David Coppa wrote:
> On Mon, Jun 27, 2016 at 7:17 AM, Landry Breuil <[email protected]> wrote:
> > On Thu, Jun 23, 2016 at 05:24:58PM -0500, attila wrote:
> >> Hi ports@,
> >>
> >> Here is another try at the Tor Browser Bundle, updated to 6.0.2 just
> >> today.  I believe I have addressed all previous concerns:
> >>
> >> * Our extensions now live in /usr/local/lib/... and run directly from
> >>   there, they are not unpacked under the user's profile (enabledScopes
> >>   solved this);
> >> * addon PLIST files redone to just have the .xpi file;
> >> * No more hardcoded /usr/local paths
> >> * Only addons we actually have to patch are packaged by us; otherwise
> >>   we just wrap around the distributed .xpi (noscript, https-everywhere)
> >
> > Great stuff, thanks for spending the time to do all this right !
> >
> > Why are you overriding FETCH_CMD in noscript subdir ? That looks
> > wrong...
> 
> That's because it fails without "-S dont":
> 
> >> Fetch 
> >> https://secure.informaction.com/download/releases/noscript-2.9.0.11.xpi
> ftp: SSL read error: handshake failed: error:14090086:SSL
> routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
> 
> Probably it should be mirrored on a decent web server...

How... ironic. I think it'd actually be better to fetch it from
addons.mozilla.org, to stress that's the unmodified/official version.
Or get upstream to fix their ssl cert... which seems to be Let's Encrypt
powered, and is valid - opens in firefox.. so i dont get why ftp fails.

Landry

Reply via email to