Hi,

Thx to letsencrypt, i switched my server to full-https, and while here
setupped a signify key for the packages i build. That still means that
you need to trust me (and who am i to be trusted?), the root CA that
trusts letsencrypt, and upstream mozilla, but that was a nice
experiment, and somewhat requested. That doesnt mean i endorse all the
fluff and wanking around privacy/trust/whatnot...

Note the difference, since the server now uses HSTS, if you still use a
PKG_PATH pointing to http:// pkg_add might spew warnings when scanning
the repo:

Error from http://rhaalovely.net/stuff/i386/firefox-43.0rc1.tgz
Redirected to https://rhaalovely.net/stuff/i386/firefox-43.0rc1.tgz
Requesting https://rhaalovely.net/stuff/i386/firefox-43.0rc1.tgz

The git/cgit repo is now accessible over https if you want to build
packages yourself:

https://cgit.rhaalovely.net/mozilla-firefox/?h=release
git clone -b release https://git.rhaalovely.net/git/mozilla-firefox

The key & packages are on the same server:
$doas ftp -o /etc/signify/landry-mozilla-pkg.pub 
https://rhaalovely.net/stuff/landry-mozilla-pkg.pub
$PKG_PATH=https://rhaalovely.net/stuff/i386/ doas pkg_add firefox
(or)
$PKG_PATH=https://rhaalovely.net/stuff/amd64/ doas pkg_add firefox

And you can check that the package/PLIST is effectively signed by this
key:

$pkg_info -f /var/db/pkg/firefox-43.0rc1 |grep sign
@signer landry-mozilla-pkg
@digital-signature 
signify:2015-12-12T11:16:08Z:RWRh/RSo0GgoYkXCBR/rv1w+zIm3snIJ8vxil57GUaLunfMCjtwhrYtcW/HPH4x43KxrFn+vYYuekCwbc7jD1ZSEiI71HuMe2Ag=

Landry

> 

Reply via email to