[Bug 825865] Review Request: sslsplit - Transparent and scalable SSL/TLS interception

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



https://bugzilla.redhat.com/show_bug.cgi?id=825865

--- Comment #11 from Paul Wouters <pwouters@xxxxxxxxxx> ---
The sed lines usually fix a problem, so it won't silently cause something to
break. It will generally explode building if failed. I like it because I don't
have to create a trivial patchlet. Also it will never be submitted upstream, as
it removes ECC functionality, which is our own legal "problem", not upstream's.

openssl is already a buildrequire, mock builds work fine for me.

Fixed binary permissions from 775 to 755

I'm not sure I understand the ipv6 problem. On a stock Fedora install it seems
to work even if no ipv6 is there. it builds/tests for me on a system that does
not have ipv6 enabled in /etc/sysconfig/network. 

Spec URL: ftp://ftp.nohats.ca/sslsplit/sslsplit.spec
SRPM URL: ftp://ftp.nohats.ca/sslsplit/sslsplit-0.4.4-3.fc17.src.rpm

-- 
You are receiving this mail because:
You are on the CC list for the bug.
_______________________________________________
package-review mailing list
package-review@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/package-review



[Index of Archives]     [Fedora Legacy]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]