ghost43
ghost43
Good stuff, idea looks simple but useful. `serialize_proxy` and `deserialize_proxy` are a mess I would rather not make them even more complex. It's just a bad idea to try to...
The TorDetector class in the Qt network_dialog has logic to tell if a proxy is a Tor proxy, specifically this method: https://github.com/spesmilo/electrum/blob/e7304ce23ec90340dc8d12905267fdbd92c2492d/electrum/gui/qt/network_dialog.py#L534-L545 So this method could be moved out of...
see https://github.com/spesmilo/electrum/pull/9250
Are all affected users on macOS?
Also, is the cert self-signed or CA-signed? I expect self-signed from the domain, but can you confirm? Is that the case for all affected users?
Could you get someone who can reproduce to share the contents of the cert file on disk? So e.g. this file `/Users/xxx/.electrum/certs/192.168.1.175`
@scramblr that's unrelated. probably duplicate of https://github.com/spesmilo/electrum/issues/6686 see https://github.com/spesmilo/electrum/issues/6686#issuecomment-716548084 in particular
note: similar error message in https://github.com/spesmilo/electrum/commit/02a9ab80be819468352f773bd7120421868d38f0 (but related to CA-signed certs there)
If you are human, to make this useful, in the file you could just link to https://github.com/spesmilo/electrum/blob/master/SECURITY.md
> on some distributions like NixOS and Fedora Silverblue as there the /etc directory is read only Oh right, immutable distros. > just store the keyfile in `config.electrum_path()` or alternatively...