[conspire] Firefox Addons Being Disabled Due to an Expired Certificate

Rick Moen rick at linuxmafia.com
Sat May 4 15:06:59 PDT 2019


Quoting Leo P (yaconsult at gmail.com):

> https://www.bleepingcomputer.com/news/software/firefox-addons-being-disabled-due-to-an-expired-certificate/

I'm still undecided about whether Lawrence Abrams's 'bleepingcomputer.com' 
site is flakey -- but yeah, the immediate issue is/was an expired cert.
https://www.ghacks.net/2019/05/04/your-firefox-extensions-are-all-disabled-thats-a-bug/
https://www.engadget.com/2019/05/04/the-morning-after/

  If you use Firefox or Tor, you may have noticed a weird error message
  and a sudden lack of working extensions. That's because on Friday
  evening ET (midnight UTC/GMT) a certificate necessary to sign add-ons
  for the browser expired, making them suddenly invalid for use. At 6:50
  AM ET, the team announced they'd begun rolling out a fix that should be
  applied in the background -- make sure you have "studies" enabled to get
  it ASAP.

https://venturebeat.com/2019/05/04/mozilla-issues-firefox-fix-after-expired-certificate-disabled-all-add-ons/

  Mozilla has issued a hotfix to reactivate extensions for millions of
  users after they were disabled without warning late yesterday.
  [...]
  A hotfix is basically a piece of code that’s created as a temporary
  measure to fix a major fault before the next big product release is due.

  In this case, Mozilla is using Studies — a system through which the
  company tries out new features and ideas before they are released to all
  Firefox users — to automatically roll out a fix without the user having
  to do anything else.

  Studies is actually enabled by default, but if you’ve previously opted
  out of this, you’ll need to head to Options >> Privacy & Security >>
  Allow Firefox to install and run studies, and then tick the box.

  It can take a few hours for the fix to be applied, but to check if it
  has been, you can click “View Firefox Studies” to see whether the hotfix
  appended with “1548973” is in there.


But here's the (IMO) much bigger issue:  Is it acceptable that your
selected extensions can operate in/with your browser only if Mozilla,
Inc. permits them?  Personally, I would say 'No, not at all, not ever'.
And I would add that it's past time to give up on Mozilla-branded Firefox,
as their practices are inconsistent with open source principles and user
autonomy, and this has been obvious for years.


Starting with Firefox 41 in 2015[1], Mozila has enforced the requirement
that all extensions be signed by Mozilla, Inc. before the browser will
accept their installation in Firefox stable and beta versions
(https://wiki.mozilla.org/Add-ons/Extension_Signing).  To evade this
user restriction, one has several options:

1.  Firefox ESR prior to verison 45 (2016) still allowed disabling extension 
    signature checking.  But post-45 versions _removed_ that option.
2.  Firefox Developer or Firefox Nightly.  Current upstream release
    is 60.6.1.
3.  Use unbranded future variants Mozilla plans with retention of 
    the ability for users to disable extensions.  (They've promised
    this for four years but not delivered, so you're advised to not
    hold your breath waiting.)
4.  Variant browsers that have gone 'hell no' about going along with
    Mozilla, Inc.'s user-manipulation policies, such as Pale Moon.

Time to move on, mostly.


[1] In Firefox 40 (2015), unsigned extensions triggered a warning.  In 41
(2015), stable and beta versions defaulted to enforcing signatures, but
this could be disabled by setting about:config item
xpinstall.signatures.required to false.  Starting with 48 (2016), this
user-override ability was removed, and users subsequently have been 
_no longer permitted_ to run extensions not approved and
cryptographically attested by Mozilla, Inc.  Current upstream release is
66.0.3.




More information about the conspire mailing list