Google Chrome rates Widelands installer as malicious
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
widelands |
Fix Released
|
High
|
Tino |
Bug Description
Google Chrome 17 checks Windows executable files after download and warns if they are malicious. Tino's builds [1] are rated as malicious since the new ggz replacement code is included. I don't know the exact criteria, but here are some:
- Google has a blacklist and a whitelist of files
- If the file is in none of these the website where it is downloaded from is checked [2]
However the executable has to be checked also, cause only these with the ggz replacement are affected.
The question is: Is the new network implementation insecure and that is what Google Chrome recognizes or us there another reason? I think it could scare some users if the new build is rated malicious by their browser so we should fix this before build17 IMHO
[1] http://
[2] http://
Changed in widelands: | |
status: | New → Confirmed |
Yes. I have been getting the warnings, too. I am sure that anyone unfamiliar with Tino's work, or doesn't know how to use checksums (i.e. md5 files) would be scared off.
I just attempted to download bzr6218 with Chrome 17 and recieved "win32.exe appears malicious"