qt_host_installer.app version selection

On OS X Yosemite the qt_host_installer.app produce the following output during the “select version” if you selected the RP1 or RP2 platform.

It doesn’t normally.

You are likely behind a proxy, because that’s not the official page. Looks like you have Sophos on your computer or network which has blocked our website. Not sure why.

Try it in your browser yourself:

I actually fixed the warning last night:

When OS X builds resume, you will get a warning in the future to ensure you’re not behind a proxy server.

Hope this helps


Yes, you are correct, I using SOPHOS firewall…
I checked the link and and that is blocked because “Reputation limit”.
I will add to the white list…

What does “Reputation limit” mean? Is there a website where we can submit an exception to the Sophos website?



This means somehow that IP is currently classified suspicious. Here is the firewall log entry when I tried to open the link from browser:

2015:08:01-10:37:16 UTM9 httpproxy[32234]: id="0061" severity="info" sys="SecureWeb" sub="http" name="web request blocked, reputation limit" action="block" method="GET" srcip="xxx.xxx.xxx.xxx" dstip="" user="" ad_domain="" statuscode="403" cached="0" profile="REF_DefaultHTTPProfile (Default Web Filter Profile)" filteraction="REF_DefaultHTTPCFFAction (Default content filter action)" size="3218" request="0x91ba000" url="" referer="" error="" authtime="0" dnstime="0" cattime="28514" avscantime="0" fullreqtime="29866" device="0" auth="0" ua="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_4) AppleWebKit/600.7.12 (KHTML, like Gecko) Version/8.0.7 Safari/600.7.12" exceptions="" reason="reputation" category="204" reputation="malicious" categoryname="Malicious Downloads"

As I know you can submit URLs using the following link (product UTM):

I guess it would be more easier to manage if the qt_host_installer.app would use domain based url… (The AV companies does not like the magical IP-s :slight_smile: )

We do use a domain based URL (download.osmc.tv), which resolves to a mirror.

Thanks for the link


Or, AV vendors could stop listing things as suspicious with absolutely no grounds for doing so. For example Symantec can stop listing every new version of our Windows installer as malicious without any grounds for doing so, and despite the fact that we successfully applied to have every previous version whitelisted. (Wishful thinking…)

We have better things to be doing than requesting to every AV company under the sun to be white-listed for things that should never have been blocked in the first place except for the reason that AV vendors like to give the appearance of doing something, and scaring their users into keeping up their yearly subscriptions.

It’s somewhat amusing that Symantec Endpoint also marked every single Beta and RC release of the Windows version of Kodi as malicious and deleted it without a chance to recover it from quarantine, so it’s not only us that fall victim to overzealous AV products…

1 Like