I think such a document could go a long way to help people understand how 
Mozilla protects them, the limitations that are faced, and what happens when 
something goes wrong.  If they still feel like it isn't enough, then they can 
be prompted to suggest improvements to the process.

Speaking of improving the process, I agree with Daniel Veditz that the 
experimental add-ons should be made available on another site.  Even the term 
'experimental' gives the impression (to me anyway) that the add-on is potential 
beta quality, not potential pwnage.  Maybe 'unverified add-on' would be more 
appropriate.


- Bil


Sid Stamm wrote on 2/8/2010 3:56 PM: 
> Hi Bil,
> 
> I don't believe we have a document precisely along the lines of what you
> suggest (as far as I know) but we have these other documents that are
> sometimes helpful:
> 
> https://developer.mozilla.org/en/Security_best_practices_in_extensions
> https://addons.mozilla.org/en-US/developers/docs/policies
> https://addons.mozilla.org/en-US/developers/docs/policies/reviews
> 
> -Sid
> 
> On 2/7/10 10:02 AM, Bil Corry wrote:
>> Eddy Nigg wrote on 2/6/2010 7:04 AM: 
>>> Isn't it about time that extensions and applications get signed with
>>> verified code signing certificates? Adblock Plus is doing for a while
>>> now I think, perhaps other should too?
>>>
>>> Because this isn't really comforting:
>>> http://www.theregister.co.uk/2010/02/05/malicious_firefox_extensions/
>>
>> Not sure if it already exists, but it would be helpful if there was a 
>> document that describes the security practices of AMO; something that 
>> outlines the responsibilities of Mozilla, of the AMO developers, and the 
>> users, along with outlining the risks involved and what happens when they're 
>> realized (such as using the block mechanism).  That way, when news such as 
>> the above is reported, this document can be referenced.
>>
>> Threats to address, that at least I'm aware of:
>>
>> (1) Malware in add-ons (see above article)
>>
>> (2) Trusted add-ons subverting each other
>>
>>      
>> http://hackademix.net/2009/05/04/dear-adblock-plus-and-noscript-users-dear-mozilla-community/
>>      
>> (3) Untrusted add-ons doing bad stuff.
>>
>> (4) Fake add-ons posing as a trusted add-on:
>>
>>      http://www.webappsec.org/lists/websecurity/archive/2010-01/msg00128.html
>>
>> (5) Trusted add-ons that pose a security risk:
>>
>>      
>> http://blog.mozilla.com/security/2009/10/16/net-framework-assistant-blocked-to-disarm-security-vulnerability/
>>
>> (6) Subverting the update mechanism (this is for FF, but might apply to 
>> add-on updates too?):
>>
>>      
>> http://ha.ckers.org/blog/20100204/releasesmozillaorg-ssl-and-update-fail/
>>
>> (7) Subverting the blocklist mechanism (to disable, say, noscript):
>>
>>      https://support.mozilla.com/en-US/kb/Add-ons+Blocklist
>>
>>
>> I'm sure there are many many more.
>>
>> BTW, this presentation from OWASP DC names Eddy Nigg, Giorgio Maone, and 
>> developers at Mozilla (among others) as "The 10 least-likely and most 
>> dangerous people on the Internet":
>>
>>      
>> http://www.owasp.org/images/1/1f/The_10_least-likely_and_most_dangerous_people_on_the_Internet_-_Robert_Hansen.pdf
>>
>>
>> - Bil
> 

_______________________________________________
dev-security mailing list
dev-security@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security

Reply via email to