Thank you all for participating in the B2G security discussion so far.  While 
the "uber-thread" has resulted in some very useful and creative discussion, it 
is clearly difficult to analyze such a complex model thoroughly without putting 
some more structure in place.  As such, we should break up this conversation to 
focus on each layer of the security model at at time, coming to a specific 
proposal before moving onto the next layer to ensure we establish a solid 
foundation for discussion.

As such after talking to Jonas and Andreas, I propose we talk through the 
following layers of the security model in order:

1) Get agreement on different "types" of applications (roughly corresponding to 
groupings of privileges organized by risk)
2) Talk through risks of each WebAPI and determine which of the above type(s) 
it belongs to (and whether access to it would be implicit or explicit)
3) Determine security implications and mitigations for each application type 
(CSP, HSTS++, CA pinning, signing, whatever)
4) Discuss the app lifecycle:
 a) publish
 b) install
 c) update
 d) revoke
5) OS security risks and mitigations
6) Review security model and compare against threat model

The goal is to do a full pass through this conversation in 2 weeks.  Obviously 
if new data emerges we might revisit previous decisions, but it'll be more 
productive if we can stake down some positions throughout the process and build 
upon them. 

I'm sending out the first phase (application types) after this email.
  Lucas.
_______________________________________________
dev-security mailing list
dev-security@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security

Reply via email to