Hmm, so I'm not sure exactly where we came out on this discussion.  As Mounir 
pointed out, discussion of Wifi, Bluetooth and other network-y APIs should be 
held in those respective APIs (and yes, those have not yet been posted).  Is it 
likely that this API is really focused on certified apps that have the ability 
to change device settings, and trusted apps should limit access to either low 
risk and/or OS mediated settings (wallpaper being a good example)?
  Lucas.

--
"No one can make you feel inferior without your consent" - Eleanor Roosevelt

On Apr 15, 2012, at 11:16 PM, Lucas Adamski wrote:

> Please reply-to dev-weba...@lists.mozilla.org
> 
> Name of API: Settings API
> Reference: https://bugzilla.mozilla.org/show_bug.cgi?id=678695
> 
> Brief purpose of API: API to configure device settings
> General Use Cases: None
> 
> Inherent threats: 
> *Access sensitive configuration data (wifi passwords etc)
> *Change settings which might cost user money (data settings, roaming etc)
> *Safety implications (airplane mode? If you believe a plane can be brought 
> down by a mobile phone...)
> 
> Threat severity: High
> 
> == Regular web content (unauthenticated) ==
> Use cases for unauthenticated code:None
> Authorization model for normal content: None
> Authorization model for installed content:None
> Potential mitigations: N/A
> 
> == Trusted (authenticated by publisher) ==
> Use cases for authenticated code: Modify a specific setting - e.g. e-book app 
> modifies brightness in response to lighting conditions
> Authorization model: Implicit
> Potential mitigations: Limit access to benign settings
> 
> == Certified (vouched for by trusted 3rd party) ==
> Use cases for certified code: replacement settings manager app
> Authorization model: Implicit access to all settings
> Potential mitigations: None
> 

_______________________________________________
dev-security mailing list
dev-security@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security

Reply via email to