Re: security novice :signed chrome? (revisited)

2003-06-19 Thread Mitchell Stoltz
rvj wrote:
My  concern with Mozilla is the ability of almost any  javascript hacker to
replace some of the chrome files
Replace chrome files how? Do you know of a way for an attacker to do 
this remotely? If so, please let me know, as we consider that very 
serious. If you're talking about an attacker sitting at the victim's 
keyboard, there's nothing we can do about that.
Unlike modifying C++ components (operating system or otherwise) , javascript
hacking requires VERY little experise
 to capture passwords etc.
Again, that assumes the attacker has a way of replacing those files. If 
they have a way of replacing files, they could replace chrome or native 
components, or the whole OS for that matter.

 -Mitch




Re: Privileges affect cookie validity

2003-06-17 Thread Mitchell Stoltz
I do believe you've found a bug. I'll take a look and try to fix it. Thanks!
 -Mitch
Thomas Pelzer wrote:
Hi,

when I create a privilege for www.domain.com, i. e.
UniversalPreferencesWrite, I get a prompt to grant the privilege. If
I allow this without enabling the option remember this decision, the
cookie behaviour will stay normal: sites in subdirectories can access
cookies valid for that subdirectory. Otherwise (with enabled option
remember this decision) two new lines will be added to my prefs.js:
user_pref(capability.principal.codebase.p0.id,
http://www.domain.com;);
user_pref(capability.principal.codebase.p0.granted,
UniversalPreferencesWrite);
and the cookie behaviour will change: all sites in subdirectories have
cookie-access as if they were in the root. They can no longer read
cookies from their own directories, and if they create a new cookie, it
will be valid for the root.
There seems to be no way to read subdirectory-cookies. Any idea?

Regards,
Thomas








Re: security novice :signed chrome? (revisited)

2003-06-17 Thread Mitchell Stoltz
What if your operating system files are compromised? There's no 
cryptographic verification there...

You are correct that local security issues did and continue to take a 
backseat to remote exploits. We assume that if an attacker can change 
files locally (or is sitting at your keyboard) then there's nothing we 
can do.

There has been no impetus for signature verification of local chrome 
files. However, if you can find some like-minded people who also want 
this feature, this would make a great Mozdev project.
 -Mitch

rvj wrote:
OK dumb question but is it potentially possible to have signed chrome which
could be authenticated when Mozilla starts up?
I know that signing is primary used for file transfer verfication but I am
more interested in preventing tampering at the
local workstation (i.e. tampering/ replacement of JAR files)

Instead of having to sign individual scripts, objects, etc, I would like to
sign  a  single chrome JAR file containing a collection of secure  files .
i.e. the signed chrome would be verified on startup using Mozilla certficate
security  methods.
I asked this question a couple of years ago and there didnt seem to be too
much concern for local security issues.
i.e. a security loophole that results in mozilla's application files being
compromised
I was trying to find out if things have moved on?






Re: 401 Unauthorized not clearing cache

2003-05-31 Thread Mitchell Stoltz
There's an open bug on that (don't know the number). I agree that it 
would be nice to have a logout buttin for HTTP auth. It's coming.
  -Mitch

Khomar wrote:
I am using windows authentication with .NET when I discovered a problem
with the Mozilla browser.  In IE and Netscape, if I return a 401 status
code, the authentication cache is cleared forcing the user to re-enter
their user name and password.  However, with Mozilla, I cannot seem to
clear the authentication cache without closing all of the opened Mozilla
browser windows.  Since all of the Mozilla windows use the same session
and authentication cache, there is no way to reliably log a user out
(after session timeout) and force a new login.
Is there a way to clear the authentication cache for Mozilla, or is this
a bug in the browser?  I have not been able to find any answers after
searching the Internet, so I thought I would try to post the problem
here.
Khomar




Re: 128-bit encryption not supported by Mozilla 1.3 ?

2003-04-02 Thread Mitchell Stoltz
You might want to file a bug in the Evangelism product at 
bugzilla.mozilla.org - our evangelists can show the owners of that site 
the error of their ways. All they have to do is support the standards, 
instead of proprietary extensions.
 -Mitch

KUROSAKA Teruhiko wrote:

This is very convincing evidence that my installation of
Mozilla 1.3 does support 128-bit encryption and they cannot
deny it.  I reported the problem to them.


So I complain them and their answer was the familiar
We don't support Mozilla period.
What surprises me further is that they do support
Netscape 4.x, but they don't Netscape 6 or 7.
T. Kuro Kurosaka





Re: grant dialog to show up again?

2003-01-21 Thread Mitchell Stoltz
Jens,
   Unfortunately, there's no user interface for doing that, but you can 
do it by editing your prefs file manually. Quit Mozilla (including the 
Fastload taskbar button), and edit the prefs.js file in your user 
profile directory. Delete all lines that start with 
capability.principal. Save, and restart Mozilla.
-Mitch

Jens Ansorg wrote:
hi,

on one site I clicked the remember this decision in the grant script
privileges ... dialog.

how can I undo this?
where do I have to delete something to make mozilla forget about the
desicion?


thanks
Jens






Re: Password Manager File

2002-12-09 Thread Mitchell Stoltz
TGOS wrote:


I was trustful that people actually think about such things like Does
it make sense to offer third party apps easy access to the data without
forcing them to use our libs. I didn't know that things like this are
never considered right from the start.


Who says it wasn't considered? There are a lot of things we could have 
done with Mozilla. We could have added a word processor, too, but we 
chose not to. If you feel that Mozilla is severely lacking becasue we 
chose not to provide an easy method for non-C-programmers to access a 
particular C-level API, while you're entitled to your opinion, you are 
probably in the minority.

The bottom line is, if you want help with your project, you are going 
about it in exactly the wrong way. No one who works on Mozilla is under 
any obligation to answer your questions. We make an effort to answer 
questions when people are polite, but nobody pays us to do it. Calling 
Mozilla engineers names and refusing to post in the correct newsgroup 
are not good ways to receive assistance. A little courtesy goes a long way.
-Mitch Stoltz




Re: Proposal: HTML tag to disable active content

2002-10-22 Thread Mitchell Stoltz
Interesting idea. We'd have to think about whether there would be any 
way for the malicious cross-site scripter to get the value of the random 
key attribute. If they could do so, they could generate a valid closing 
tag and proceed with active content.

It would be great to feellike there was something we could do about 
cross-site scripting on the browser end, however it's fundamentally a 
server configuration problem, and I think Ben's concerns are valid - a 
server-side library is a more robust solution which would cover all 
browsers, not just ours.
-Mitch


Ben Bucksch wrote:
IIRC, the argument on the www-html list was to make server-side libs. 





Re: signing a jsp file which contain javascript

2002-10-22 Thread Mitchell Stoltz
Unfortunately, there's no way to do that right now. There was some 
discussion of allowing pages sent via HTTPS to be treated as signed 
pages, but this has not happened yet. In the meantime, you'll need to 
put the script that needs to be signed on its own static page (you could 
include it in your jsp page as a hidden iframe) and it could then 
interact with the jsp-generated page via javascript.
   -Mitch

didier ernotte wrote:
Hi,

All the example I have read about the signtool and the syntax
jar:http://server/archive.jar!/file.html deal with static HTML pages.
How can I trust a JSP file called by a Servlet ?

Thank's

Didier






Re: disable security

2002-08-29 Thread Mitchell Stoltz

The simplest and most drastic change would be to open up 
mozilla/caps/src/nsScriptSecurityManager, and make the 
CheckPropertyAccessImpl function a no-op that always returns true. That 
will essentially disable all security and create a browser that's 
totally unsafe to be used on the public Internet.

Or, you could make a more specific change. Try adding these lines to 
defaults/pref/all.js:

pref(signed.applets.codebase_principal_support, true);
pref(capability.principal.codebase.foo.id, http://foo.com 
http://bar.com;);
pref(capability.principal.codebase.foo.granted, UniversalBrowserRead 
UniversalBrowserWrite);

Replace http://foo.com http://bar.com; with a space-separated list of 
the hosts to which your Mozilla-based tool needs to connect.

Hope this helps,
 -Mitch

hocus wrote:
 Hi!
 
 I need to tailor mozilla as a special-purpose tool. I want to disable
 security checks related to javascript and page source domain.
 I suppose it has something to do with principals, but so far I haven't
 succeeded in finding the correct place in source code to disable it. I would
 be very thankful if someone could tell me, what exactly I should change, to
 make possible using javascript on documents loaded into frames/iframes,
 originating from different domain than the base page.
 
 TIA
 Hocus
 
 






Re: Web application security w getstring

2002-06-13 Thread Mitchell Stoltz

Those long query strings can serve both purposes - security and 
customization. They do roughly the same thing as cookies, although each 
has its advantages and disadvantages.
  -Mitch

Justin wrote:
 I'm a newbie to web app security. Are URLs you see with long querystrings,
 for security reasons or to allow the end user to add to favourites (get the
 exact same page/situation back- url integrity). I'm learning how to maintain
 a 'session' with a logged-in user.
 
 Tks
 Justin
 
 
 






Re: turn off pop-up dialog?

2002-06-11 Thread Mitchell Stoltz

I don't know if it's possible to turn off that dialog, but here's 
something you can do: run a web server on the localhost (127.0.0.1) 
interface, and configure it to deliver a transparent 1x1 pixel image as 
its 404 not found page. Then image requests to sites on your blacklist 
will become invisible images instead of error messages.
-Mitch

xx wrote:
 I've added a bunch of onlines ads site names into
 my local hosts file and set them to 127.0.0.1,
 e.g.
   127.0.0.1 ads.doubleclick.net
 etc
 
 and the whole black list from junkbuster.
 
 However, mozilla keeps on popping up this dialog
 saying the connection was refused by such and such
 (one of the sites on the black list), whenever
 a web site is trying to download the ads from the
 black listed site.
 
 Could anyone tell if it's possible to turn that pop-up
 dialog off? Or tell mozilla to ignore any site that
 refuse connection?
 
 I'm not using junkbuster, 'cause it's slow and is having
 a lot of problem with our firewall.
 
 Any hint would be appreciated. Thanks
 
 xx
 






Re: Security manager blocks basic functionality - is this intended?

2002-05-13 Thread Mitchell Stoltz

Michael A. Borisov wrote:

Is this behaiour intentional?  Will I be able to do this once signed
scripts are supported in Mozilla?

netscape.security.PrivilegeManager.enablePrivilege('UniversalFileRead');
window.win = window.open('file:///C:/dir/subdir/whatever.html');
Signed scripts are supported in Mozilla, and yes, you can do this with 
signed scripts by enabling the UniversalBrowserRead privilege.

 
 
 And where I can read about
 netscape.security.PrivilegeManager.enablePrivilege() method in detail?
http://www.mozilla.org/projects/security/components/signed-scripts.html
and
http://www.mozilla.org/projects/security/components/signed-script-example.html

 -Mitch





Re: switching protocals (presume it's a security feature)

2002-05-03 Thread Mitchell Stoltz

Try adding this line to prefs.js, in your user profile directory, with 
Mozilla not running:

user_pref(security.checkloaduri, false);

Bear in mind, this might open up some security holes.
 -Mitch

mb wrote:
 attempting to have javascript bounce a user from an HTTP requested web page
 to a specific file housed somewhere on their internal network (to a computer
 without a an HTTP server)  If the intial page is HTTP://www.website.com/...
 and the .js trys to send them to file:file...  NS browsers simply go
 blank.  I presume this is to prevent malicious users from accessing a
 browsers file system but want confirmation.
 
 We're trying to open internal docs to the network via a web application /
 without forcing the documents into a Server Respository.
 
 If anyone can confirm or has ideas, please let me know
 
 
 thanks
 
 






Re: Can one view actual passwords stored in Password Manager (Netscape6.2.2)

2002-05-03 Thread Mitchell Stoltz

No, there's no way to retreive stored passwords in cleartext, not 
through Mozilla anyway. Someone should write a little utility that 
decrypts the stored password file - anyone interested in doing that?
-Mitch


Jeff wrote:
 I'd be grateful for any help you could offer...
 
 A couple of years ago I registered with seti@home through the ATT
 Worldnet ISP.  Now of course I'm with a new provider, and I can't
 remember the password.  Since my old email account is dead, I can't
 request the password from the seti@home website.  It is, however,
 stored in Password Manager (though seti@home doesn't make use of that
 info).  Is there any way to retrieve what the actual password is?  The
 encryption option is off for all the passwords, would a search for
 relevant text strings in the Netscape folders (Seti, berkeley, for
 exmpl) using START|FIND turn up anything?
 
 Not a major life crisis, I know, but I do have over a year of CPU time
 credited to the account, and I'd hate to start all over again unless I
 really needed to.
 
 Thanks in advance,
 Jeff






Re: window.opendialog security

2002-04-19 Thread Mitchell Stoltz

rvj wrote:

 Havent looked at the CVS yet and it looks like a simpler approach than
 downloading  'remote package' definitions
 
There is, to my knowledge, no such thing as a 'remote package.
In fact, we specifically disabled remote chrome, and if it has been 
re-enabled,
it was without my knowledge. Please be clear on this point: Pages get 
privileges based on where they come from, NOT what language they're 
written in. Anything loaded from the local chrome directory using a 
chrome: URL, whether XUL or HTML, is fully privileged. Anything loaded 
from the network, or from the local drive outside the chrome directory, 
whether XUL or HTML, is untrusted by default, but can gain privileges by 
being signed.

Remotely loaded chrome has not been implemented yet. Frankly, it makes 
me very nervous and would require a lot of careful security review. It 
would also require signing or some other sort of cryptographic verification.
  -Mitch





Re: window.opendialog security

2002-04-15 Thread Mitchell Stoltz

openDialog allows a nasty exploit, which is why it can't be called from 
content. You should be able to do whatever you need to do using open() 
instead.
-Mitch


rvj wrote:
 It seems that openDialog in a remote xul file is thrown out by the xul
 parser
 
 However  if I just use window.open, the new window is created
 
 I noticed this when using the reload button on the remote xul. It generates
 
 XML Parsing Error: unclosed token
 Location: http://host/remote.xul
 Line Number 35, Column 1:/wi
 ^
 
 
 






Re: jar:http://www.site.com/myjar.jar!/signed.html does not work - how do I sign scripts

2002-03-13 Thread Mitchell Stoltz

What version of Netscape are you running? 6.2 hangs on signed scripts; 
the problem was fixed in 6.2.1.
  -Mitch


RL Clippard wrote:
 I assume that since Netscape 6 is not mostly Mozilla that it has adopted
 Mozilla's technique for signing scripts. In the doc Signed Scripts in
 Mozilla
 (http://www.mozilla.org/projects/security/components/signed-scripts.html),
 it says that the Netscape way (using ARCHIVE) will not work and that I
 should use jar:http://www.site.com/myjar.jar!/signed.html;. However when I
 try this approach, it just hangs resolving the host - no errors but no
 results either. However it works if I reference the local drive.
 
 What am I doing wrong?
 
 
 
 






Re: Java applets+proxy server security problem: what about Mozilla?

2002-03-06 Thread Mitchell Stoltz

If you're using the latest JRE with Mozilla, then you're protected. 
AFAIK, Sun has fixed the issue.
-Mitch

Derek Lee wrote:
 Hi,
 
 I read about the security issue below involving Java applets:
 
 http://www.theregister.co.uk/content/55/24295.html
 
 What to do with Mozilla? I am using the Sun J2RE 1.4 plugin.
 
 -Derek
 






Re: Accessing files in Signed Jar over https fails

2002-03-06 Thread Mitchell Stoltz

Lloyd,
It's probably a bug; I'll look into it.
  -Mitch

Lloyd Colling wrote:
 Hi all,
 
 I have made a test html page called test.html, in which the content
 is:
 
 htmlheadtitletest/title/headbodytest page/body/html
 
 This was then signed and jar'ed using the netscape signing tool:
 
 signtool -k testkey -Z test.jar ./
 
 This jar was then put onto a webserver. This webserver supports both
 http and https (using mod_ssl, if you really want to know...). The
 browser being used for the test is Mozilla 0.9.8 release build. When
 accessing the jar using the form:
 
 jar:http://192.168.2.1/test.jar!/test.html
 
 The page loads fine and is displayed. However, when accessed using:
 
 jar:https://192.168.2.1/test.jar!/test.html
 
 The browser displays 'transferring data' in the status bar, and stays
 like that. The browser is still responsive, but the page never loads.
 Anyone with any ideas on what's going on here? Is this a bug?
 
 Thanks all,
 
 --
 Lloyd Colling
 






NB: Change in configurable security policies

2002-02-12 Thread Mitchell Stoltz

I'm about to make a change in the way configurable security policies are 
stored, and I wanted to let everyone know. The instructions at 
http://www.mozilla.org/projects/security/components/ConfigPolicy.html 
still apply, except for the following change: When you create one or 
more site-specific policies, you must add one additional line to prefs, 
that looks like this:

user_pref(capability.policy.policynames, mypolicy);

where mypolicy is the name of the policy you created. For example, if 
you want to stop all popup windows from appearing on yahoo.com, you 
might use these prefs:

user_pref(capability.policy.annoyingsites.sites, http://www.yahoo.com;);
user_pref(capability.policy.annoyingsites.Window.open, noAccess);

As of tomorrow's build, you will have to add this line as well:

user_pref(capability.policy.policynames, annoyingsites);

As of tomorrow, site-specific policies *will not work* without adding 
this line. If you have more than one site-specific policy, add their 
names to the policynames line; do not add a second policynames line. 
For example,

user_pref(capability.policy.policynames, annoyingsites, spamsites, 
othergroup);

Use commas and/or spaces to separate the names. Also note that the 
default policy is unaffected and doesn't need to be listed on the 
policynames line. If you don't use site-specific policies you can ignore 
this message.

I apologize in advance for the added hassle, but this change makes 
possible a major performance boost. This is bug 119646 if anyone's 
curious. I'm going to update the docs as well.
-Mitch





Re: setting event.screenX/screenY ?

2002-02-01 Thread Mitchell Stoltz

Any content loaded as chrome has no security restrictions at all, and 
you shouldn't have to call enablePrivilege. XUL files which are not 
loaded as chrome (installed in the browser chrome directory and accessed 
with a chrome:// URL) are treated exactly the same as HTML files. If you 
load a XUL file via the Open File dialog, that's the equivalent of using 
the file: protocol, which requires enablePrivilege calls.

If you're still having trouble, please send me a complete, minimal 
testcase that demonstrates the problem, and I'll try to diagnose it.
  -Mitch


rvj wrote:

 PS Ive tried using just the file references as you suggest
 
 Ive  opened the test xul file via Mozilla's  open file option but even
 though I get the Internet Security dialog box asking me to allow enhanced
 priviliges and accept,   setting the event's screenX or screenY property
 still fails
 
 Can you confirm that Mozilla  should be able to set these javascript
 attributes/properties as follows
 
 function mousedowns(event)
 {
 
 netscape.security.PrivilegeManager.enablePrivilege(UniversalBrowserWrite);
 
alert(before+event.screenX)
event.screenX=event.screenX+1
alert(after+event.screenX)
 }
 
 
 
 






Do not post SSL questions to this newsgroup, please

2002-02-01 Thread Mitchell Stoltz

*please* post all questions regarding SSL, HTTPS, certificate 
management, and any other crypto or PKI issues to 
netscape.public.mozilla.crypto. This newsgroup is for non-crypto 
security issues.

Thanks,
Mitch Stoltz





Re: setting event.screenX/screenY ?

2002-01-31 Thread Mitchell Stoltz

One of three conditions must be true in order to call enablePrivilege:
1. The script is signed
2. The script is local (loaded from the local drive with the file: protocol)
3. Codebase principals are enabled in the browser. THis is intended as a 
debugging feature only, not for end users.

Please see 
http://www.mozilla.org/projects/security/components/signed-scripts.html

which explains this in more detail.
   - Mitch

rvj wrote:

 Does Mozilla support
 netscape.security.PrivilegeManager.enablePrivilege(UniversalBrowserWrite)
 
 or is it only available for signed scripts?
 
 In the example below Im trying to set the event screenX and screenY values
 to point to the center of the current window
 
 
 
 
// enable security for universalbrowserwrite

 netscape.security.PrivilegeManager.enablePrivilege(UniversalBrowserWrite);
 
 
// setting the event screenX/screenY values to center of window fails
 event.screenX=window.screenX+(window.outerWidth/2)
 event.screenY=window.screenY+(window.outerHeight/2)

 
 
 PS Where can I get a list of Mozilla security privileges options
 
 
 
 
 
 
 






Re: netscape.security.PrivilegeManager.enablePrivilege(UniversalXPConnect) in 096

2001-12-05 Thread Mitchell Stoltz

Could you send me a testcase, along with actual and expected results? I 
need more information to know what's gone wrong. You can send it to me 
privately at [EMAIL PROTECTED] if you don't want to post it.
  -Mitch

Thad Hoffman wrote:

 this is not working for me in build 096. (or 095 for that matter)
 Works in Netscape 6.1 and 6.2 and my old 091 build
 
 Just curious as to why it might have changed. I cannot connect to  a 
 different domain now. Same set up as before, only the client versions 
 have changed. Running on OSX.
 
 Again, it works fine for the previous builds.
 






Re: netscape.security.PrivilegeManager.enablePrivilege(UniversalXPConnect) in 096

2001-12-05 Thread Mitchell Stoltz

Thad Hoffman wrote:


 stupid question, when I try to edit the all.js file I get an alert that 
 the file is checked into a source control system and asks if I want to 
 modify the code readonly... Would this be affecting the above code and 
 causing the no privilege error?
 I am using the build provided by the 0.9.6 milestone link
 
No, that shouldn't affect anything. If you change modules/libpref/src/init/all.js,

you need to make in that directory or manually copy all.js to
bin/defaults/pref.
  -Mitch







Re: Handling pop-ups

2001-11-28 Thread Mitchell Stoltz

We knew that was inevitable. You can block all pop-ups by adding this 
line to prefs:
user_pref(capability.policy.default.Window.open, noAccess);

However, this will block some legitimate (non-advertisement) pop-up windows.

Eventually, we will add the ability to block Window.open() calls in 
response to mouseover and other event types, however this is more likely 
to block more legitimate uses of popup windows.
-Mitch

Andrew Mutch wrote:

 The ability to block pop-ups is a HUGE advancement in Mozilla.
 However, now people are reporting ads that occur from a mouseover a
 link that causes an ad to pop-up.  Is there a way to block these from
 occuring without disabling Javascript completely?
 
 Andrew Mutch
 






Re: enable privilege not granted.

2001-10-16 Thread Mitchell Stoltz

Ramya,
You need to enable codebase principals or else sign your scripts. See
http://www.mozilla.org/projects/security/components/signed-scripts.html

for more information.
 -Mitch

Ramya wrote:

 Hi,
 
 I am using Mozilla0.9. While trying to access XUL files from server
 (Apache Web Server) that uses XPCOM, I encounter a js file error
 
 enable privilege not granted
 
 how to over come this error and access XPCOM components.
 pls reply
 
 
 
 
 






Re: whoops, the diff was garbled

2001-10-09 Thread Mitchell Stoltz

Christopher Blizzard wrote:


 Yes, please.  In fact, I would just say shorten that to 
 [EMAIL PROTECTED] instead of the overly-obscure 
 [EMAIL PROTECTED] and just use [EMAIL PROTECTED]


security means different things to different people. I was thinking 
that making the address of the list reflect its purpose rather 
specifically will lower the amount of noise on the list.
security could be interpreted as security feature development, for 
example, or as physical security ([EMAIL PROTECTED] is supposed to 
be an engineering list, but it gets mail for campus security all the time).
[EMAIL PROTECTED] is long, but why do you call it 
obscure? Seems pretty straightforward to me.

If people don't think that calling it security-bug-reports will cut down 
on noise, or that brevity is more important, then we'll go with 
[EMAIL PROTECTED]

What about the other list address, [EMAIL PROTECTED]?


 Seriously, a .announce style mailing list is a good idea.
Sounds fine to me, although I think the authoritative list should be a

webpage. We can do a mailing list too.


Ben Buchsch wrote:
  Everybody on the security bug group should be able to subscribe to the
  security bug reports list.

Everything I get from the bug reports address will be posted to a bug 
right away, and the security group can view it there. That way we won't 
have people filing duplicate bugs from the same problem report.

-Mitch








Re: Security Group Proposal, Draft 7

2001-10-09 Thread Mitchell Stoltz

Please keep in mind that we are creating TWO mailing lists, one to 
receive security bug reports from outside and one for internal discussion.

It sounds like people are saying they want [EMAIL PROTECTED] to be 
the address where people not on the security group can send security bug 
reports. Yes, this is one of the traditional addresses to use for this 
purpose, as several people have pointed out. However, no one has 
directly responded to my question: I think security is ambiguous, and 
doesn't precisely describe the purpose of the address, which means it 
may attract more off-topic posts. People may think it's for discussion 
of cryptography engineering or physical building security or the 
security of Mozilla servers, none of which is the case. More off-topic, 
irrelevant posts to this address means more work for the maintainers.

My question is, is this a valid concern? If most of you think we should 
use [EMAIL PROTECTED], then I'm fine with that, but I'd like to 
hear opinions about this point.

The second mailing list is for discussion among security group members. 
Having a very specific name is not so impotant in this case, and short 
is good, but if we're going to use [EMAIL PROTECTED] for the bug 
reports address, we'll have to pick another for the group discussion 
address.
-Mitch

Mike Shaver wrote:

 Brendan Eich wrote:
 
 I must now channel jwz's ghost and object to lack of hyphens and 
 cybercrud grp in the last.  If short wins, why not 
 [EMAIL PROTECTED]?  Otherwise, -group it.
 
 
 [EMAIL PROTECTED] is the traditional notification address, I think.
 
 Mike
 






Security Group Proposal, Draft 7

2001-10-08 Thread Mitchell Stoltz

In addition to the changes Frank requested, I've rewritten the section 
about a 'known vulnerabilities' page on mozilla.org to clarify what it's 
about, and I changed the section about mailing lists. As I discussed 
with staff, we should have separate lists for discussion and outside bug 
reports.

Please give me your comments on these changes. Bear in mind they were 
made by me alone and are just a proposal - they are open to debate. 
Also, please outline what issues still need to be discussed. Mozilla 
staff (and I) would like to finalize this policy by this Friday, 10/12.

This draft includes a link to a Known Vulnerabilities page. Is it in a 
good location? I plan to link to it from projects/security/index.html 
and projects/security/components/index.html.

Do you like the names of the mailing lists, 
[EMAIL PROTECTED] and [EMAIL PROTECTED]? 
Should we use shorter names? I wanted to make it very clear what each 
one is for.

 -Mitch

Title: Handling Mozilla Security Bugs







Handling Mozilla Security Bugs


Version 1.0
DRAFT 7
October 8, 2001



Introduction

In order to improve the Mozilla project's approach to resolving
Mozilla security vulnerabilities, mozilla.org is creating more formal
arrangements for handling Mozilla security-related bugs. First,
mozilla.org is appointing a security module owner charged with primary
responsibility for coordinating the investigation and resolution of
reported Mozilla security vulnerabilities; the security module owner
will have one or more peers to assist in this task. At the same
time mozilla.org is also creating a larger "Mozilla security bug group"
by which Mozilla contributors and others can participate in addressing
security vulnerabilities in Mozilla. This document describes how this
new organizational structure will work, and how security-related
Mozilla bug reports will be handled.

Note that the focus of this new structure is restricted solely
to addressing actual security vulnerabilities arising from problems
in Mozilla code. This work is separate from the work of developers
adding new security features (cryptographically-based or otherwise)
to Mozilla, although obviously many of the same people will be involved
in both sets of activities.

Note also that the scheme described in this document will
completely replace the traditional practice of marking
security-related Mozilla bugs as "Netscape Confidential." The mozilla.org
Bugzilla system is being modified to remove the ability
to mark bugs as "Netscape Confidential," and to instead implement
the scheme described below.


Background

Security vulnerabilities are different from other bugs,
because their consequences are potentially so severe: users'
private information (including financial information) could be
exposed, users' data could be destroyed, and users' systems could
be used as platforms for attacks on other systems. Thus people have
strong feelings about how security-related bugs are handled, and in
particular about the degree to which information about such bugs
is publicly disclosed.

The Mozilla project is a public software development project,
and thus we have an inherent bias towards openness. In particular,
we understand and acknowledge the concerns of those who believe
that all information about security vulnerabilities should be
publicly disclosed as soon as it is known, so that users may take
immediate steps to protect themselves and so that problems can get
the maximum amount of developer attention and be fixed as
soon as possible.

At the same time the Mozilla project receives substantial
contributions of code and developer time from organizations
that use (or plan to use) Mozilla code in their own product
offerings. Some of these products may be used by large populations
of end users, many of whom may not often upgrade or check for
recent security fixes. We understand and acknowledge the concerns
of those who believe that too-hasty disclosure of exploit
details can provide a short-term advantage to potential attackers,
who can exploit a problem before most end users become aware of
its existence.

We believe that both sets of concerns are valid, and that both
are worth addressing as best we can. We have attempted to create
a compromise scheme for how the Mozilla project will handle
reports of security vulnerabilities. We believe that it is a
compromise that can be justified to those on both sides of the
question regarding disclosure.


General policies

mozilla.org has adopted the following general policies for
handling bug reports related to security vulnerabilities:


Security bug reports will be treated as special and handled
differently than "normal" bugs. In particular, the mozilla.org
Bugzilla system will allow bug reports related to security
vulnerabilities to be marked as
"Security-Sensitive," and will have special access control features
specifically for use with such bug reports. However a security
bug can revert back to being a normal bug (by having the

whoops, the diff was garbled

2001-10-08 Thread Mitchell Stoltz

Left the file extension off the diff file, which garbled it. So, I'm 
sending it again.
   -Mitch


*** security-bugs-draft6.html   Mon Oct  8 20:00:15 2001
--- security-bugs-draft7.html   Mon Oct  8 20:26:16 2001
***
*** 1,6 
  !DOCTYPE HTML PUBLIC -//W3C//DTD HTML 4.01//EN
  http://www.w3.org/TR/html4/strict.dtd;
- 
  html
  
  head
--- 1,5 
***
*** 20,27 
  
  div class=version
  Version 1.0br
! DRAFT 6br
! September 30, 2001
  /div
  
  
--- 19,26 
  
  div class=version
  Version 1.0br
! DRAFT 7br
! October 8, 2001
  /div
  
  
***
*** 194,205 
  have visibility into all Bugzilla data hosted through
  mozilla.org.)/p
  
! pThe Mozilla security bug group will have a private mailing list
  to which everyone in the security bug group will be subscribed. This
! list will act as the well-known address to which users can submit
! new security bugs, as well as a forum for discussing group policy
! and the addition of new members, as described below./p
! 
  
  h3Other participants/h3
  
--- 193,209 
  have visibility into all Bugzilla data hosted through
  mozilla.org.)/p
  
! pThe Mozilla security bug group will have a private mailing list,
! [EMAIL PROTECTED],
  to which everyone in the security bug group will be subscribed. This
! list will act as a forum for discussing group policy
! and the addition of new members, as described below. In addition,
! Mozilla.org will maintain a second well-known address,
! [EMAIL PROTECTED], through which people not
! on the security group can submit reports of security bugs. Mail
! sent to this address will go to the security module owner and peers,
! who will be responsible for posting the information received to a
! security bug./p
  
  h3Other participants/h3
  
***
*** 316,336 
  complete bug report)./li
  /ul
  
! pWhen a bug is put into the security group, the security
  group members, bug reporter, and others associated with the bug
! will decide, either through comments on the bug or the security group
! mailing list, whether an immediate warning to users is appropriate
! and how it should be worded. This warning should mention the existence
! of a vulnerability, which features or modules are affected, and a
! workaround, if one exists. The module owner, a peer, or some other
! person they may designate will post this message to a 
! Known Vulnerabilities page, which will be maintained at a well-known
! location on on www.mozilla.org. These messages will contain all of the
! information that the security group has agreed to be safe for
! immediate public disclosure. Mozilla distributors who wish to inform
! their users of the existence of a vulnerability may repost these
! messages to their own websites, mailing lists, release notes, etc, as
! long as they don't disclose any additional details about the bug./p
  
  pThe original reporter of a security bug has the primary
  responsibility for deciding when that bug will be made public;
--- 320,354 
  complete bug report)./li
  /ul
  
! pWhen a bug is put into the security bug group, the
  group members, bug reporter, and others associated with the bug
! will decide by consensus, either through comments on the bug 
! or the group mailing list, whether an immediate warning
! to users is appropriate and how it should be worded. The goals
! of this warning are:/p
! 
! ul
! lito inform Mozilla users and testers of potential security
! risks in the versions they are using, and what can be done to
! mitigate those risks, and/li
! 
! lito establish, for each bug, the amount of information a
! distributor can reveal immediately (before a fix is available)
! without putting other distributors and their customers at risk./li
! /ul
! 
! pA typical warning will mention the application or module
! affected, the affected versions, and a workaround (e.g. disabling
! JavaScript). If the group decides to publish a warning, the module owner,
! a peer, or some other person they may designate will post this
! message to the
! a href=http://www.mozilla.org/projects/security/KnownVulnerabilities.html;
! Known Vulnerabilities/a page.
! Mozilla distributors who wish to inform
! their users of the existence of a vulnerability may repost any
! information from the Known Vulnerabilities page
! to their own websites, mailing lists, release notes, etc., but
! should not disclose any additional information about the bug./p
  
  pThe original reporter of a security bug has the primary
  responsibility for deciding when that bug will be made public;
***
*** 370,376 
  /ul
  
  pIf disputes arise about whether or when to disclose information
! about a security bug, the security group will discuss the issue via
  its mailing list and attempt to reach consensus. If
  necessary mozilla.org staff will serve as the court of last
  resort./p
--- 388,394 
  /ul
  
  pIf disputes arise about whether or when to disclose information
! about a security bug, 

Re: DOM access to disable saved passwords

2001-10-03 Thread Mitchell Stoltz

I don't think it's a standard, but Netscape 6 and IE 6 both support it, 
to my knowledge.
-Mitch

dh wrote:

 This does seem to work, but is it a W3C standard?  I've never seen this 
 attribute before.
 
 Thanks
 
 Henrik Gemal wrote:
 
 You mean in forms?
 form autocomplete=off

 dh wrote:


 Is there a method for javascript to disable the saving of passwords for
 my site?  If so, what is it?

 Thanks
 [EMAIL PROTECTED]


 -- 
 Henrik Gemal, [EMAIL PROTECTED]
 Webmail Evangelist
 Opasia

 http://card.gemal.dk



 






Re: New proposal for handling security bugs

2001-10-02 Thread Mitchell Stoltz

Mitchell Stoltz wrote:


  If there were really a bug serious enough to delete a user's hard 
 drive, we (the various vendor reps and security folks) will discuss via 
 the security newsgroup what the appropriate response should be. Bugs of 
 this severity are *rare* and can be handled as they come along.
 

Sorry, I meant to say the security bug group mailing list, not the 
security newsgroup.

Ben, to reiterate, instead of shooting down our proposal point by point, 
how about giving us your own proposal?
 -Mitch





Re: security regarding of javascripting through xpconnect

2001-09-28 Thread Mitchell Stoltz

Glad you asked...

Chris Shen wrote:


 1. a back-channel notification from javascript to the customised browser 
 app which implements some kind of the callback (notification) service 
 interface.

I'm sure this is possible with XPConnect; don't know the details though.


 
 2. no privilege popup dialog occurs. -- this may be done by pref conf.


 
 3. the javascript only has certain permittable scripting 
 into the customised xpcom callback service without requiring signing the 
 scripts rather than access
 
 a range of xpcom services with signing.


These are both currently possible, and without the need for any 
additional plugins or other security mechanisms. You can set prefs to 
make any XPCOM class accessible from unsigned JS with no confirmation 
dialog. The only requirement is that the class you want to give access 
to must implement nsIClassInfo. See
http://lxr.mozilla.org/seamonkey/source/xpcom/doc/nsIClassInfo-overview.html
for info on ClassInfo and
http://www.mozilla.org/projects/security/components/configPolicy.html
for how to configure the prefs. Please email me if you have any questions.
-Mitch





Re: !somebody hacking my PC,HELP

2001-09-25 Thread Mitchell Stoltz

Don't panic. Someone's probably just browsing your network shares. Cable 
modems are like Ethernets - anyone on the same circuit can see all 
trafic bound for others' machines. You might want to disable file 
sharing. You might also want to invest in some personal firewall 
software - there are several good packages to choose from.

Just because you see your drive light blinking doesn't mean someone is 
attacking your computer - their computer could just be scanning the 
local network for active shares.
-Mitch


[EMAIL PROTECTED] wrote:

 My PC connect to internet through cable modem, this few days, something strange 
happened, my PC running Win2000, harddisk always read and write, I had share some 
directory, and when I disconnect the sharing, error message 1 files opened by .
 
 How should I know any attack and trace the illegal attack, like any file log to show 
the attack?
 
 any protection can recommend.
 
 thanks in advance
 
 please email [EMAIL PROTECTED]
 
 
 
 






Re: Better Popup Window Blocking has arrived

2001-09-24 Thread Mitchell Stoltz

[EMAIL PROTECTED] wrote:


 Can you also start a timer to clear this condition?  Or maybe clear
 it when the stop button is pressed?
 
 -Mike
 


Not currently, but those are good ideas, so I think I'll use them.
  -Mitch








Re: Blocking a specific popup window

2001-09-17 Thread Mitchell Stoltz

I think this is a bug. Try putting these lines in all.js (and use pref 
instead of user_pref. all.js is in the Mozilla application directory 
under defaults/pref.
-Mitch

Andreas Premstaller wrote:

 Found this problem on a german discussion forum:
 
 I try to block popup windows and warnings from this specific site 
 http://www.burschenschaft-michelsberg.de;
 by using these lines in my prefs.js according to 
 http://www.mozilla.org/projects/security/components/configPolicy.html;.
 
 ...
 user_pref(capability.policy.strict.Window.alert, noAccess);
 user_pref(capability.policy.strict.Window.confirm, noAccess);
 user_pref(capability.policy.strict.Window.open, noAccess);
 user_pref(capability.policy.strict.Window.prompt, noAccess);
 user_pref(capability.policy.strict.sites, 
 http://www.burschenschaft-michelsberg.de/;);
 ...
 
 Yet both alert and popup-window come up. Am I doing something wrong, is 
 this a bug or is the site using some smart workaround around the 
 blocking?
 
 Thanks,
 Andreas
 
 





Re: Project Cheese - Mouse movements on website tracked

2001-09-12 Thread Mitchell Stoltz

Ben Bucksch wrote:


 Really? How? As I see it, 
 http://www.mozilla.org/projects/security/components/configPolicy.html 
 describes only, how to disable JavaScript functions, not the triggers, 
 i.e. HTML attributes. That's what bug 64737 is about, not?
 
 


Correct - we can't disable JS by event just yet.
-Mitch







Web content filtering - can we use this idea?

2001-09-10 Thread Mitchell Stoltz

Privacy enthusiasts, take a look at

http://spywaresucks.org/prox/index.html

it's software that runs regexps on incoming web pages. The author has 
written regexps that do all kinds of interesting content filtration: 
popup blocking, banner ad blocking, filtering various types of annoying 
content, and cookie filters (by filtering http headers and/or Javascript).

Could we incorporate any of this guy's ideas into Mozilla? Please look 
through his list of filters and let me know of any you'd particularly 
like to see implemented in Mozilla.

Should we use a mechanism like his? I think we can do him one better by 
tying into the HTML parser and the security manager - for example, his 
regexps can remove onUnload handlers, but we can allow them to run while 
preventing them from opening windows.

   Thoughts?

  -Mitch





Re: NS6.1/Linux Security Manager stops/crashes browser

2001-09-10 Thread Mitchell Stoltz

Reposting to .crypto, followup there. Just a hint, don't wait for the 
next release without finding out if a bug is going to be fixed. Be 
proactive - search at bugzilla.mozilla.org and see when the bug is 
scheduled to be fixed.
 -Mitch

Iztok Kobal wrote:

 I installed NS6.0 as root, lately upgraded to 6.1 on Suse6.4 (2.2.14). 
 When I try to access Security Manager as other user than root, NS6.1 (as 
 well as 6.0 did) stops execution - only killing processes helps to get 
 rid of stallen browser. As root it works well.
 
 
 I waited for 6.1 - thought that this matter would be corrected. Is this 
 intentionally made on Linux, namely on WIN32 there is no such 
 restriction ?!
 





Re: Better Popup Window Blocking has arrived

2001-09-05 Thread Mitchell Stoltz


Giuseppe Verde wrote:


 Also, are there any plans to add something along the lines of NoAction
   (pretend that the function call worked so that the script thinks all
   is OK and doesn't get aborted, as happens with NoAccess)?
 
Yes, I plan to add that. Although if we make window.open be a no-op, the script is

 likely to fail later when the object it's holding turns out not to be a valid

window.

   -Mitch






Re: Better Popup Window Blocking has arrived

2001-09-04 Thread Mitchell Stoltz


Jason Bassford wrote:


I know you said that this patch may *sometimes* 1% give an
 unwanted popup.  Is there any chance that it could also sometimes
 prevent a popup that you do want?


Of course. This isn't perfect. Like I said, if you hit Stop during a 
load, the blocker bit may not be cleared, and no calls to window.open, 
wanted or unwanted, will work on that page until it is reloaded.

Besides, maybe there's something that gets popped up on load or unload 
that you do want to see. I doubt it. I'll build in the ability to create 
an exception list for those cases should one arise.


 
In all of these security type fixes (popups and cookies) I can see
 how it might sometimes be useful to get some kind of status or
 indication that somethings being prevented so that you can troublshoot
 cases like this.  However, doing so in a non-intrusive manner is
 something else.  (It would have to be a tray icon or something
 similiar that flashes briefly when the blocking is in effect, that
 would also let you click on it to get a log of recent activity.)


That's a good idea - a tray icon. Best solution to that problem I've 
heard yet. The log of recent activity could be the JS console, which 
actually gives some status messages which don't pertain to JS. Let's do 
something like this - it could also handle the security error messages 
from CheckLoadURI and others for which people have complained that they 
can't tell when something's been blocked.
-Mitch





Re: Security manager blocks basic functionality - is this intended?

2001-08-24 Thread Mitchell Stoltz

Yes, this is intentional. A script from the web can't window.open a 
local file. This allows a number of exploits, generally involving 
running a javascript file in a well-known location on your local 
filesystem, or attempting to open a special device file which causes 
crashes and potential data loss. We're working on applying this 
restriction to images too, but we haven't yet.


 
  Will I be able to do this once signed 
 scripts are supported in Mozilla?


Signed scripts are supported in Mozilla, and have been for over a year 
(there's a bug in Netscape 6.1 that breaks signed scripts, but they're 
working on the Mozilla trunk right now and will be working in the next 
milestone release). See 
http://www.mozilla.org/projects/security/components/signed-scripts.html 
for instructions.

-Mitch





Re: eternal life of signed objects?

2001-08-23 Thread Mitchell Stoltz

Bernd Schmitt wrote:

 Thanks for your fast reply. 
 
 I understand what you are saying, but i ask again because i don't know
 the security mechanisms thoroughly: does this mean, that my applet in 
 the configuration stated below will work, even after the certificate 
 has expired? 
 
 yes or no will be sufficient 8-)
 
 thanks in advance
 Bernd
 
 
 Mitchell Stoltz wrote:
 
I don't know about 'eternally,' but the signature itself never expires,
even after the certificate used to generate the signature has expired.
   -Mitch


Does this mean that i can put a signed and 'jar'ed applet on a cd-rom
and it works in ie5 and ns4.x/mozilla *with* Sun's Java Plugin 1.3
eternally?

Any contribution greatly appreciated.

  bernd


 





Re: NS_ERROR_DOM_PROP_ACCESS_DENIED received for no apparent reason in NS6.x

2001-08-20 Thread Mitchell Stoltz

You shouldn't be seeing acces denied errors if both pages and the 
frameset are all on the same server. If the frameset is on a different 
server, you will get errors, but I'm planning to change this (see bug 
52920). If everything's on the same server and you're still being 
denied, this is another bug but I can't diagnose it without a minimal 
testcase.
  -Mitch

Heikki Toivonen wrote:

 A minimal testcase would help in analyzing the problem. In any case, 
 n.p.m.security is probably a better place to discuss this, Cc  
 Followup-To set.
 
 Todd Berry wrote:
 
 Accessing a form in a frame(which worked fine in NS 4.x) gives me the
 error access denied. The javascript is the following
 parent.parent.frames[left].frames[tree].document.forms[0]

 It doesn't matter how I reference the frame tree- I can use top.
 instead of parent.- same error. This doesn't occurr in every instance,
 so I'd like to know why I get this at all. All of the frames are on my
 domain, so I'm not references a different url(which is one reason it
 appears you can receive this error.)

 The error under 6.01 is NS_ERROR_DOM_PROP_ACCESS_DENIED (1010). In NS
 6.1 it's simply uncaught exception: Permission denied to access
 property.

 This is occurring on Win2000 with NS 6.01 and NS 6.1.

 PLEAE HELP before we chunk NS 6 support.

 Thanks

 
 





Re: eternal life of signed objects?

2001-08-17 Thread Mitchell Stoltz

I don't know about 'eternally,' but the signature itself never expires, 
even after the certificate used to generate the signature has expired.
   -Mitch


 Does this mean that i can put a signed and 'jar'ed applet on a cd-rom 
 and it works in ie5 and ns4.x/mozilla *with* Sun's Java Plugin 1.3 
 eternally?
 
 Any contribution greatly appreciated.
 
   bernd
 





Re: Documentation of UIless cookie prefs?

2001-08-16 Thread Mitchell Stoltz


Jason Bassford wrote:

Are the UIless cookie prefs documented anywhere?


I don't know of any documentation on this. The cookies themselves 
(including expiration times) are stored in cookies.txt, and the blocking 
information is in cookperm.txt, both in your profile directory. The 
formats of those files are pretty easy to comprehend in a text editor. 
Note that cookie prefs are NOT stored in prefs.js, or all.js, like 
JavaScript/DOM security prefs are.


 
 
I'd like to do the following:
* Enable persistent cookies for bugzilla.mozilla.org

   Not currently possible, that I know of.


* Disable cookies from servers on a list

   Edit cookperm.txt


* Accept all other cookies but discard after two hours (or failing that,
  at the end of the session)

   Not currently possible.



If you figure the above out, let me know.  I would also like to
 implement this.  



Jason, I would love it if you could implement this. File a bug and 
submit a patch, if you're interested.
  -Mitch







Re: hypertext linkage to file://...

2001-08-07 Thread Mitchell Stoltz

This *is* a configurable setting. Open your prefs.js file in a text 
editor with Mozilla not running and add
user_pref(security.checkloaduri, false);

Chris Hoess wrote:

 In article [EMAIL PROTECTED], George Herson wrote:
 
Thanks for the answer.

Pls consider making this a configurable setting because i don't like 
being so dependent on Amaya (a browser which does allow file:// over a 
network).


 
 Given the resolution of similar security vs. convenience issues (salting 
 profile directories, for instance), this seems unlikely.  

Why does everyone hate the salting so much?

-Mitch





Microsoft and security

2001-07-31 Thread Mitchell Stoltz

Russ Cooper, whose job title at the TruSecure Corporation is surgeon 
general and who speaks on computer safety issues, said customers should 
start demanding more secure software from Microsoft.

But Scott D. Culp, security program manager for Microsoft's security 
response center, said that such criticism was unfair. Security is an 
issue that everyone in the industry is grappling with, he said. There 
isn't any vendor who is immune from security issues.

At the same time, he said, We recognize at Microsoft that we do have a 
special responsibility because of the number of customers we're 
fortunate enough to have, and so we're doing our best to live up to 
that responsibility by designing systems that will make security 
updates more automatic.





Re: Interacting with MS-Proxy Server

2001-07-24 Thread Mitchell Stoltz

Reposting to .netlib, follow-up there.

[EMAIL PROTECTED] wrote:

 Looks like MS has found a way to prevent Mozilla from being used in a shop
 that is using the MS-proxy server.  I had been using Mozilla after the
 proxy had been installed but then one day, the proxy login started to fail.
 It turned out that the proxy managers activated an additional field asking
 for a DOMAIN in addition to the ID and PASSWORD fields that were used to
 gain access to the proxy.  In the proxy login window generated by mozilla,
 only the ID and PASSWORD appear.
 
 Is there a work-around for this?  Is there any plan to allow Mozilla to
 interact with a proxy server which is asking for a DOMAIN?
 
 
 
 






Re: allow chrome URLs to be added to the sidebar

2001-06-15 Thread Mitchell Stoltz

Seems reasonable to me. Could you file a bug and put this patch in the bug?
-Mitch

Martin Kutschker wrote:

 Hi!
 
 In
 http://lxr.mozilla.org/mozilla/source/xpfe/components/sidebar/src/nsSidebar.
 js there is the follwing check:
 
 function sidebarURLSecurityCheck(url)
 {
  if (url.search(/(^http:|^ftp:|^https:)/) == -1)
 throw Script attempted to add sidebar panel from illegal source;
 }
 
 Could we change it to this check?
 
 function sidebarURLSecurityCheck(url, win)
 {
 var re = new RegExp((^chrome://[^/]+/content/),);
 var res = re.exec(window.location.href);
 
 // url is part of the same package as script source
 if (res  url.substring(0, res[1].length) == res[1])
 return;
 
 if (url.search(/(^http:|^ftp:|^https:)/) == -1)
 throw Script attempted to add sidebar panel from illegal source;
 }
 
 It would allow a package to add itself to the sidebar. I anyone trusts a
 package, she will probably trust it also in the sidebar.
 
 Masi
 
 
 






Re: Refreshing RDF loaded from remote location

2001-05-30 Thread Mitchell Stoltz

Well said. I think our security grant dialog is less complex and scary 
than the one in Netscape 4.x, but it could still have that effect on 
users. Ideally, we wouldn't have to ask the user at all, the browser 
would just make its own decision about the safety of the operation, but 
that's a difficult if not impossible proposition.
   -Mitch


 HOWEVER - i was trying to avoid having to prompt the user for as long as 
 possible (i.e. here I thought that if the RDF comes from the same location 
 as the XUL it is allowed). My experience with users is that they will 
 happily download any program off the Internet and install/run it, without 
 any regards for security or understanding that this program can do whatever 
 it pleases - yet when I offer a completely secure, digitally signed 
 XUL/JS-based-app-from-a-website, with no privileges (file access, etc) 
 whatsoever, that needs to pop up a warning screen (for example to make an 
 outgoing TCP/IP connection) the user panics, probably uninstalls Mozilla 
 and all related components, scans for virusses, and blames the worm that 
 infested their Word documents months ago on that dangerous remote Mozilla 
 thing.
  :-)






Re: How to do this under Netscape 6?

2001-05-11 Thread Mitchell Stoltz

What does Corba have to do with it? I didn't mention Corba. You can do 
everything you want to do with JavaScript and XPConnect. Yes, java 
should be able to solve the problem, but there are some bugs preventing 
signed applets from talking to Javascript. Basically, we haven't figured 
out how to get Java and JS to share security information, and frankly, 
it's not high on our priority list. Yes, Netscape supports Java, but it 
is no longer a core technology for us.

My apologies - I don't determine Netscape's policy on this. I would like 
to see LiveConnect fully functional as well, but I don't know when that 
will happen.
  -Mitch


Mark A Gregory wrote:

 I'm staggered to find you are saying the only solution
 under Netscape is to create an object that uses Corba?
 
 Surely this is not the way forward. Java must be able to solve
 the problem, or why is Java around?  Is there an aliance
 between Sun and Netscape for NS6.01 or is
 this just marketing hype?
 
 What should be a simple task is turning into a nightmare.
 
 Mark
 





Re: How to do this under Netscape 6?

2001-05-08 Thread Mitchell Stoltz

Unfortunately, you can't yet do this with Java in Netscape 6. I think 
you can run a signed applet, but signed applets can't communicate with 
JavaScript yet. An alternative is to write a signed JavaScript that uses 
XPConnect to access the local file system. Basically, you can create an 
nsIFile object in JavaScript and use that to read from a file. 
http://www.mozilla.org/scriptable/index.html
gives some information about XPConnect.

In order to use XPConnect, you have to sign your script and loading it 
using a URL of the jsr:http:// syntax. There's details on this in 
http://www.mozilla.org/projects/security/components/jssec.html. That 
document's a little out of date and has some errors, my apologies for 
that but I haven't had time to update it. Also, I don't think signed 
scripts work in NS6.01 for the Mac (Windows and Linux/Unix should work 
fine).

If you want to give XPConnect a try, let me know if you run into any 
problems.
 -Mitch

Mark A Gregory wrote:

 Hi,
 
 I would like to be able to read six characters from a file on a client
 computer using Netscape 6 and return the string to a javascript for
 processing client side in an ASP page.
 
 Please tell me how to do this,
 thank you
 mark





Re: Selectively *enabling* popup windows

2001-05-08 Thread Mitchell Stoltz

Brandon,
This is a known bug resulting from the Preferences API change that 
broke the capability.polciy mechanism. It will be fixed within a day 
or two.
-Mitch

Brandon Hume - BORG Redirect wrote:

 Mitchell Stoltz [EMAIL PROTECTED] wrote:
 
 user_pref(capability.policy.default.windowinternal.open,noAccess);
 
 
 This stuff USED to work for me, and it was beautiful.  I even expanded upon
 it with the following:
 
 user_pref(capability.policy.default.windowinternal.open, noAccess);
 user_pref(capability.policy.default.windowinternal.moveTo, noAccess);
 user_pref(capability.policy.default.windowinternal.resizeTo, noAccess);
 
  and suddenly the web became tolerable once more.  Now this stuff seems
 to have broken.  I put these rules in place because of http://www.cvs.org/
 (warning: extremely irritating site, though not in the denial-of-service type
 way) and I use that site as a test.  I've noticed that recently JavaScript
 capabilities in the latest nightlies on Solaris aren't protecting me anymore.
 
 Did I miss a change, or has something broken?





Re: Selectively *enabling* popup windows

2001-04-25 Thread Mitchell Stoltz

Brett,
Sorry for the lack of documentation. Try this:

user_pref(capability.policy.default.windowinternal.open,noAccess);
user_pref(capability.policy.canpopup.sites,http://www.netscape.com 
http://www.etcetera.com;);
user_pref(capability.policy.canpopup.windowinternal.open,allAccess);

Obviously, replace the list of sites on line 2 with whatever list you 
want. Let me know if this works for you.
 -Mitch

Brett Granger wrote:

 Sean Harding wrote:
 
 On Wed Apr 25 at 01:52:14 AM, David Hallowell wrote:
 
 There's instructions in the Release notes for 0.8@
 http://www.mozilla.org/releases/mozilla0.8/
 
 (at the end of the Whats new in this release section
 
 
 
 That only shows how to turn it *off* for specific sites while leaving 
 it on
 by default. Turning it off by default while turning it on for specific 
 site
 is what he was looking for, I think.
 
 sean
 
 Right... I've already successfully disabled all pop-ups by following the 
 0.8 release notes.  Now i just need to figure out how to turn them on 
 for certain sites.  Anyone seen that done?  Just thought I'd post here 
 before I tried personal emails to Mitchell or Akkana...
 
 --Brett





Re: I need your advice on security checks

2001-04-06 Thread Mitchell Stoltz


Ben Bucksch wrote:

 Mitchell Stoltz wrote:
 
 Open  In New Window
 
 
 Are we still missing that one? I'm pretty sure I added a check for that. 
 
 
 Might be that I misremember that.
 
 As components are added, this check will get missed, it's inevitable.
 
 
 Can we at least make sure that appropriate hints are added to the 
 relevant APIs (e.g. in Necko?), so new programmers are less likely to 
 miss that?
Care to suggest what the hint should look like, and where it should go?
-Mitch





Re: Netsape's signtool and HASH FAILED messages

2001-04-04 Thread Mitchell Stoltz

Forwarding to .crypto

news.wirehub.nl wrote:

 Hi all,
 
 I am using a thawte developer certificate in pkcs12 format, which was
 imported into netscape, to build signed .jar files. To do this, I use
 Netscape's SignTool v1.3.
 
 I have produced a signed .jar file from a directory, using the command
 "SIGNTOOL -d ... -k ... -Z c:\x.jar c:\x". This worked fine. Using
 SIGNTOOL -v c:\x.jar returns the following result:
 
 archive "c:\x.jar" has passed crypto verification.
 
   status   path
    ---
  HASH FAILED   Documents/ADRES.DOC
  HASH FAILED   Java/Sources/nl/ois/common/oissplash.jpg
 verified   Java/Sources/nl/ois/osv/Application.class
 
 It seems that only .html, .class and .jpg files work. On other files, which
 we need to include like the splashscreen picture, signtool returns the HASH
 FAILED error.
 
 Any ideas?
 
 Thanks in advance,
 
 Remco Joosse.





Re: Password management

2001-04-02 Thread Mitchell Stoltz
The wallet data is not stored in key3.db or cert7.db, those files just
store certificate information. I don't know the exact file those are
stored in, but maybe Steve Morse can shed some light on this. I've cc'd
him. The password file is not encrypted by default, but it is encrypted
if the user chooses "Encrypt Sensitive Info" from the Password Manager
menu. The data is then encrypted with a password supplied by the user.
It should be difficult for anyone to decrypt this information, even with
access to the Mozilla source code. In fact, the strongest encryption
schemes are those which have been open source for some time. To get at a
user's passwords, an attacker would need 1) access to the user's
password file, and 2) the user's master encryption password. Without
both of these things, there's no way to read those passwords.
-Mitch


 I found that mozilla-the-browser has a password manager (called wallet ?),
 which stores user's passwords. I'm just wondering where (in which file) the
 passwords being saved, and how they being encrypted before saved in a file.
 I found that there are key3.db and cert7db in ~/.mozilla. Are these files
 where the passwords being stored ? If so, by reading the mozilla source
 (such as those in mozilla/security/{nss|psm}), is it possible to decipher
 (if this is the correct word) passwords of anyone else stored in those files
 ?
 Since Mozilla is an open source, so that everyone can have the source and
 see how the password is encrypted, I'm afraid that everyone can decrypt any
 password of anyone else.
 
 To tell the truth, we are planning to use Mozilla as a browser for our
 product (a PDA). So, we are concerned if anyone is able to read our
 customer's passwords stored in key3.db / cert7.db (if I'm correct).
 
 Please point me some documents (if any) explaining of how mozilla manage
 key3.db and cert7.db, and how the passwords being managed.
 Thank you in advance.
 
 Regards,
 Bagus


Re: XUL Cross Domain Security FAQ

2001-03-19 Thread Mitchell Stoltz


Henri Sivonen wrote:

 In article [EMAIL PROTECTED], Mitchell Stoltz 
 [EMAIL PROTECTED] wrote:
 
 
 Once again, "XUL scripts" are no more trusted than HTML scripts unless 
 they are cryptographically signed, or unless they are installed locally 
 in the chrome directory.
 
 
 What extra priviliges do signed scripts get? Signing doesn't imply the 
 script won't do bad things.
Someone always calls me out on that one. I meant "signed and granted 
trust by the user." I was just too lazy to type that out.
 -Mitch





Re: non-local scripts in chrome

2001-03-12 Thread Mitchell Stoltz

You could make a case for this, but as things stand right now, locally 
installed chrome can do anything native code can do. You wouldn't want 
to write an application in C++ that downloads and runs code from a 
non-local site, and you wouldn't want to write chrome that does this 
either. But that's up to the author of the chrome. Chrome is like a 
native executable - the user should trust it completely if they're going 
to download and install it. This isn't a bug, it's a design decision. We 
can't protect users from badly written chrome any more than from badly 
written native code.
-Mitch

Alex Fritze wrote:

 Hi,
 
 if I include some non-locally stored js into a chrome file,
 
 script src="http://www.myserver.com/script.js" /
 
 then the script gets full chrome privileges. Is this a bug? Shouldn't the
 script be restricted depending on where it came from?
 
 Thanks
 alex





Re: XUL Cross Domain Security FAQ

2001-03-09 Thread Mitchell Stoltz

I'll try and answer your questions.

rvj wrote:

 Would it be possible to have a page on Mozilla listing XUL cross domain
 security FAQs
 
 I have compiled a list of questions  based on bug and newsgroup responses-
 but I'm not entirely sure if the answers I've got back are consistant or
 correct.
 
 The premise of my FAQ is a XUL file containing two iframe windows, one of
 which contains a document from a different  domain.
 
 iframe id="frame1" src="www.abc.com/file1.htm /
 iframe id="frame2" src="about:blank" /
 
 Any clarification/correction  welcome.
 
 
 METHODS
 
 
 Q1. Using a XUL script, is it always possible to read the content tree of
 any document from any domain without restriction?
 
 A1. Yes (?)
There's a fundamental misunderstanding here. The security manager 
doesn't care whether the source in question is XUL or HTML or Chinese or 
any other language. What's important is where it's coming from. Scripts 
running in XUL pages that are served from the Web have (in theory) 
exactly the same security restrictions as HTML. When you say 'XUL 
scripts,' do you mean XUL served from a Web server or XUL installed in 
the chrome directory of the Mozilla distribution of the user's machine? 
Content in the chrome directory, whether HTML or XUL or whatever, has 
full privilege and should be able to access the content tree of any 
document regardless of the document's origin.

Malicious sites can use XUL too. There's no reason why we should trust 
some Web content more than others simply because of the language it's 
written in. If you're talking about locally installed chrome XUL and 
scripts, call it 'chrome,' not 'XUL.'

 
 
 Q2. Using a XUL script, should it be possible to use the focus method to
 direct keyboard events to a particular iframee.g.
 window.frames[0].setfocus()  ?
 
 A2. Currently not because of cross domain security but will be changed  see
 69028
This is a *BUG* not a deliberate policy. It will be fixed after the DOM 
implementation is changed to use XPConnect, in the late Mozilla 0.9 or 
early 0.9.1 timeframe. Yes, a script should be able to set focus on any 
window or frame regardless of origin. window.close() and several other 
properties are also affected by this bug.

 
 Q3. Using a XUL script, should it be possible to scroll the contents of a
 particular iframe e.g. window.frames[0].scrollBy(0,30) or return the
 document X and Y page offsets e. window.frames[0].pageYOffset ? (does XUL
 support these methods and properties)
 
 A3. Currently not because of cross domain security  but will be reviewed. ?
I'll have to give this one a look but it seems reasonable to me.

 
 Q4. Will  XUL support the print method e.g window.frames[0].print() ?
 
 A4  Currently not because of cross domain security
Ditto. A Web script, XUL or otherwise, should not be able to print 
anything without the user's consent.

 
 Q5. Will XUL eventually support silent printing via javascript  of iframe
 content ?  Presumably a XUL script is trusted enough to  do this (unlike an
 HTM script) similar to the print button in IE
 
 var contentViewerFile =
 window.frames[0].docShell.contentViewer.QueryInterface(Components.interfaces
 ..nsIContentViewerFile);
 contentViewerFile.Print(true, null, null);
 
 A5. Unknown
Once again, "XUL scripts" are no more trusted than HTML scripts unless 
they are cryptographically signed, or unless they are installed locally 
in the chrome directory. Your code snippet above uses XPConnect, and a 
script must be trusted to use XPConnect, again either by being signed 
and asking the user's permission, or by being locally installed.

 
 
 Q6 If you copy or merge  iframe content from one or more cross domain iframe
 sources, should all cross domain security be removed from the target iframe?
 (is the security domain of iframe2 the same as the XUL file). Currently, the
 content of iframe2 seems secured.
 
   var sid = document.getElementById("frame1");
   var tid = document.getElementById("frame2");
 
 //  copy sid
 var copyOfNode = sid.cloneNode(true);
 
 // replace tid with the copy of sid
 tid.parentNode.replaceChild( copyOfNode, tid );
 
 
 A6 Unclear
Looks like iframe2 starts as about:blank, and everyone is supposed to be 
allowed to access about:blank. This is an issue I hadn't thought much 
about. If a script does a document.write() to a frame, the owner of the 
script assumes ownership of the written-to frame as well, for the 
purposes of security. Should the same thing happen if we copy content 
into a frame the way yo do above? Otherwise, a malicious script could 
snoop on the content that was copied into that frame.

 
 
 EVENTS
 
 
 Q7. Will XUL support the creation of keyboard events such as page down/ page
 up? i.e. can the CreateEvent and Event() method can be used to emulate such
 keyboard events
 
 A7. Unknown
You should probably ask this question on n.p.m.dom.

 
 Q8. If true, then is it correct to assume it should be possible for XUL
 script 

Re: turning javascript on/off 15 times a day: don't bury it in preferences

2001-03-08 Thread Mitchell Stoltz

Well, that one in particular has been stalled because it's a bit 
controversial, not for lack of expertise. But your point is well taken.
   -Mitch

John Gardiner Myers wrote:

 
 Mitchell Stoltz wrote:
 
 Mr. Thumbs, on what evidence do you base your claim that "Mozilla
 currently treats security as a low priority item?"
 
 
 Take bug 28327 for example.  It's a major privacy problem, but gets no
 attention from anyone with the expertise to code a fix.





Re: Security announce group

2000-12-13 Thread Mitchell Stoltz

Making people aware that vulnerabilities exist and how to protect 
themselves is a good thing. However, I won't be able to participate in 
such a newsgroup, and if Mozilla security problems are going to be 
disclosed rapidly, this will seriously limit my and probably Netscape's 
ability to participate in Mozilla security discussions. Basically, the 
publishing of vulnerabilities will have to come from Netscape's PR 
department, not from me or any other security engineers. I make a 
distinction, as you apparently do, between technical discussion of 
security bugs between engineers from different organizations, and public 
disclosure of these bugs. I am much more interested in the former.

Along those lines, I am opposed to any hard and fast deadlines on the 
public disclosure of any security bug information (such as requiring 
disclosure of a vulnerability within five days). Such a requirement is 
unnecessary, since the reporter of a bug has the option of taking it 
public at any time.
  -Mitch

Ben Bucksch wrote:

 Even if we don't fully disclose bugs, it is very important to have 
 notifications about them.
 

-
Views are mine, not Netscape's