Re: NSS dlls was not built with debug information

2020-04-15 Thread Kevin Jacobs
gt; > > I'm not quite familiar with building NSS with gyp and ninja. Do I need to > provide some additional flag in order for me to be able to debug NSS (if > needed)? > > Thanks.. Hi Usha, I've confirmed this issue and filed https://bugzilla.mozilla.org/show_bug.cgi?id=1630458 to track the resolution. Thanks, Kevin ___ dev-security mailing list dev-security@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-security

Re: IAIK PKCS#11 Wrapper 1.4 with NSS 3.47.1

2020-01-31 Thread Kevin Jacobs
> On Fri, Jan 24, 2020 at 3:12 AM SIC/IAIK wrote: > The ckpAttributes that you have viewed in the debugger is actually an array > with multiple ckAttributes. Specifically 1073742353 is the CKA_WRAP_TEMPLATE > attribute. > I traced the error down to this NSS git com

Re: Defending against malicious SSL proxy

2013-10-01 Thread Kevin Chadwick
> I agree that deploying token-based security mechanisms may take time in many > countries; so interim security mechanisms are desirable. True but SSL should be secure too. Not just SSL from banks. I don't know the details of J-Pake etc., but if it could verify a fingerprint to a domain the user

Re: Security concerns for a "browser support" API

2013-09-17 Thread Kevin Chadwick
> I can't think of a single in-the-wild attack on Firefox that could have > been fixed by flipping a pref, unless you count disabling Javascript > entirely which people wouldn't accept. Actually many would especially if noscript is not available. I thought finally firefox had an easy flip switch

Re: Security concerns for a "browser support" API

2013-09-06 Thread Kevin Chadwick
> To Kevin's point about hardcoding known badd addons, I don't think that works > given the length of the release cycle (up to 4 months to get from Nightly to > stable), and that would be much less responsive than the blocklist ping > already offers. Looking at bugzilla, input.mozilla.org I see

Re: Security concerns for a "browser support" API

2013-08-30 Thread Kevin Chadwick
> I think this is a great idea, and I strongly support the necessary APIs for > self-healing. Misbehaving addons have a huge impact on Firefox security. Even > though the blocklist ping supports disabling misbehaving addons, being able > to revert hijacked preferences (such as search) would be a

Re: War on Mixed Content - Why?

2013-08-22 Thread Kevin Chadwick
> Also, it's worth bearing in mind that the number of bits is a > distractor. All the weakness comes from elsewhere, so fiddling around > with the bits is just so much numerology that amuses NIST and numerate > managers and others. It does little for overall security. Well it is not a distrac

Re: War on Mixed Content - Why?

2013-08-19 Thread Kevin Chadwick
> Sure, but warnings are useless. Some people -- us -- might follow them. > Most have been trained for so long to click through them that they no > longer read them. Click-thru syndrome is a sad result of unreliable > systems: if the False Negatives (wrong warnings) are too frequent, and >

Re: War on Mixed Content - Why?

2013-08-16 Thread Kevin Chadwick
> 2. Limited cert lifetimes mean that if an algorithm starts to look dodgy > (e.g. as MD5 did) we can move the industry to new algorithms without > having to worry about 20-year end-entity certs. This is why we have been > pushing in the CAB Forum for shorter max cert lifetimes. It's the CAs > who

Re: War on Mixed Content - Why?

2013-08-16 Thread Kevin Chadwick
> and the thread Subject is spot on. How about War on mixed content - why not? Warnings have been popping up for as long as I can remember so the likely hood is that if they haven't fixed the site, they have chosen not to. I could understand an argument that the warning could have changed to a

Re: War on Mixed Content - Why?

2013-08-15 Thread Kevin Chadwick
> > I'm trying to argue that current non-EV certification process is no good > > and self-signed certificates can be used to provide equal security in > > practice. Then we can discuss if browsers should display some kind of > > "secure" indicators for HTTPS connections with non-EV certs/self-si

Re: War on Mixed Content - Why?

2013-08-15 Thread Kevin Chadwick
> On Wednesday, 14 August 2013 12:21:15 UTC+3, Kevin Chadwick wrote: > > > This is because the cheapest CAs do so bad work that the > > > security is very close to self signed cert. > > > > Please show me evidence of startssl being less secure than some of th

Re: War on Mixed Content - Why?

2013-08-15 Thread Kevin Chadwick
> > So now you trust a user writable reference over a non writable installed > > CA crt (I hope soon to be replaced by website provided keys signed by > > mozilla/Google) > > Are you trying to say that there is a meaningful class of attacks that can > modify user's bookmark store and still not

Re: War on Mixed Content - Why?

2013-08-15 Thread Kevin Chadwick
> On Thursday, 15 August 2013 12:23:18 UTC+3, Gervase Markham wrote: > > On 14/08/13 07:09, Mikko Rantalainen wrote: > > > > > I'd say that such a bookmark would be highly probably safe, if that > > > bookmark did include fingerprint for the site public key (*not CA key > > > fingerprint*) and th

Re: War on Mixed Content - Why?

2013-08-14 Thread Kevin Chadwick
> Say you have an HTTPS bookmark to your bank. You visit it (your techie > friend told you "always use this bookmark for your bank, and you'll be > safe"), So now you trust a user writable reference over a non writable installed CA crt (I hope soon to be replaced by website provided keys signed by

Re: War on Mixed Content - Why?

2013-08-14 Thread Kevin Chadwick
> This is because the cheapest CAs do so bad work that the security is very > close to self signed cert. Please show me evidence of startssl being less secure than some of the big CAs that have had major incidents. You only need to send them a csr too. Then realise that we should be concentrati

Re: War on Mixed Content - Why?

2013-08-13 Thread Kevin Chadwick
> Chrome's implementation is a little less secure since > it does not block mixed iframes and mixed xhr. However, they are working > on improving their Mixed Content Blocker. I wouldn't be surprised if this is because it would break some of Google's sites. You can't even navigate Google plus wi

Re: Removal of "Revocation Lists" feature (Options -> Advanced -> Revocation Lists)

2013-07-14 Thread Kevin Chadwick
> But, also, if a certificate feature isn't important enough for mobile*, then > why is it important for desktop? We should be striving for platform parity > here. Please, that is not sane logic. The best should be strived for on each platform. Firefox mobile is great and perhaps the only secure

Re: Starting in 15 minutes - New Security and Privacy Features Brown Bag at 12pm.

2012-11-15 Thread Kevin Chadwick
> Unnecessary RPC should be avoided wherever possible to aid secure > chroots and/or complete sandboxing. Firefox did start requiring dbus after initial startup for config and would shutdown but this seems to have been fixed now, not sure when exactly as I stopped using the sandbox. :-) -- _

Re: Starting in 15 minutes - New Security and Privacy Features Brown Bag at 12pm.

2012-11-13 Thread Kevin Chadwick
> Slides for the talk can be found here - > https://people.mozilla.com/~tvyas/SecEngBrownBag.pdf A few thoughts. I presume HSTS will have an about:config disable option as otherwise it will really annoy users and may threaten HSTS's existence for the many with dead laptop and dead bios batteries

Re: Security fallout of hiding tabs-on-bottom mode

2012-11-12 Thread Kevin Chadwick
On Mon, 12 Nov 2012 11:45:04 -0500 Johnathan Nightingale wrote: > It's true that sometimes non-security changes have major security > impacts (c.f. session restore making people more willing to apply > updates). I also agree that each poster in our newsgroups represents > a constituency (100x may

Re: a sandboxed Firefox

2012-07-27 Thread Kevin Chadwick
On Fri, 27 Jul 2012 09:26:45 -0700 (PDT) Ian Melven wrote: > Can you elaborate more on how dbus is used for config ? When running a sandfox type chroot all kernel backed grsecurity chroot escape prevention features can be enabled without any workaround or errors except for. http://en.wikibooks.

Re: a sandboxed Firefox

2012-07-26 Thread Kevin Chadwick
> Do you know how other people have solved this with Firefox? I presume you have looked at sandfox. I stripped that down a bit and made it work on a more secure system setup for my purposes. Firefox dbus reliance for the simple task of config is a little annoying here. -- ___

Re: Implications of new TLDs

2012-06-21 Thread Kevin Chadwick
> > I don't see why multiple standard queries has > > any bearing, dns queries are cheap. > > No-find TLD queries are surprisingly slow. Try a few. No problem here, maybe a second longer. I can't switch tab quick enough. drill responds immediately. Do you suggest a method of testing that?

Re: Implications of new TLDs

2012-06-21 Thread Kevin Chadwick
> >> It'll be confusing, but the fact of the matter is that the "OS service > >> calls" are pretty broken for cases when you might have more than one > >> hostname to resolve and might care about doing other things at the same > >> time (like in a browser, say) > > > > I can understand why an OS

Re: choice of malloc implementation (was Re: Implications of new TLDs)

2012-06-21 Thread Kevin Chadwick
> > > > p.s. mozilla uses it's own malloc which is annoying because OpenBSDs is > > so much better!!! > > We've done extensive tests and believe jemalloc is the best available > malloc for the way we use memory; however, I don't know that we've > tested specifically against OpenBSD malloc. In

Re: Implications of new TLDs

2012-06-21 Thread Kevin Chadwick
> It'll be confusing, but the fact of the matter is that the "OS service > calls" are pretty broken for cases when you might have more than one > hostname to resolve and might care about doing other things at the same > time (like in a browser, say) I can understand why an OS wouldn't listen to

Re: Implications of new TLDs

2012-06-20 Thread Kevin Chadwick
> Are you aware of actual plans to allow A records for TLDs? I don't have > links to earlier discussion offhand, but I recall the consensus being > that that shouldn't be allowed at all. I wouldn't be surprised if disallowing that was one of the stipulations for pressing ahead but the money may

Re: Implications of new TLDs

2012-06-14 Thread Kevin Chadwick
> Top-level A records are already allowed. Try > > http://ai/ Hmm GTLDs FAQ says one of the requirements is a minimum of three letters so from what registrar is this? Why not do something good every day and install BOINC. ___

Re: Implications of new TLDs

2012-06-14 Thread Kevin Chadwick
> Many of the TLDs are from domain speculators who want to resell > domains, but a sizable fraction are world-famous brands. I'm surprised at that at £118,000 and $25,000 per domain per year. You can become a registrar of .co.uk for £160 per year. Apparently they are non profit but there may be

Re: Proposed Feature: Application Reputation system

2012-06-12 Thread Kevin Chadwick
On Mon, 11 Jun 2012 13:45:26 -0700 Sid Stamm wrote: > Can you elaborate here? I'm interested to hear your thoughts. Leaving aside server/device security which may affect user security and also completely anonymised data matching to connection details or substitued user ids. An example being home

Re: Proposed Feature: Application Reputation system

2012-06-11 Thread Kevin Chadwick
Proper OS security against malware is the way to go but of course the average user is far off that at the moment. That will change. http://www.h-online.com/security/news/item/Anti-virus-software-out-of-its-league-with-Stuxnet-and-Flame-1604467.html ___

Re: Proposed Feature: Application Reputation system

2012-06-11 Thread Kevin Chadwick
On Mon, 11 Jun 2012 08:57:35 -0700 Sid Stamm wrote: > One of my worries is that blacklists get big really fast and won't be as > feasible on mobile devices (cost of updating the lists, downloading and > storing them). Is this the browsers domain especially with heavy criticism of bloated browsers

Re: Proposed Feature: Application Reputation system

2012-06-09 Thread Kevin Chadwick
On Fri, 08 Jun 2012 15:02:27 -0700 Sid Stamm wrote: > we have to think about whether Firefox users will be > willing to trade some of their download history for the protection > offered by the system and a less in-your-face download UI. I believe > they will. I'm assuming there would be a disabl

Re: Implications of new TLDs

2012-06-06 Thread Kevin Chadwick
On Wed, 06 Jun 2012 17:06:45 +0100 Gervase Markham wrote: > Unless it never works. If we announce we are not going to support this > hijacking of barewords, and perhaps get other browser vendors to join us > (I suspect Chrome would be keen; this is a problem for them) . Where's this come from any

Re: Poorly worded error message for cert for wrong site.

2012-04-19 Thread Kevin Chadwick
On Thu, 19 Apr 2012 11:13:05 +1000 ianG wrote: > So this is one of those cases where the browser is right, *and* the user > is right, and they are both in disagreement. This is one of those cases where the browser is right, *and* the user is right, but the website is wrong. The website should u

Re: Updated Re: Opt-in activation for plugins (aka click to play)

2012-04-16 Thread Kevin Chadwick
On Mon, 16 Apr 2012 13:02:32 -0700 Tanvi Vyas wrote: > Invisible Flash is often used as an audio > > fall-back when a particular codec isn't supported natively by the > > browser. Maybe there's other invisible flash. I wouldn't really know as I only use it occasionally, except on my tvs and there

Re: no-user-js - New CSP directive to mitigate Self-XSS

2012-04-14 Thread Kevin Chadwick
On Fri, 13 Apr 2012 10:52:50 -0700 Johnathan Nightingale wrote: > I think Joe's framing here is exactly right. Not only do I not want to make > our developer tools first-run experience less pleasant by adding warnings, > but I also doubt that easily-dismissed warnings would be genuinely effectiv

Re: OpenWebApps/B2G Security model

2012-04-13 Thread Kevin Chadwick
This came across an android dev list. I hope mozilla can avoid anything similar. I knew android permissions could be bypassed by pre-installed apps, app communication etc., but I didn't realise how bad the situation was. Your probably already aware but just in case. "https://viaforensics.com/secu

Re: stealing saved passwords

2012-04-13 Thread Kevin Chadwick
On Fri, 13 Apr 2012 16:25:26 +0300 Henri Sivonen wrote: > (Dunno how important this > concern is. That is, I don't know how realistic it is for a MITM to > gain the capability to fake non-EV certificates but not to gain the > capability to fake EV certificates.) EV certs are pointless except for

Re: stealing saved passwords

2012-04-12 Thread Kevin Chadwick
On Wed, 11 Apr 2012 11:20:17 -0700 Eric Chen wrote: > We are also interested in a defense for this. The defense that we came up > with is actually very similar to proposal 1) and 3) If you can work it without STS, do so as anything that turns users away will not get widespread adoption especially

Re: stealing saved passwords

2012-04-11 Thread Kevin Chadwick
On Wed, 11 Apr 2012 00:54:53 -0700 Jesse Ruderman wrote: > 1) If a site sends an STS header In my opinion STS shouldn't be implemented professionally in it's current state and with browsers treatment of valid dates. I looked to implementing it and then realised that a user with a flat bios batter

Re: Opt-in activation for plugins (aka click to play)

2012-04-07 Thread Kevin Chadwick
On Fri, 6 Apr 2012 17:06:22 -0700 (PDT) Ian Melven wrote: > i think this is something we should probably leave to plugin vendors > to implement (as Adobe has recently done with silent update for the Firefox > Flash plugin) Probably yeah but I can't believe how long adobe have been criticised for

Re: Types of applications - Proposal and next steps

2012-04-03 Thread Kevin Chadwick
Looks like a good start. especially > 3) Your proposal means all privilege are granted up front at app > install: Nope, we should not confuse authentication with > authorization. For authenticated apps the initial trust decision just > grants the app the right to request those sensitive privileg

Re: WebApps - Types of applications

2012-03-31 Thread Kevin Chadwick
On Sat, 31 Mar 2012 20:28:14 +1100 ianG wrote: > "However, unlike [their competition], Apple promises its service to be > highly secure and reliable." > > And they will achieve that. On what basis do you believe that, just transport security. I have a solution for this and Apple and Google are

Re: Fixing SSL quickly (not), or why certs need business identity data.

2012-03-30 Thread Kevin Chadwick
On Fri, 30 Mar 2012 13:56:12 -0700 Kyle Hamilton wrote: > Besides... the browsers aren't the ones who can enforce this, the > Payment Card Industry contracts and audits are. The browsers hold the cards if they get consensus between them that is. PCI would have to adapt to the browsers decision ot

Re: Fixing SSL quickly (not), or why certs need business identity data.

2012-03-30 Thread Kevin Chadwick
On Fri, 30 Mar 2012 12:15:02 +0100 Kevin Chadwick wrote: > p.s. > > >> On 3/29/2012 3:42 AM, Kevin Chadwick wrote: > >>> On Tue, 27 Mar 2012 18:29:29 -0700 John Nagle wrote: > >> > >>>> Anything that takes a credit card

Re: Fixing SSL quickly (not), or why certs need business identity data.

2012-03-30 Thread Kevin Chadwick
and validate business identity information, > digitally sign it, and send it to the browser, Firefox should display it > properly. That encourages the problem of misplaced trust. p.s. >> On 3/29/2012 3:42 AM, Kevin Chadwick wrote: >>> On Tue, 27 Mar 2012 18:29:29 -0700 J

Re: Fixing SSL quickly (not), or why certs need business identity data.

2012-03-29 Thread Kevin Chadwick
On Thu, 29 Mar 2012 08:38:29 -0700 John Nagle wrote: Ok so it's sort of an improvement such as only the ip/domain which is verified being shown on the cert reducing possible misleading but hasn't actually dealt with the main problems at all. In fact as far as I can tell it will just be a waste of

Re: Fixing SSL quickly

2012-03-28 Thread Kevin Chadwick
On Tue, 27 Mar 2012 18:29:29 -0700 John Nagle wrote: > How can a free CA afford to validate its customers? > Check out startssl.com. It's only a few cpu cycles to certify a domain via email or html file which is the only unforgeable level of cert. Yes security of the key needs to be paid for

Fixing SSL quickly

2012-03-23 Thread Kevin Chadwick
What are the plans to fix SSL. Would it be good to have a collaborated, IE, Firefox, Chrome single free CA (like startssl) where the rogue CA issue is prevented and security could be handled properly by eventually removing all other CAs from browsers. A domain control check could be automated via

Re: "bad" certificate UX concept

2012-03-23 Thread Kevin Chadwick
On Thu, 22 Mar 2012 13:15:59 -0700 Yvan Boily wrote: If you were going to do this, it should be global. A fingerprint checked self-signed is actually more secure than a CA signed one. Also someone's bios battery might have just run out of juice giving a default date. _

Re: WebApps - Types of applications

2012-03-23 Thread Kevin Chadwick
On Thu, 22 Mar 2012 23:45:47 -0700 Lucas Adamski wrote: Untrusted > They might want to capture audio or video input to stream to a server or > process client-side, Input from? What's the distinction here, only via e.g. a flash plugin with it's own permissions? Stories of phones without camera

Re: OpenWebApps/B2G Security model

2012-03-22 Thread Kevin Chadwick
On Thu, 22 Mar 2012 22:47:47 +1100 ptheriault wrote: > I get your point about adding extra attack surface, but my thought was SSL > has a fairly narrow and heavily tested attack surface compared to whatever > signed/secured format is used. (i.e. an attacker could send unsigned > malformed pages

Re: OpenWebApps/B2G Security model

2012-03-22 Thread Kevin Chadwick
On Thu, 22 Mar 2012 12:50:33 +1100 ptheriault wrote: > 1. I can't think of any reason not to deploy privileged applications over > SSL, and the more strict the better (HSTS, limited certs, additional checks > etc) I offer SSL on for example mail servers. It gripes me that companies like Yahoo

Re: OpenWebApps/B2G Security model

2012-03-22 Thread Kevin Chadwick
On Wed, 21 Mar 2012 16:32:36 -0400 Jim Straus wrote: > New standard, It would need to be run through standard committee(s). In what way. There must be RFCs and has anyone looked at exactly how jarsigner relates. ___ dev-security mailing list dev-se

Re: OpenWebApps/B2G Security model

2012-03-22 Thread Kevin Chadwick
On Wed, 21 Mar 2012 17:05:44 -0500 Ian Bicking wrote: > - Use developer keys so uploads are signed; or continue to add new or > better authentication over time to keep the uploading process secure > - Keep a public log of updates > - Remove or revert code that was found to be malicious (i.e., Mozi

Re: OpenWebApps/B2G Security model

2012-03-22 Thread Kevin Chadwick
On Wed, 21 Mar 2012 21:23:29 -0400 Jim Straus wrote: > > - Remove or revert code that was found to be malicious (i.e., Mozilla could > > remove that code, not wait for the developer to act) > > That is a good point. Mozilla could retain the code in either case, but in > the base of signed ma

Re: [b2g] OpenWebApps/B2G Security model

2012-03-21 Thread Kevin Chadwick
On Tue, 20 Mar 2012 23:21:54 + lkcl luke wrote: > good analysis of the alternative distributions. their analysis is > shown here: > > https://wiki.archlinux.org/index.php/Package_signing#How_signing_is_implemented_in_other_distributions I fired that page across earlier without such a good i

Re: [b2g] OpenWebApps/B2G Security model

2012-03-21 Thread Kevin Chadwick
On Tue, 20 Mar 2012 22:08:01 + lkcl luke wrote: > please do instead consider > this to be a funny joke, which i am sharing *with* you, rather than > being one who is laughing *at* you. i trust that you understand that > the difference is vital. one is a personal insult - tantamount to > tec

Re: OpenWebApps/B2G Security model

2012-03-20 Thread Kevin Chadwick
On Tue, 20 Mar 2012 17:40:02 + Kevin Chadwick wrote: > Your right though there's little to > stop another company using safeapps.nets work to get another only > signed by author copy and sign it with supertrus...@safeapp.net. Also if a verifier builds the source as debian do

Re: OpenWebApps/B2G Security model

2012-03-20 Thread Kevin Chadwick
On Wed, 21 Mar 2012 01:01:55 +1100 ianG wrote: > If each site does their own code-review, then they lose. That's because > I can run a site that downloads off that site, and then pass on the > benefit of the code-review. I leach off of the costs incurred off the > primary site, and I can spen

Re: [b2g] OpenWebApps/B2G Security model

2012-03-19 Thread Kevin Chadwick
On Mon, 19 Mar 2012 19:37:15 + lkcl luke wrote: > i do not ask you to judge such decision-making but i simply make you > aware of it, such that if you find such actions questionable you can > take it into account, such as by replying to messages which have been > sent to you (directly or as pa

Re: Scope of B2G applications

2012-03-19 Thread Kevin Chadwick
On Mon, 19 Mar 2012 19:57:20 + Gervase Markham wrote: > Turning off updates, including security updates, doesn't sound to me > like an awesome solution to the problem of being nagged about them... > > "Hey, if you cancel your fire insurance, you don't get nagging letters > every year tellin

Re: [b2g] OpenWebApps/B2G Security model

2012-03-19 Thread Kevin Chadwick
On Mon, 19 Mar 2012 12:31:05 + Ben Francis wrote: > A user granting permissions > expresses trust in the people hosting a web site/app, not the code itself. No, it can be and is both or either. Take android. Some apps I trust the author and hope he's responsible with his signing infrastructur

Re: [b2g] OpenWebApps/B2G Security model

2012-03-19 Thread Kevin Chadwick
On Mon, 19 Mar 2012 11:53:48 +1100 ianG wrote: > On 19/03/12 08:19 AM, Kevin Chadwick wrote: > > On Sun, 18 Mar 2012 12:30:35 +1100 > > > On the MITM - FUD or validated threat? http://www.h-online.com/security/news/item/28C3-New-attacks-on-GSM-mobiles-and-security-measures-

Re: [b2g] OpenWebApps/B2G Security model

2012-03-18 Thread Kevin Chadwick
On Sun, 18 Mar 2012 12:30:35 +1100 ianG wrote: > We could decide it is > not a worry and accept it (SSH). OpenSSH, A highly successful program with far less exploits. > Or we could decide that it is a worry > and decide to address it as our #1 threat (SSL). A potentially highly successful

Re: [b2g] OpenWebApps/B2G Security model

2012-03-17 Thread Kevin Chadwick
On Fri, 16 Mar 2012 13:16:54 -0700 Jonas Sicking wrote: > It would > have to be through some mechanism other than through the web server to > add any level of security. >> It could use a few gpg keyservers and a mozilla website and take the average >> reporting >> any odd keys to mozilla. Or ev

Re: [b2g] OpenWebApps/B2G Security model

2012-03-17 Thread Kevin Chadwick
On Sat, 17 Mar 2012 14:56:18 +1100 ianG wrote: > No, that assumes the attacker is waiting and intercepting every web > server request. In practice, he is not. This should be assumed and should not matter especially as GSM is so easily decrypted, coupled with a rogue CA makes gpg or atleast a mo

Re: [b2g] OpenWebApps/B2G Security model

2012-03-17 Thread Kevin Chadwick
On Fri, 16 Mar 2012 13:11:37 -0700 (PDT) David Chan wrote: > SSL doesn't protect us from a server compromise scenario. Though that > doesn't matter if the store is a permissions granter, since a > compromised store can just grant all permissions to rogue app X. You need a security policy for priv

Re: [b2g] OpenWebApps/B2G Security model

2012-03-17 Thread Kevin Chadwick
On Sat, 17 Mar 2012 03:17:15 -0700 Andreas Gal wrote: > Web apps should use the same basic security model the web itself uses. You mean the model that everyone in security is saying should be replaced as soon as practical and agreed upon. You could still use openssl but you should use more featur

Re: [b2g] OpenWebApps/B2G Security model

2012-03-17 Thread Kevin Chadwick
On Fri, 16 Mar 2012 12:39:31 -0700 Jonas Sicking wrote: > As I've stated, I don't want to force app developers to have to their > code inspected by stores, nor do I want to force stores to review > developers code. And if a code review hasn't happened I don't see what > signing the code buys anyon

Re: [b2g] OpenWebApps/B2G Security model

2012-03-17 Thread Kevin Chadwick
On Fri, 16 Mar 2012 13:16:54 -0700 Jonas Sicking wrote: > It would > have to be through some mechanism other than through the web server to > add any level of security. It would be best to bundle them with the hardware or bundle mozillas key that other keys are signed or revoked with. Otherwise y

Re: Scope of B2G applications

2012-03-16 Thread Kevin Chadwick
On Fri, 16 Mar 2012 11:29:25 + Gervase Markham wrote: > Certainly, app updates are a pain on Android - it nags me if I ignore > them, and if I accept them, it nags me about different ones tomorrow. If you don't need background data. You can disable that and get no automatic update checks. __

Re: [b2g] OpenWebApps/B2G Security model

2012-03-16 Thread Kevin Chadwick
On Fri, 16 Mar 2012 13:49:23 + lkcl luke wrote: Have you considered using the grsecurity arm patch for the kernel (not to do with permissions, just security, as I don't think RBAC works on ARM yet, according to a document from the THALES defence contractor anyway). > i've contacted the NSA SE

Re: [b2g] OpenWebApps/B2G Security model

2012-03-16 Thread Kevin Chadwick
On Fri, 16 Mar 2012 13:08:54 + Ben Francis wrote: > > Surely there should be no central authority for permissions requests other > > > than the user? I'd say that's correct but hopefully a repo type store or verified source store may come along and rather than users checking mozilla.inc a

Re: [b2g] OpenWebApps/B2G Security model

2012-03-15 Thread Kevin Chadwick
On Thu, 15 Mar 2012 22:45:56 + Ben Francis wrote: > Web apps should be hosted, not packaged. How do you sign code that's > constantly changing? Sometimes when web apps are updated there are > different versions of resources on different nodes of a cluster behind a > load balancer, or different

Re: [b2g] OpenWebApps/B2G Security model

2012-03-15 Thread Kevin Chadwick
On Wed, 14 Mar 2012 17:09:00 -0700 (PDT) David Chan wrote: > The analogous idea in the B2G world would be that Mozilla, > telcos, company foo could all run their own stores. If a user doesn't like > the policies of the existing stores, they can start their own. However, > there wouldn't be a wa

Re: [b2g] OpenWebApps/B2G Security model

2012-03-12 Thread Kevin Chadwick
On Sun, 11 Mar 2012 23:01:49 -0700 Jonas Sicking wrote: > A natural way that > > this occurs is that you have separate "read" and "write" permissions, and > > then you create a new action that involves both read and write actions. > > So far I don't think we've run into this need. I'd be curiou

Re: [b2g] OpenWebApps/B2G Security model

2012-03-12 Thread Kevin Chadwick
On Sun, 11 Mar 2012 21:11:48 -0400 David Barrera wrote: > SSL works well for authentication and as Jonas points out, it is well > understood by developers and the community. Actually the whole security community is looking for ways to fix SSL Google chrome has announced a lookup website. SSL loo

Re: [b2g] OpenWebApps/B2G Security model

2012-03-10 Thread Kevin Chadwick
On Sat, 10 Mar 2012 16:08:44 + lkcl luke wrote: > if such a strategy (execution of assembly code) is OUTRIGHT BANNED and > will NEVER BE CONSIDERED, then and only then can the security model be > dramatically simplified. I think this notion also applies as a whole and the key is flexibility f

Re: [b2g] OpenWebApps/B2G Security model

2012-03-09 Thread Kevin Chadwick
On Sat, 10 Mar 2012 00:33:36 + lkcl luke wrote: > in the case of the debian distribution, that's encoded into the > /etc/apt/sources.list file. if users edit that file and start adding > e.g. "deb http://debian-multimedia.org"; If your looking at distro package signing. archlinux.org has ju

Re: [b2g] Permissions model thoughts

2012-03-07 Thread Kevin Chadwick
On Tue, 6 Mar 2012 18:28:15 -0800 Adrienne Porter Felt wrote: > For example, there is relatively little risk attached to > letting an app turn your Bluetooth on or off. Are you nuts, how about a local app via qr code phishing switching it on and then a stack exploit by a local attacker or attac

Re: [Bulk] Re: [b2g] Permissions model thoughts

2012-03-07 Thread Kevin Chadwick
On Wed, 7 Mar 2012 09:26:31 -0800 Adrienne Porter Felt wrote: > > > For example, there is relatively little risk attached to > > > letting an app turn your Bluetooth on or off. > > > > How about a local app introduced via qr code phishing switching > > it on and then a stack exploit by a local

Re: [b2g] Permissions model thoughts

2012-03-07 Thread Kevin Chadwick
On Tue, 6 Mar 2012 18:28:15 -0800 Adrienne Porter Felt wrote: > For example, there is relatively little risk attached to > letting an app turn your Bluetooth on or off. How about a local app introduced via qr code phishing switching it on and then a stack exploit by a local attacker or attacker

Re: [b2g] Permissions model thoughts

2012-03-07 Thread Kevin Chadwick
On Wed, 07 Mar 2012 13:26:13 +0100 Jean-Marc Desperrier wrote: > > the system highlighting the > > more dangerous ones requested but also maximising user configurability > > and overrides is always best > > No, you're still dodging the difficult part by providing information to > the user, l

Re: [b2g] Permissions model thoughts

2012-03-07 Thread Kevin Chadwick
On Wed, 07 Mar 2012 10:16:11 +0100 Jean-Marc Desperrier wrote: > The Android model is broken, but so was the permission pop-up model. A good default determined by authors with the system highlighting the more dangerous ones requested but also maximising user configurability and overrides is alway

Re: Please bring back JIT options in about:config for PAX/Grsecurity compatibility (Hardened Linux)

2012-01-25 Thread Kevin Chadwick
On Tue, 24 Jan 2012 15:33:37 -0800 (PST) Ian Melven wrote: > > Hi Kevin, > > in a current FF 9 release I see the following prefs : > > javascript.options.jitprofiling.chrome;true > javascript.options.jitprofiling.content;true > javascript.optio

Please bring back JIT options in about:config for PAX/Grsecurity compatibility (Hardened Linux)

2012-01-24 Thread Kevin Chadwick
Currently the only web browser I've found that runs with grsecurity/pax with all security features such as "PAX" Mprotect and RANDMMAP is Opera. "http://pax.grsecurity.net/docs/mprotect.txt"; "http://en.wikibooks.org/wiki/Grsecurity/Appendix/PaX_Flags"; I care more about security than javascript

Firefox add-ons to securely manage passwords

2009-07-20 Thread Kevin
Firefox 3.5 is compatible with several add-ons to help manage your passwords. Some of them are pwgen, Billeo, Password Exporter and Master Password Timeout. https://addons.mozilla.org/en-US/firefox/addon/12715 ___ dev-security mailing list dev-security@li