Closed
Bug 1323644
Opened 8 years ago
Closed 8 years ago
Isolate the HSTS and HPKP cache by first party domain.
Categories
(Core :: Networking, defect, P2)
Core
Networking
Tracking
()
RESOLVED
FIXED
mozilla54
Tracking | Status | |
---|---|---|
firefox54 | --- | fixed |
People
(Reporter: jhao, Assigned: jhao)
References
(Blocks 2 open bugs)
Details
(Whiteboard: [tor][tor 17965][necko-would-take][OA])
Attachments
(4 files, 7 obsolete files)
(deleted),
text/x-review-board-request
|
keeler
:
review+
mossop
:
review+
|
Details |
(deleted),
text/x-review-board-request
|
keeler
:
review+
Cykesiopka
:
review+
|
Details |
(deleted),
text/x-review-board-request
|
ckerschb
:
review+
baku
:
review+
|
Details |
(deleted),
text/x-review-board-request
|
ckerschb
:
review+
|
Details |
See bug 1253006.
Arthur has a patch in https://trac.torproject.org/projects/tor/ticket/17965, but it inevitably breaks addons. Many addons use nsISiteSecuirtyService::isSecureURI(), but it provides no information about the first party domain. I'm not sure how we can proceed here.
Assignee | ||
Updated•8 years ago
|
Whiteboard: [tor][tor 17965]
Comment 1•8 years ago
|
||
(In reply to Jonathan Hao [:jhao] from comment #0)
> See bug 1253006.
>
> Arthur has a patch in https://trac.torproject.org/projects/tor/ticket/17965,
> but it inevitably breaks addons. Many addons use
> nsISiteSecuirtyService::isSecureURI(), but it provides no information about
> the first party domain. I'm not sure how we can proceed here.
It seems like you could address this by just leaving the old API for now, so that the add-ons can keep using it, and adding a new API that does what you want (which actually gets called by gecko-internal stuff). Is this not possible?
Assignee | ||
Comment 2•8 years ago
|
||
Yes, that's possible. One concern is that if container or first party isolation pref is on, some addons code might still access the HSTS cache of the default origin attributes, but using that information to upgrade connections in other origin attributes.
Assignee | ||
Comment 3•8 years ago
|
||
But it's still better than doing nothing. Once we have the new API, I will make a pull request to HTTPS-Everywhere, which is the only addon that affects Tor Browser.
Updated•8 years ago
|
Assignee: nobody → jhao
Status: NEW → ASSIGNED
Assignee | ||
Comment 4•8 years ago
|
||
MozReview-Commit-ID: 193BRSxZ7PO
Assignee | ||
Comment 5•8 years ago
|
||
Comment on attachment 8824018 [details] [diff] [review]
Isolate the HSTS and HPKP cache by first party domain. (WIP)
Review of attachment 8824018 [details] [diff] [review]:
-----------------------------------------------------------------
I want to ask for advice, so I uploaded this WIP patch.
::: dom/security/nsMixedContentBlocker.cpp
@@ +843,5 @@
> nsCOMPtr<nsISiteSecurityService> sss =
> do_GetService(NS_SSSERVICE_CONTRACTID, &rv);
> NS_ENSURE_SUCCESS(rv, rv);
> rv = sss->IsSecureURI(nsISiteSecurityService::HEADER_HSTS, aContentLocation,
> + 0, originAttrs, &cached, &hsts);
Hi Christophe. We need to pass origin attributes to IsSecureURI to make HSTS aware of them. In this WIP patch, I get them from the requestPrincipal, but afaik sometimes the request principal doesn't exist or doesn't have the correct origin attributes. How should I get correct origin attributes from the parameter of ShouldLoad()?
Assignee | ||
Updated•8 years ago
|
Flags: needinfo?(ckerschb)
Comment 6•8 years ago
|
||
(In reply to Jonathan Hao [:jhao] from comment #5)
> Hi Christophe. We need to pass origin attributes to IsSecureURI to make
> HSTS aware of them. In this WIP patch, I get them from the
> requestPrincipal, but afaik sometimes the request principal doesn't exist or
> doesn't have the correct origin attributes. How should I get correct origin
> attributes from the parameter of ShouldLoad()?
The principal you want to use is not the argument aRequestPrincipal, it's the principal that is queried from the requesting context [1]. If I remember correctly aReqeustingPrincipal is null in quite so many cases unless we wanna pass and expandedPrincipal within that argument. Let me know if that does not fix your problem.
[1] https://dxr.mozilla.org/mozilla-central/source/dom/security/nsMixedContentBlocker.cpp#604
Flags: needinfo?(ckerschb)
Comment 7•8 years ago
|
||
Try using the principal of the requestingContext. If there is no requestingContext, I guess you could fall back to requestingPrincipal. Though I think you may get inconsistent behavior:
* sometimes requesitngPrincipal is null
* sometimes it is the triggeringPrincipal, as defined by loadInfo
* sometimes it is the loadingPrincipal, as defined by loadInfo (http://searchfox.org/mozilla-central/rev/568e68ade5c6e3d29abba1d1bc25fe87fa1da962/dom/security/nsMixedContentBlocker.cpp#312 - we may actually want to change this code)
Assignee | ||
Comment 8•8 years ago
|
||
Thanks, Christoph and Tanvi.
This version can compile but it makes the APIs not scriptable.
Assignee | ||
Updated•8 years ago
|
Attachment #8824018 -
Attachment is obsolete: true
Comment 9•8 years ago
|
||
Actually, taking a closer look, would the requestingLocation URI have Origin Attributes in its suffix? If so, that looks like the thing to use. It comes from "principal" and if principal doesn't exist, it is set to nsIURI* aRequestingLocation. I don't recall if all URIs have the origin suffix with origin attributes or not.
Assignee | ||
Comment 10•8 years ago
|
||
I realized that if we isolate the HSTS and HPKP storage, we need to provide ForgetAboutSite.jsm a way to clear a domain's storage of all origin attributes. Therefore, we're blocked by bug 1290529. I'll take that bug first.
[1] http://searchfox.org/mozilla-central/rev/0f254a30d684796bcc8b6e2a102a0095d25842bb/toolkit/forgetaboutsite/ForgetAboutSite.jsm#206
Depends on: 1290529
Assignee | ||
Comment 11•8 years ago
|
||
This one is rebased but hasn't deal with js yet.
Assignee | ||
Updated•8 years ago
|
Attachment #8824365 -
Attachment is obsolete: true
Assignee | ||
Comment 12•8 years ago
|
||
Almost done, but it seems to still isolate the storage by userContextId even though I made it not to. I'll need to fix that.
Assignee | ||
Updated•8 years ago
|
Attachment #8828284 -
Attachment is obsolete: true
Comment hidden (mozreview-request) |
Comment hidden (mozreview-request) |
Comment hidden (mozreview-request) |
Comment hidden (mozreview-request) |
Updated•8 years ago
|
Attachment #8829739 -
Flags: review?(MattN+bmo) → review?(dtownsend)
Comment 17•8 years ago
|
||
mozreview-review |
Comment on attachment 8829739 [details]
Bug 1323644 - Isolate the HSTS and HPKP storage by first party domain (ForgetAboutSite)
https://reviewboard.mozilla.org/r/106740/#review108022
::: security/manager/ssl/tests/unit/test_forget_about_site_security_headers.js:124
(Diff revision 1)
> + let originAttributesList = [
> + {},
> + { userContextId: 1},
> + { firstPartyDomain: "foo.com" },
> + { userContextId: 1, firstPartyDomain: "foo.com" },
> + ];
I'm not sure what this array is for. The loops loop over it but never use the contents.
Attachment #8829739 -
Flags: review?(dtownsend) → review-
Assignee | ||
Comment 18•8 years ago
|
||
(In reply to Dave Townsend [:mossop] from comment #17)
> Comment on attachment 8829739 [details]
> Bug 1323644 - Isolate the HSTS and HPKP storage by first party domain
> (ForgetAboutSite)
>
> https://reviewboard.mozilla.org/r/106740/#review108022
>
> :::
> security/manager/ssl/tests/unit/test_forget_about_site_security_headers.js:
> 124
> (Diff revision 1)
> > + let originAttributesList = [
> > + {},
> > + { userContextId: 1},
> > + { firstPartyDomain: "foo.com" },
> > + { userContextId: 1, firstPartyDomain: "foo.com" },
> > + ];
>
> I'm not sure what this array is for. The loops loop over it but never use
> the contents.
Sorry, my bad. The origin attributes were supposed to be passed into processHeader() and isSecureURI().
Comment hidden (mozreview-request) |
Comment hidden (mozreview-request) |
Comment hidden (mozreview-request) |
Comment hidden (mozreview-request) |
Assignee | ||
Updated•8 years ago
|
Attachment #8829376 -
Attachment is obsolete: true
Comment 23•8 years ago
|
||
mozreview-review |
Comment on attachment 8829736 [details]
Bug 1323644 - Isolate the HSTS and HPKP storage by first party domain (ForgetAboutSite)
https://reviewboard.mozilla.org/r/106734/#review108712
This is impressive, and as far as I can tell is almost entirely correct (the main issue is a few areas where we should have error checks - see below).
More generally, though, I'm wondering what you think about first removing some unnecessary methods from nsISiteSecurityService before making these changes? In particular, unsafeProcessHeader isn't necessary if we convert the one gtest that uses it to an xpcshell test. Also, IsSecureHost is redundant when we have IsSecureURI, so maybe we can remove the former? Let me know what you think about that - it would be a non-trivial amount of work, I think.
::: security/manager/ssl/nsISiteSecurityService.idl:110
(Diff revision 2)
> * @param aSourceURI the URI of the resource with the HTTP header.
> * @param aHeader the HTTP response header specifying security data.
> * @param aSSLStatus the SSLStatus of the current channel.
> * @param aFlags options for this request as defined in nsISocketProvider:
> * NO_PERMANENT_STORAGE
> + * @param aOriginAttributes the origin attributes in question.
Maybe instead of "in question" we could say something like "... that isolate this origin" or something for all of this documentation (we should also add that we don't actually isolate by userContextID)
::: security/manager/ssl/nsISiteSecurityService.idl:147
(Diff revision 2)
> /**
> * Same as processHeader but without checking for the security properties
> * of the connection. Use ONLY for testing.
> */
> + [binaryname(UnsafeProcessHeader)]
> + void unsafeProcessHeaderNative(
As far as I can tell, unsafeProcessHeader is only used in a gtest that really could be an xpcshell test (in which case we wouldn't need unsafeProcessHeader because we can use FakeSSLStatus). I realize it's a fair bit more work, but I think it would be beneficial to remove unsafeProcessHeader before we make the changes in this bug.
::: security/manager/ssl/nsISiteSecurityService.idl:180
(Diff revision 2)
> * @param aFlags options for this request as defined in nsISocketProvider:
> * NO_PERMANENT_STORAGE
> + * @param aOriginAttributes the origin attributes in question.
> */
> + [binaryname(RemoveStateScriptable), implicit_jscontext, optional_argc]
> void removeState(in uint32_t aType,
removeState isn't currently called from C++ (unless I'm just not finding it), so perhaps we could get away with not defining a native version of it? (or is that not possible?)
::: security/manager/ssl/nsSiteSecurityService.h:50
(Diff revision 2)
> /**
> * SiteHPKPState: A utility class that encodes/decodes a string describing
> * the public key pins of a site.
> * HPKP state consists of:
> * - Hostname (nsCString)
> + * - OriginAttributes (OriginAttributes)
nit: the first "OriginAttributes" should probably be "Origin attributes"
::: security/manager/ssl/nsSiteSecurityService.cpp:434
(Diff revision 2)
> -SetStorageKey(nsAutoCString& storageKey, const nsACString& hostname, uint32_t aType)
> +SetStorageKey(nsAutoCString& storageKey, const nsACString& hostname,
> + uint32_t aType, const OriginAttributes& aOriginAttributes)
> {
> storageKey = hostname;
> +
> + // Don't isolate by userContextId.
We should document this in nsISiteSecurityService.idl.
::: security/manager/ssl/nsSiteSecurityService.cpp:598
(Diff revision 2)
> + if (aArgc > 0) {
> + // OriginAttributes were passed in.
> + if (!aOriginAttributes.isObject()) {
> + return NS_ERROR_INVALID_ARG;
> + }
> + originAttributes.Init(aCx, aOriginAttributes);
If I understand correctly, we need to test for and handle failure here (I think all of the *Scriptable functions have this issue).
::: security/manager/ssl/nsSiteSecurityService.cpp:1606
(Diff revision 2)
> }
>
> NS_ENSURE_ARG_POINTER(aResult);
> NS_ENSURE_ARG_POINTER(aSha256Pins);
> + OriginAttributes originAttributes;
> + if (aArgc >= 2) {
The other aArgc checks use just '>', so I think we should be consistent here.
::: security/manager/tools/getHSTSPreloadList.js:122
(Diff revision 2)
> try {
> var uri = Services.io.newURI("https://" + host.name);
> var sslStatus = securityInfo.QueryInterface(Ci.nsISSLStatusProvider)
> .SSLStatus;
> gSSService.processHeader(Ci.nsISiteSecurityService.HEADER_HSTS,
> - uri, header, sslStatus, 0, maxAge,
> + uri, header, sslStatus, 0, {}, maxAge,
Looks like security/manager/ssl/tests/unit/test_sts_ipv4_ipv6.js will need a similar update.
Attachment #8829736 -
Flags: review?(dkeeler)
Comment 24•8 years ago
|
||
mozreview-review |
Comment on attachment 8829739 [details]
Bug 1323644 - Isolate the HSTS and HPKP storage by first party domain (ForgetAboutSite)
https://reviewboard.mozilla.org/r/106740/#review108746
LGTM.
::: security/manager/ssl/tests/unit/test_forget_about_site_security_headers.js:115
(Diff revision 2)
> "example.org", 0),
> "example.org should still be HSTS");
> });
> +
> +// Test the case of processing HSTS and HPKP headers for a.pinning2.example.com
> +// with multiple originAttributes, using "Forget About Site" on example.com, and
Maybe s/multiple/various/
Attachment #8829739 -
Flags: review?(dkeeler) → review+
Comment 25•8 years ago
|
||
mozreview-review |
Comment on attachment 8829739 [details]
Bug 1323644 - Isolate the HSTS and HPKP storage by first party domain (ForgetAboutSite)
https://reviewboard.mozilla.org/r/106740/#review109008
Attachment #8829739 -
Flags: review?(dtownsend) → review+
Comment 26•8 years ago
|
||
mozreview-review |
Comment on attachment 8829738 [details]
Bug 1323644 - Isolate the HSTS and HPKP storage by first party domain (Necko)
https://reviewboard.mozilla.org/r/106738/#review109330
I think Tanvi should review this, not me.
::: netwerk/protocol/http/HSTSPrimerListener.cpp:231
(Diff revision 2)
> - rv = sss->IsSecureURI(nsISiteSecurityService::HEADER_HSTS, uri, 0, &cached, &hsts);
> +
> + OriginAttributes originAttributes;
> + NS_GetOriginAttributes(aRequestChannel, originAttributes);
> +
> + rv = sss->IsSecureURI(nsISiteSecurityService::HEADER_HSTS, uri, 0,
> + originAttributes,&cached, &hsts);
nit space after comma
Attachment #8829738 -
Flags: review?(honzab.moz) → review+
Comment 27•8 years ago
|
||
mozreview-review |
Comment on attachment 8829737 [details]
Bug 1323644 - Isolate the HSTS and HPKP storage by first party domain (DOM/DocShell)
https://reviewboard.mozilla.org/r/106736/#review109836
Ask tanvi or somebody else to review the nsMixedContentBlocker code.
::: dom/security/nsMixedContentBlocker.cpp:837
(Diff revision 2)
> nsresult stateRV = securityUI->GetState(&state);
>
> + OriginAttributes originAttributes;
> + if (principal) {
> + originAttributes.Inherit(principal->OriginAttributesRef());
> + } else if (aRequestPrincipal) {
It seems we should not use aRequestPrincipal here.
But I prefer somebody else to review this. I'm not familiar with this code.
Attachment #8829737 -
Flags: review?(amarchesini) → review+
Comment 28•8 years ago
|
||
mozreview-review |
Comment on attachment 8829736 [details]
Bug 1323644 - Isolate the HSTS and HPKP storage by first party domain (ForgetAboutSite)
https://reviewboard.mozilla.org/r/106734/#review109948
Looks good, modulo the comments below and what keeler has already mentioned.
::: security/manager/ssl/PublicKeyPinningService.h:34
(Diff revision 2)
> */
> static nsresult ChainHasValidPins(const UniqueCERTCertList& certList,
> const char* hostname,
> mozilla::pkix::Time time,
> bool enforceTestMode,
> + const OriginAttributes& originAttributes,
Please forward declare `OriginAttributes` or include the appropriate header.
Same anywhere else this isn't done.
::: security/manager/ssl/nsISiteSecurityService.idl:290
(Diff revision 2)
> * @param aSha256Pins array of hashed key fingerprints (SHA-256, base64)
> * @param aIsPreload are these key pins for a preload entry? (false by
> * default)
> + * @param aOriginAttributes the origin attributes in question.
> */
> +
Nit: Unnecessary blank line.
::: security/manager/ssl/nsSiteSecurityService.cpp:22
(Diff revision 2)
> #include "mozilla/Logging.h"
> #include "mozilla/Preferences.h"
> #include "nsArrayEnumerator.h"
> #include "nsCOMArray.h"
> #include "nsCRTGlue.h"
> +#include "nsIScriptSecurityManager.h"
Nit: This files seems to use case-sensitive include order, so this should sort under `nsISSLStatus.h` instead.
::: security/manager/ssl/nsSiteSecurityService.cpp:429
(Diff revision 2)
>
> return NS_OK;
> }
>
> static void
> -SetStorageKey(nsAutoCString& storageKey, const nsACString& hostname, uint32_t aType)
> +SetStorageKey(nsAutoCString& storageKey, const nsACString& hostname,
If you feel like it, it would be nice to make `storageKey` the last param instead of the first, and mark it as `/*out*/`, to match convention.
::: security/manager/ssl/tests/unit/test_sss_originAttributes.js:47
(Diff revision 2)
> +let sslStatus = new FakeSSLStatus(constructCertFromFile(
> + "test_pinning_dynamic/a.pinning2.example.com-pinningroot.pem"));
> +
> +// Check if originAttributes1 and originAttributes2 are isolated with respect
> +// to HSTS/HPKP storage.
> +function doTest(originAttributes1, originAttributes2, aShouldShare) {
Nit: Just `shouldShare` in JS code.
::: security/manager/ssl/tests/unit/test_sss_originAttributes.js:57
(Diff revision 2)
> + ok(sss.isSecureURI(type, uri, 0, originAttributes1),
> + "Same origin attributes should be set");
> + equal(sss.isSecureURI(type, uri, 0, originAttributes2), aShouldShare,
> + "Different origin attributes should be set if and only if " +
> + "aShouldShare is true");
Nit: "origin attributes should be set" to me sounds a bit weird for what we're testing here...
Maybe something like "URI should be secure given original origin attributes" and "URI should be secure given different origin attributes if and only if [...]"?
Same thing elsewhere.
::: security/manager/ssl/tests/unit/test_sss_originAttributes.js:87
(Diff revision 2)
> + equal(sss.isSecureHost(Ci.nsISiteSecurityService.HEADER_HPKP, host, 0,
> + originAttributes2),
> + aShouldShare, "Different origin attributes should not be set");
> + sss.clearAll();
> + ok(!sss.isSecureHost(Ci.nsISiteSecurityService.HEADER_HPKP, host, 0,
> + originAttributes1),
Nit: Indentation here is off.
::: security/manager/ssl/tests/unit/test_sss_originAttributes.js:88
(Diff revision 2)
> + originAttributes2),
> + aShouldShare, "Different origin attributes should not be set");
> + sss.clearAll();
> + ok(!sss.isSecureHost(Ci.nsISiteSecurityService.HEADER_HPKP, host, 0,
> + originAttributes1),
> + "Same origin attributes should cleared");
Nit: Grammar here seems off.
Attachment #8829736 -
Flags: review?(cykesiopka.bmo)
Assignee | ||
Comment 29•8 years ago
|
||
(In reply to Dana Keeler [:keeler] (use needinfo?) from comment #23)
> Comment on attachment 8829736 [details]
> Bug 1323644 - Isolate the HSTS and HPKP storage by first party domain (PSM)
>
> https://reviewboard.mozilla.org/r/106734/#review108712
>
> This is impressive, and as far as I can tell is almost entirely correct (the
> main issue is a few areas where we should have error checks - see below).
Thanks, although some credits should go to Arthur because some of the patch is actually his work, and it reminds me that I should acknowledge that in the commit message.
> More generally, though, I'm wondering what you think about first removing
> some unnecessary methods from nsISiteSecurityService before making these
> changes? In particular, unsafeProcessHeader isn't necessary if we convert
> the one gtest that uses it to an xpcshell test. Also, IsSecureHost is
> redundant when we have IsSecureURI, so maybe we can remove the former? Let
> me know what you think about that - it would be a non-trivial amount of
> work, I think.
I could but it would break a few addons. Not much though, 8 for isSecureHost and 2 for unsafeProcessHeader.
https://dxr.mozilla.org/addons/search?q=isSecureHost&redirect=false
https://dxr.mozilla.org/addons/search?q=unsafeProcessHeader&redirect=false
Do you think we should still remove them?
Comment hidden (mozreview-request) |
Assignee | ||
Updated•8 years ago
|
Attachment #8829737 -
Attachment is obsolete: true
Assignee | ||
Updated•8 years ago
|
Attachment #8829738 -
Attachment is obsolete: true
Assignee | ||
Updated•8 years ago
|
Attachment #8829739 -
Attachment is obsolete: true
Comment hidden (mozreview-request) |
Comment hidden (mozreview-request) |
Comment hidden (mozreview-request) |
Comment hidden (mozreview-request) |
Comment 35•8 years ago
|
||
mozreview-review |
Comment on attachment 8829736 [details]
Bug 1323644 - Isolate the HSTS and HPKP storage by first party domain (ForgetAboutSite)
https://reviewboard.mozilla.org/r/106734/#review110686
As far as I can tell this is the same patch I already reviewed?
Attachment #8829736 -
Flags: review?(dtownsend) → review+
(In reply to Jonathan Hao [:jhao] from comment #29)
...
> > More generally, though, I'm wondering what you think about first removing
> > some unnecessary methods from nsISiteSecurityService before making these
> > changes? In particular, unsafeProcessHeader isn't necessary if we convert
> > the one gtest that uses it to an xpcshell test. Also, IsSecureHost is
> > redundant when we have IsSecureURI, so maybe we can remove the former? Let
> > me know what you think about that - it would be a non-trivial amount of
> > work, I think.
>
> I could but it would break a few addons. Not much though, 8 for
> isSecureHost and 2 for unsafeProcessHeader.
> https://dxr.mozilla.org/addons/search?q=isSecureHost&redirect=false
> https://dxr.mozilla.org/addons/search?q=unsafeProcessHeader&redirect=false
>
> Do you think we should still remove them?
The isSecureHost instances can be replaced with isSecureURI. If any add-ons really need unsafeProcessHeader, they can use processHeader with a fake SSL status like our tests do: https://dxr.mozilla.org/mozilla-central/rev/1d025ac534a6333a8170a59a95a8a3673d4028ee/security/manager/ssl/tests/unit/head_psm.js#668
Since this bug will add some complexity to nsISiteSecurityService/nsSiteSecurityService, I think removing some unnecessary aspects beforehand would be beneficial. (To be clear, though, this should be done in a separate bug.)
Comment hidden (mozreview-request) |
Comment hidden (mozreview-request) |
Comment hidden (mozreview-request) |
Comment hidden (mozreview-request) |
Assignee | ||
Comment 41•8 years ago
|
||
Rebased to bug 1336867.
Comment 42•8 years ago
|
||
mozreview-review |
Comment on attachment 8833258 [details]
Bug 1323644 - Isolate the HSTS and HPKP storage by first party domain (PSM)
https://reviewboard.mozilla.org/r/109504/#review113114
It looks like this needs some further work due to Bug 1336867, so I've only skimmed the changes for now.
(Also, you might want to figure out how to ensure your workflow creates the "MozReview-Commit-ID:" line in your commit messages - I imagine it would've helped with making sure the interdiff keeps working even with a different commit order.)
::: security/manager/ssl/tests/unit/test_sss_originAttributes.js:79
(Diff revision 2)
> + }
> + // Set HPKP for originAttributes1.
> + sss.setKeyPins(host, false, Date.now() + 1234567890, 2,
> + [NON_ISSUED_KEY_HASH, PINNING_ROOT_KEY_HASH], false,
> + originAttributes1);
> + ok(sss.isSecureHost(Ci.nsISiteSecurityService.HEADER_HPKP, host, 0,
Just as a gentle reminder, this needs to be updated to `isSecureURI()` instead.
Same elsewhere.
::: security/manager/ssl/tests/unit/test_sss_originAttributes.js:110
(Diff revision 2)
> + try {
> + action();
> + ok(false, "Should get an error with invalid origin attributes");
> + } catch(e) {
> + ok(true, "Should get an error with invalid origin attributes");
> + }
Let's use `throws()` instead:
```js
throws(action, /NS_ERROR_ILLEGAL_VALUE/,
"Should get an error with invalid origin attributes");
```
::: security/manager/ssl/tests/unit/test_sss_originAttributes.js:120
(Diff revision 2)
> + sss.setKeyPins(host, false, Date.now() + 1234567890, 2,
> + [NON_ISSUED_KEY_HASH, PINNING_ROOT_KEY_HASH], false,
> + originAttributes1);
> + ok(false, "Should get an error with invalid origin attributes");
> + } catch(e) {
> + ok(true, "Should get an error with invalid origin attributes");
We can and should use `throws()` here - the try block actually fails here due to a `ReferenceError`, and not because `setKeyPins()` is rejecting invalid input.
::: security/manager/ssl/tests/unit/test_sss_originAttributes.js:122
(Diff revision 2)
> + }
> +
> + try {
> + sss.setKeyPins(host, false, Date.now() + 1234567890, 2,
> + [NON_ISSUED_KEY_HASH, PINNING_ROOT_KEY_HASH], false,
> + originAttributes1);
`originAttributes1` isn't defined in this function.
I recommend you run `./mach eslint security/` to catch issues like this in the future.
Attachment #8833258 -
Flags: review?(cykesiopka.bmo)
Assignee | ||
Updated•8 years ago
|
Attachment #8833259 -
Flags: review?(tanvi) → review?(ckerschb)
Attachment #8833260 -
Flags: review?(tanvi) → review?(ckerschb)
Assignee | ||
Comment 43•8 years ago
|
||
Hi Christoph, could you review those two patches? Tanvi asked me to look for your help. Thanks.
Comment hidden (mozreview-request) |
Comment hidden (mozreview-request) |
Comment hidden (mozreview-request) |
Comment hidden (mozreview-request) |
Assignee | ||
Comment 48•8 years ago
|
||
(In reply to :Cykesiopka from comment #42)
> Comment on attachment 8833258 [details]
> Bug 1323644 - Isolate the HSTS and HPKP storage by first party domain (PSM)
>
> https://reviewboard.mozilla.org/r/109504/#review113114
>
> It looks like this needs some further work due to Bug 1336867, so I've only
> skimmed the changes for now.
>
> (Also, you might want to figure out how to ensure your workflow creates the
> "MozReview-Commit-ID:" line in your commit messages - I imagine it would've
> helped with making sure the interdiff keeps working even with a different
> commit order.)
You're right. My work flow involves git-mozreview and stgit. It turns out that `stg new` doesn't trigger the hook that mozreview configured to create the MozReview-Commit-ID. Therefore, I forked the stgit repo yesterday and patched it. https://github.com/johnathan79717/stgit/commit/3df569afb1599c4d2130b358848f76a569c51db1
> ::: security/manager/ssl/tests/unit/test_sss_originAttributes.js:122
> (Diff revision 2)
> > + }
> > +
> > + try {
> > + sss.setKeyPins(host, false, Date.now() + 1234567890, 2,
> > + [NON_ISSUED_KEY_HASH, PINNING_ROOT_KEY_HASH], false,
> > + originAttributes1);
>
> `originAttributes1` isn't defined in this function.
> I recommend you run `./mach eslint security/` to catch issues like this in
> the future.
I keep forgetting to do eslint checks :( And that's why bug 1336867 was backed out. I'll make sure this is done after I change any js files from now on.
Assignee | ||
Comment 49•8 years ago
|
||
(In reply to Jonathan Hao [:jhao] from comment #48)
> (In reply to :Cykesiopka from comment #42)
> > Comment on attachment 8833258 [details]
> > Bug 1323644 - Isolate the HSTS and HPKP storage by first party domain (PSM)
> >
> > https://reviewboard.mozilla.org/r/109504/#review113114
> >
> > It looks like this needs some further work due to Bug 1336867, so I've only
> > skimmed the changes for now.
> >
> > (Also, you might want to figure out how to ensure your workflow creates the
> > "MozReview-Commit-ID:" line in your commit messages - I imagine it would've
> > helped with making sure the interdiff keeps working even with a different
> > commit order.)
>
> You're right. My work flow involves git-mozreview and stgit. It turns out
> that `stg new` doesn't trigger the hook that mozreview configured to create
> the MozReview-Commit-ID. Therefore, I forked the stgit repo yesterday and
> patched it.
> https://github.com/johnathan79717/stgit/commit/
> 3df569afb1599c4d2130b358848f76a569c51db1
Here's a more general approach to make `stgit new` trigger commit-msg hook : https://github.com/terinjokes/stgit/compare/master...johnathan79717:0649c45
Comment 50•8 years ago
|
||
mozreview-review |
Comment on attachment 8833258 [details]
Bug 1323644 - Isolate the HSTS and HPKP storage by first party domain (PSM)
https://reviewboard.mozilla.org/r/109504/#review113866
Awesome! r=me with comments addressed.
::: security/manager/ssl/nsISiteSecurityService.idl:111
(Diff revision 3)
> * @param aHeader the HTTP response header specifying security data.
> * @param aSSLStatus the SSLStatus of the current channel.
> * @param aFlags options for this request as defined in nsISocketProvider:
> * NO_PERMANENT_STORAGE
> + * @param aOriginAttributes the origin attributes that isolate this origin,
> + * but we don't isolate by userContextId.
I would phrase this more as a paranthetical: "(note that this implementation does not isolate by userContextId, because ...)" and then fill in the reasoning briefly.
::: security/manager/ssl/nsISiteSecurityService.idl:121
(Diff revision 3)
> * @return NS_OK if it succeeds
> * NS_ERROR_FAILURE if it can't be parsed
> * NS_SUCCESS_LOSS_OF_INSIGNIFICANT_DATA
> * if there are unrecognized tokens in the header.
> */
> + [binaryname(ProcessHeader)]
Do we need a noscript tag on this as well?
::: security/manager/ssl/nsISiteSecurityService.idl:179
(Diff revision 3)
> + * @param aOriginAttributes the origin attributes that isolate this origin,
> + * but we don't isolate by userContextId.
> * @param aCached true if we have cached information regarding whether or not
> * the host is HSTS, false otherwise.
> */
> + [binaryname(IsSecureURI)]
Same here - noscript?
::: security/manager/ssl/nsISiteSecurityService.idl:211
(Diff revision 3)
> *
> * @param aHostname the hostname (punycode) to be queried about
> * @param evalTime the time at which the pins should be valid. This is in
> mozilla::pkix::Time which uses internally seconds since 0 AD.
> + * @param aOriginAttributes the origin attributes that isolate this origin,
> + * but we don't isolate by userContextId.
Same comment about the documentation here.
::: security/manager/ssl/nsISiteSecurityService.idl:235
(Diff revision 3)
> * @param aExpires the time this pin should expire (millis since epoch)
> * @param aPinCount number of keys being pinnned
> * @param aSha256Pins array of hashed key fingerprints (SHA-256, base64)
> * @param aIsPreload are these key pins for a preload entry? (false by
> * default)
> + * @param aOriginAttributes the origin attributes that isolate this origin,
Same documentation comment.
::: security/manager/ssl/nsSiteSecurityService.h:50
(Diff revision 3)
> /**
> * SiteHPKPState: A utility class that encodes/decodes a string describing
> * the public key pins of a site.
> * HPKP state consists of:
> * - Hostname (nsCString)
> + * - OriginAttributes (OriginAttributes)
nit: the first "OriginAttributes" should probably be "Origin attributes", since it describes what it is (whereas the second one describes its type)
::: security/manager/ssl/nsSiteSecurityService.cpp:153
(Diff revision 3)
>
> +NS_IMETHODIMP
> +SiteHSTSState::GetOriginAttributes(JSContext* aCx,
> + JS::MutableHandle<JS::Value> aOriginAttributes)
> +{
> + if (NS_WARN_IF(!ToJSValue(aCx, mOriginAttributes, aOriginAttributes))) {
I'm not sure the NS_WARN_IF part is useful here.
::: security/manager/ssl/nsSiteSecurityService.cpp:332
(Diff revision 3)
>
> +NS_IMETHODIMP
> +SiteHPKPState::GetOriginAttributes(JSContext* aCx,
> + JS::MutableHandle<JS::Value> aOriginAttributes)
> +{
> + if (NS_WARN_IF(!ToJSValue(aCx, mOriginAttributes, aOriginAttributes))) {
Same here.
Attachment #8833258 -
Flags: review?(dkeeler) → review+
Comment 51•8 years ago
|
||
mozreview-review |
Comment on attachment 8829736 [details]
Bug 1323644 - Isolate the HSTS and HPKP storage by first party domain (ForgetAboutSite)
https://reviewboard.mozilla.org/r/106734/#review113870
r=me with updates as of bug 1336867.
::: security/manager/ssl/tests/unit/test_forget_about_site_security_headers.js:113
(Diff revision 6)
> +// HPKP for any originAttributes any longer. Also test that unrelated sites
> +// don't also get removed.
> +add_task(function* () {
> + let originAttributesList = [
> + {},
> + { userContextId: 1},
nit: add a space before the closing '}'
::: security/manager/ssl/tests/unit/test_forget_about_site_security_headers.js:124
(Diff revision 6)
> + sslStatus, 0, originAttributes);
> + sss.processHeader(Ci.nsISiteSecurityService.HEADER_HPKP, uri,
> + GOOD_MAX_AGE + VALID_PIN + BACKUP_PIN, sslStatus, 0,
> + originAttributes);
> +
> + Assert.ok(sss.isSecureHost(Ci.nsISiteSecurityService.HEADER_HSTS,
isSecureURI now, right? :)
Attachment #8829736 -
Flags: review?(dkeeler) → review+
Comment hidden (mozreview-request) |
Comment hidden (mozreview-request) |
Comment hidden (mozreview-request) |
Comment hidden (mozreview-request) |
Comment 56•8 years ago
|
||
mozreview-review |
Comment on attachment 8833260 [details]
Bug 1323644 - Isolate the HSTS and HPKP storage by first party domain (Necko)
https://reviewboard.mozilla.org/r/109508/#review114058
Hey Jonathan, I am willing to r+ that patch, just wanted to make sure we don't forget to account for SyncAttributesWithPrivateBrowsing, see detailed comments below.
::: netwerk/base/nsNetUtil.cpp:2236
(Diff revision 4)
> + OriginAttributes originAttributes;
> + if (aLoadInfo) {
> + originAttributes = aLoadInfo->GetOriginAttributes();
> + } else if (aChannelResultPrincipal) {
> + originAttributes.Inherit(aChannelResultPrincipal->OriginAttributesRef());
> + }
In the other cases you call NS_GetOriginAttributes which internally calls
|aAttributes.SyncAttributesWithPrivateBrowsing(NS_UsePrivateBrowsing(aChannel));| [1]. Would it make sense to rewrite NS_ShouldSecureUpgrade to take a channel instead of aURI, aLoadInfo, aChannelResultPrincipal, ...?
I think you could query all of those arguments within NS_GetOriginAttributes, right?
Alternatively, do we have to account for SyncAttributesWithPrivateBrowsing?
[1] https://dxr.mozilla.org/mozilla-central/source/netwerk/base/nsNetUtil.cpp#1260
::: netwerk/protocol/http/nsHttpHandler.cpp:2270
(Diff revision 4)
> + if (aPrincipal) {
> + originAttributes.Inherit(aPrincipal->OriginAttributesRef());
> + } else if (loadContext) {
> + loadContext->GetOriginAttributes(originAttributes);
> + originAttributes.StripAttributes(OriginAttributes::STRIP_ADDON_ID);
> + }
Ah, here we also don't have a channel so we can't call NS_GetOriginAttributes, but I suppose we already have accounted for private browsing once we have the origin attributes within the principal, right?
Attachment #8833260 -
Flags: review?(ckerschb)
Comment 57•8 years ago
|
||
mozreview-review |
Comment on attachment 8833259 [details]
Bug 1323644 - Isolate the HSTS and HPKP storage by first party domain (DOM/DocShell)
https://reviewboard.mozilla.org/r/109506/#review114062
That looks good to me, just address my nits please. r=me
::: dom/ipc/ContentParent.h:826
(Diff revision 4)
> nsTArray<uint8_t>&& aKeyHandle,
> nsTArray<uint8_t>* aSignature) override;
>
> virtual mozilla::ipc::IPCResult RecvIsSecureURI(const uint32_t& aType, const URIParams& aURI,
> - const uint32_t& aFlags, bool* aIsSecureURI) override;
> + const uint32_t& aFlags,
> + const OriginAttributes& originAttributes,
nit: please prefix arguments: aOriginAttributes.
::: dom/ipc/ContentParent.h:832
(Diff revision 4)
> + bool* aIsSecureURI) override;
>
> virtual mozilla::ipc::IPCResult RecvAccumulateMixedContentHSTS(const URIParams& aURI,
> const bool& aActive,
> - const bool& aHSTSPriming) override;
> + const bool& aHSTSPriming,
> + const OriginAttributes& originAttributes) override;
same nit, please prefix arguments with a
::: dom/ipc/ContentParent.cpp:3351
(Diff revision 4)
>
> mozilla::ipc::IPCResult
> ContentParent::RecvIsSecureURI(const uint32_t& type,
> const URIParams& uri,
> const uint32_t& flags,
> + const OriginAttributes& originAttributes,
nit, prefix with a
::: dom/ipc/PContent.ipdl:778
(Diff revision 4)
> sync NSSU2FTokenSign(uint8_t[] application, uint8_t[] challenge,
> uint8_t[] keyHandle)
> returns (uint8_t[] signature);
>
> - sync IsSecureURI(uint32_t type, URIParams uri, uint32_t flags)
> + sync IsSecureURI(uint32_t type, URIParams uri, uint32_t flags,
> + OriginAttributes originAttributes)
nit: prefix with a and everywhere
Attachment #8833259 -
Flags: review?(ckerschb) → review+
Assignee | ||
Comment 58•8 years ago
|
||
mozreview-review-reply |
Comment on attachment 8833260 [details]
Bug 1323644 - Isolate the HSTS and HPKP storage by first party domain (Necko)
https://reviewboard.mozilla.org/r/109508/#review114058
> In the other cases you call NS_GetOriginAttributes which internally calls
> |aAttributes.SyncAttributesWithPrivateBrowsing(NS_UsePrivateBrowsing(aChannel));| [1]. Would it make sense to rewrite NS_ShouldSecureUpgrade to take a channel instead of aURI, aLoadInfo, aChannelResultPrincipal, ...?
> I think you could query all of those arguments within NS_GetOriginAttributes, right?
>
> Alternatively, do we have to account for SyncAttributesWithPrivateBrowsing?
>
> [1] https://dxr.mozilla.org/mozilla-central/source/netwerk/base/nsNetUtil.cpp#1260
How about getting the origin attributes from the channel and passing them to NS_ShouldSecureUpgrade?
> Ah, here we also don't have a channel so we can't call NS_GetOriginAttributes, but I suppose we already have accounted for private browsing once we have the origin attributes within the principal, right?
I think you're right. Besides, this chunk of code was already there at line 2308.
Comment hidden (mozreview-request) |
Comment hidden (mozreview-request) |
Comment hidden (mozreview-request) |
Comment 62•8 years ago
|
||
mozreview-review |
Comment on attachment 8833260 [details]
Bug 1323644 - Isolate the HSTS and HPKP storage by first party domain (Necko)
https://reviewboard.mozilla.org/r/109508/#review114456
Passing OriginAttributes explicitly to ShouldSecureUpgrade works for me. Thanks for fixing. r=me
Attachment #8833260 -
Flags: review?(ckerschb) → review+
Comment 63•8 years ago
|
||
mozreview-review |
Comment on attachment 8833258 [details]
Bug 1323644 - Isolate the HSTS and HPKP storage by first party domain (PSM)
https://reviewboard.mozilla.org/r/109504/#review114536
Looks good with comments addressed.
::: security/manager/ssl/nsISiteSecurityService.idl:111
(Diff revision 4)
> + * (note that this implementation does not isolate
> + * by userContextId because of the risk of man-in-
> + * the-middle attacks before trust-on-second-use
> + * happens.
Nit: The closing ) is missing here and below.
::: security/manager/ssl/nsSiteSecurityService.cpp:603
(Diff revision 4)
> + }
> + }
> + return RemoveStateInternal(aType, aURI, aFlags, originAttributes);
> +}
> +
> +NS_IMETHODIMP
This should be `nsresult` instead.
It would also be nice to move entire method above the other `RemoveStateInternal()`, so it's easier to see what the difference between the two are.
::: security/manager/ssl/nsSiteSecurityService.cpp:1656
(Diff revision 4)
> continue;
> }
>
> - nsCString hostname(
> + nsCString origin(
> StringHead(item.key(), item.key().Length() - keySuffix.Length()));
> + nsCString hostname;
Nit: I imagine hostnames can typically fit within 64 chars, so let's use `nsAutoCString` instead.
::: security/manager/ssl/tests/unit/test_pinning_header_parsing.js:53
(Diff revision 4)
> gSSService.processHeader(Ci.nsISiteSecurityService.HEADER_HPKP, uri,
> validPinValue, sslStatus, 0);
> }
> try {
> gSSService.processHeader(Ci.nsISiteSecurityService.HEADER_HPKP, uri,
> - pinValue, sslStatus, 0, maxAge);
> + pinValue, sslStatus, 0, {}, maxAge);
test_sts_parser.js needs similar fixes as well.
Attachment #8833258 -
Flags: review?(cykesiopka.bmo) → review+
Comment hidden (mozreview-request) |
Comment hidden (mozreview-request) |
Comment hidden (mozreview-request) |
Comment hidden (mozreview-request) |
Comment 68•8 years ago
|
||
mozreview-review |
Comment on attachment 8833259 [details]
Bug 1323644 - Isolate the HSTS and HPKP storage by first party domain (DOM/DocShell)
https://reviewboard.mozilla.org/r/109506/#review114850
Attachment #8833259 -
Flags: review?(amarchesini) → review+
Assignee | ||
Updated•8 years ago
|
Attachment #8833260 -
Flags: review?(honzab.moz)
Comment hidden (mozreview-request) |
Comment hidden (mozreview-request) |
Comment hidden (mozreview-request) |
Comment hidden (mozreview-request) |
Comment 73•8 years ago
|
||
Pushed by jhao@mozilla.com:
https://hg.mozilla.org/integration/autoland/rev/9f8bb076c706
Isolate the HSTS and HPKP storage by first party domain (PSM) r=Cykesiopka,keeler
https://hg.mozilla.org/integration/autoland/rev/1e40c75bc052
Isolate the HSTS and HPKP storage by first party domain (DOM/DocShell) r=baku,ckerschb
https://hg.mozilla.org/integration/autoland/rev/821c93716882
Isolate the HSTS and HPKP storage by first party domain (Necko) r=ckerschb
https://hg.mozilla.org/integration/autoland/rev/fe6f2e7b9aa1
Isolate the HSTS and HPKP storage by first party domain (ForgetAboutSite) r=keeler,mossop
Comment 74•8 years ago
|
||
bugherder |
https://hg.mozilla.org/mozilla-central/rev/9f8bb076c706
https://hg.mozilla.org/mozilla-central/rev/1e40c75bc052
https://hg.mozilla.org/mozilla-central/rev/821c93716882
https://hg.mozilla.org/mozilla-central/rev/fe6f2e7b9aa1
Status: ASSIGNED → RESOLVED
Closed: 8 years ago
status-firefox54:
--- → fixed
Resolution: --- → FIXED
Target Milestone: --- → mozilla54
Comment 75•8 years ago
|
||
Well done, Jonathan! This is a great progress!
Thank you for the effort and thanks for all the reviewers!
Comment 76•8 years ago
|
||
(In reply to Ethan Tseng [:ethan] from comment #75)
> Well done, Jonathan! This is a great progress!
> Thank you for the effort and thanks for all the reviewers!
Agreed! Awesome work and much appreciated.
Comment 77•8 years ago
|
||
(In reply to Jonathan Hao [:jhao] from comment #3)
> But it's still better than doing nothing. Once we have the new API, I will
> make a pull request to HTTPS-Everywhere, which is the only addon that
> affects Tor Browser.
HTTPS Everywhere should not be affected since we do not access the HSTS nor HPKP cache.
Assignee | ||
Comment 78•8 years ago
|
||
(In reply to William Budington from comment #77)
> (In reply to Jonathan Hao [:jhao] from comment #3)
> > But it's still better than doing nothing. Once we have the new API, I will
> > make a pull request to HTTPS-Everywhere, which is the only addon that
> > affects Tor Browser.
>
> HTTPS Everywhere should not be affected since we do not access the HSTS nor
> HPKP cache.
Does HTTPS Everywhere uses nsSiteSecurityService::IsSecureURI()? It reads the internal HSTS and HPKP cache information.
Comment 79•8 years ago
|
||
There is one instance of this in the code, but I'm pretty sure it's a no-op in the context it's used and can be safely removed. I'll do this before next release.
Comment 80•8 years ago
|
||
This has been removed as of https://github.com/EFForg/https-everywhere/commit/2daf85c5208b7e8bc988e068e4be66520ab6f07e and will be part of the 5.2.15 release.
Updated•7 years ago
|
Whiteboard: [tor][tor 17965][necko-would-take] → [tor][tor 17965][necko-would-take][OA]
You need to log in
before you can comment on or make changes to this bug.
Description
•