Open
Bug 1365892
Opened 8 years ago
Updated 2 years ago
Some APIs in other components return data that doesn't make sense given the current PSL
Categories
(Core :: Networking: Domain Lists, enhancement, P2)
Core
Networking: Domain Lists
Tracking
()
NEW
People
(Reporter: Gijs, Unassigned)
References
Details
(Whiteboard: [necko-triaged])
In bug 1364852, it became apparent that it is possible for some APIs (like quota storage / indexeddb, and maybe others - I have *not* audited our codebase for problems of this kind...) to return data for domains that the PSL currently labels as toplevel. This could potentially lead to data (be it storage or cookies or something else) and/or permissions to no longer be properly segregated according to the PSL.
I believe this is a problem. Once example.com is in the PSL, it is not possible for a site to set a cookie, store data in indexeddb, or ask for permissions, that apply to all of example.com . The fact that we retain such data / permissions if they were created prior to example.com being added to the PSL is potentially problematic. That we return it when asked for it /might/ equally be problematic - it depends where these checks are supposed to happen.
In bug 1364852, we're enumerating all of storage. In a certain sense, it makes sense that this returns everything we have on disk, even things that no longer make sense given the current PSL. But I'm wondering:
- if we shouldn't just delete all of it once the PSL changes
- if there are other places where we provide access to this data where that *is* problematic.
Jan, at least for indexeddb I guess you're the right person to ask about this, but if you (or anyone else on the CC list) has ideas about what we do for cookies or permissions, that would be helpful.
Gerv, who else could help look into this? I don't know who works on the engineering side of the PSL and how various bits of Gecko/Necko use it...
Flags: needinfo?(jvarga)
Flags: needinfo?(gerv)
Comment 1•8 years ago
|
||
A lot of the APIs you cite are origin-bound. If example.com became a public suffix, it could no longer become an origin of sorts either meaning the data cannot be accessed. (This is an argument for removing the data.)
For cookies however that is not the case. We'd end up sending old example.com cookies to any subdomain. So we should probably make sure to remove those too.
Comment 2•8 years ago
|
||
The PSL changes regularly. I don't know about the performance consequences of checking all our data against the PSL every time someone upgrades Firefox... The other option is every call site re-checking at time of use but that might have performance issues too.
I don't think there's a specific person who works on the PSL for Firefox, and I don't really track how Firefox uses it carefully.
Gerv
Flags: needinfo?(gerv)
Comment 3•8 years ago
|
||
Jason, please find somebody to look at this bug.
Assignee: nobody → jduell.mcbugs
Updated•7 years ago
|
Whiteboard: [necko-active]
Comment 4•7 years ago
|
||
Bulk priority update: https://bugzilla.mozilla.org/show_bug.cgi?id=1399258
Priority: -- → P1
Updated•7 years ago
|
Priority: P1 → P2
Whiteboard: [necko-active]
Updated•7 years ago
|
Whiteboard: [necko-triaged]
Comment 6•6 years ago
|
||
Dragana, any idea how we should continue here? Do you think it requires immediate action, or is it P3?
Assignee: jduell.mcbugs → nobody
Flags: needinfo?(dd.mozilla)
Updated•5 years ago
|
Assignee: nobody → dd.mozilla
Flags: needinfo?(dd.mozilla)
Updated•5 years ago
|
Comment 7•5 years ago
|
||
I was wondering when would be the best time to do such a cleanup.
Maybe when we do an update restart? (ie. when we close Firefox, and there is an update ready)
This has the potential to delay that shutdown a little, but it's probably better than delaying startup or regular open operations?
Updated•3 years ago
|
Assignee: dd.mozilla → nobody
Updated•2 years ago
|
Severity: normal → S3
You need to log in
before you can comment on or make changes to this bug.
Description
•