Граф коммитов

17782 Коммитов

Автор SHA1 Сообщение Дата
ffxbld e5a5905f6d No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes ct-logs - r=release-managers,RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D221125
2024-09-05 11:56:25 +00:00
Bob Owen 5a64e37692 Bug 1916286: Add rule for MountPointManager in AddDeveloperRepoDirToPolicy. r=yjuglaret
Differential Revision: https://phabricator.services.mozilla.com/D220873
2024-09-04 12:32:39 +00:00
ffxbld 22ffbfd8d5 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes ct-logs - r=release-managers,RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D220796
2024-09-03 00:30:52 +00:00
Dennis Jackson 8a87c28aaa Bug 1911746 - land NSS NSS_3_104_RTM UPGRADE_NSS_RELEASE, r=nss-reviewers,nkulatova DONTBUILD
Differential Revision: https://phabricator.services.mozilla.com/D220686
2024-08-30 12:40:42 +00:00
ffxbld 8f420e436b No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes ct-logs - a=repo-update
Differential Revision: https://phabricator.services.mozilla.com/D220547
2024-08-29 11:02:47 +00:00
Tamas Szentpeteri be491f3d70 Backed out 4 changesets (bug 1553850) as requested by Gerard for causing snap canonical builds bustages. CLOSED TREE
Backed out changeset ebe866c9c2b1 (bug 1553850)
Backed out changeset ab269021ad5b (bug 1553850)
Backed out changeset 516100dff406 (bug 1553850)
Backed out changeset 678defcc87e3 (bug 1553850)
2024-08-28 23:24:23 +03:00
John Schanck a8969ce634 Bug 1911746 - land NSS NSS_3_104_BETA1 UPGRADE_NSS_RELEASE, r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D220342
2024-08-27 23:51:01 +00:00
Dana Keeler d23884fc6e Bug 1915285 - check in KnownRootHashes.json changes that should have accompanied bug 1909978 DONTBUILD NPOTB r=jschanck
Differential Revision: https://phabricator.services.mozilla.com/D220348
2024-08-27 23:51:01 +00:00
Dana Keeler ee6e30ec73 Bug 1361177 - add more comprehensive certificate transparency integration tests r=jschanck
Differential Revision: https://phabricator.services.mozilla.com/D220197
2024-08-27 23:27:19 +00:00
ffxbld 22f25e8e72 No Bug, mozilla-central repo-update HSTS HPKP remote-settings ct-logs - r=release-managers,RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D220104
2024-08-26 11:40:04 +00:00
John Schanck 11a136ebaf Bug 1912179 - renew cert_verifier.trust_obj_count. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D219774
2024-08-22 15:51:49 +00:00
John Schanck 5803cea4ae Bug 1912179 - remove cert_verifier.cert_trust_evaluation_time. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D219773
2024-08-22 15:51:49 +00:00
ffxbld a19c1703bb No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes ct-logs - r=release-managers,diannaS
Differential Revision: https://phabricator.services.mozilla.com/D219868
2024-08-22 14:55:20 +00:00
Bob Owen 747e60f642 Bug 1912481 p4: Add access to WOW64 codec registry entries for WOW64 processes. r=handyman
Differential Revision: https://phabricator.services.mozilla.com/D218966
2024-08-22 09:16:39 +00:00
Bob Owen e75d603c3a Bug 1912481 p3: Add Applocker rules to all sandboxed processes. r=handyman
This adds these rules to all sandboxes where they would be blocked by the access
token level.

Differential Revision: https://phabricator.services.mozilla.com/D218965
2024-08-22 09:16:38 +00:00
Bob Owen 3f27e32e97 Bug 1912481 p2: Give read access to the Windows system binary dir. r=handyman
This is to allow Windows DLLs that are not used in all content processes to load
later if they are required.

Differential Revision: https://phabricator.services.mozilla.com/D218964
2024-08-22 09:16:38 +00:00
Bob Owen 1d5ebe2ece Bug 1912481 p1: Fix codec rules position. r=handyman
This was mistakenly put inside the if for retrieving the Windows fonts path.

Differential Revision: https://phabricator.services.mozilla.com/D218963
2024-08-22 09:16:38 +00:00
Dana Keeler d89309552c Bug 1913802 - built-in distrust after shouldn't apply to third-party roots r=jschanck
Differential Revision: https://phabricator.services.mozilla.com/D219578
2024-08-20 16:03:07 +00:00
Max Inden cd9132d86e Bug 1912626 - allow sendmsg and recvmmsg in SocketProcessSandboxPolicy r=gerard-majax
https://bugzilla.mozilla.org/show_bug.cgi?id=1901295 introduced optional
HTTP3/QUIC UDP IO via quinn-udp instead of NSPR, see
`network.http.http3.use_nspr_for_io` pref. NSPR uses `recvfrom` syscall,
`quinn-udp` uses `recvmmsg` syscall.

With `network.http.network_access_on_socket_process.enabled` `true` and
`network.http.http3.use_nspr_for_io` `false` Firefox panics due to seccomp
disallowing a `recvmmsg` syscall.

This commit allows `recvmmsg` in the `SocketProcessSandboxPolicy`
`EvaluateSocketCall` function.

Differential Revision: https://phabricator.services.mozilla.com/D219110
2024-08-20 08:31:20 +00:00
Alexandre Lissy 02f9f9f1d7 Bug 1553850 - Add LLVM profiling to Windows Sandbox r=bobowen
Differential Revision: https://phabricator.services.mozilla.com/D218317
2024-08-20 08:15:42 +00:00
Alexandre Lissy c4f8bbd378 Bug 1553850 - Add LLVM profiling to Linux Sandbox r=gcp,perftest-reviewers,afinder
Differential Revision: https://phabricator.services.mozilla.com/D217167
2024-08-20 08:15:41 +00:00
Alexandre Lissy 77240e5228 Bug 1553850 - Add LLVM profiling to macOS Sandbox r=haik
Differential Revision: https://phabricator.services.mozilla.com/D218310
2024-08-20 08:15:41 +00:00
Alexandre Lissy eafdc4183e Bug 1553850 - Add LLVM_PROFILE_FILE directory computation r=bobowen,haik
Differential Revision: https://phabricator.services.mozilla.com/D218309
2024-08-20 08:15:40 +00:00
Dana Keeler a8893783e8 Bug 1913794 - migrate some PSM timing telemetry histograms to glean timing distributions r=jschanck
This migrates SSL_SUCCESFUL_CERT_VALIDATION_TIME_MOZILLAPKIX,
SSL_INITIAL_FAILED_CERT_VALIDATION_TIME_MOZILLAPKIX, and
CERT_VALIDATION_HTTP_REQUEST_{CANCELED,SUCCEEDED,FAILED}_TIME to glean timing
distributions.

The certificate validation time metrics have had their precision increased from
milliseconds to microseconds.

Differential Revision: https://phabricator.services.mozilla.com/D219535
2024-08-19 22:03:24 +00:00
ffxbld e752d71de0 No Bug, mozilla-central repo-update HSTS HPKP remote-settings ct-logs - r=release-managers,diannaS
Differential Revision: https://phabricator.services.mozilla.com/D219494
2024-08-19 15:11:35 +00:00
ffxbld 49fee342b8 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes ct-logs - r=release-managers,diannaS
Differential Revision: https://phabricator.services.mozilla.com/D219233
2024-08-16 07:23:15 +00:00
Dana Keeler 2c12afd0df Bug 1912344 - only filter non-trust-anchors if they are known built-in roots when loading third-party certificates r=jschanck
In bug 1874054, we made it so Firefox won't import a third party certificate if
it is already a known built-in root. This was to prevent roots that were
mistakenly identified as intermediates (as in, "inherits trust") from
overriding the trust settings of built-in roots and preventing chains being
built to those roots. Additionally, we were concerned about cases where a
built-in root had been set by the user to be distrusted, in which case
importing that root from the OS would unexpectedly make it trusted again.
Revisiting the first issue, this patch restricts this check to only
certificates identified as non-trust-anchors, so roots will still be imported.
As for the second issue, it turns out that we actually do want this feature to
work this way. This will enable (with some additional work) situations where a
built-in root has a distrust after date but the user wants that root to still
work as before. As for any discrepancies between the user's trust settings in
Firefox vs. their operating system, that's up to them to resolve.

Differential Revision: https://phabricator.services.mozilla.com/D218889
2024-08-12 19:42:25 +00:00
Dana Keeler 49686e9766 Bug 1912120 - implement updated certificate transparency policy r=jschanck
This updates the certificate transparency policy based on Chrome's policy,
found at https://googlechrome.github.io/CertificateTransparency/ct_policy.html.
Both it and the Chrome policy are similar to the Apple policy, found at
https://support.apple.com/en-us/103214.

Essentially, the policy can be satisfied in two ways, depending on the source
of the collected SCTs.
For embedded SCTs, at least one must be from a log that was Admissible
(Qualified, Usable, or ReadOnly) at the time of the check. There must be SCTs
from N distinct logs that were Admissible or Retired at the time of the check,
where N depends on the lifetime of the certificate. If the certificate lifetime
is less than or equal to 180 days, N is 2. Otherwise, N is 3. Among these SCTs,
at least two must be issued from distinct log operators.
For SCTs delivered via the TLS handshake or an OCSP response, at least two must
be from a log that was Admissible at the time of the check. Among these SCTs,
at least two must be issued from distinct log operators.

Differential Revision: https://phabricator.services.mozilla.com/D218800
2024-08-12 19:41:58 +00:00
ffxbld 0376d39eaf No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes ct-logs - r=release-managers,dmeehan
Differential Revision: https://phabricator.services.mozilla.com/D219055
2024-08-12 15:13:54 +00:00
Andrew Osmond 1c1f8c1ceb Bug 1912328 - Permit stat for allowed files in GMP process sandbox. r=gcp,gerard-majax
After updating the Widevine plugin to 4.10.2830.0, we would crash on
startup of the plugin because it attempted to use the stat syscall.
Allow uses of stat for files that we have already opened / allowed
access to in the GMP sandbox.

Differential Revision: https://phabricator.services.mozilla.com/D218855
2024-08-09 19:24:35 +00:00
Narcis Beleuzu 482161db62 Backed out changeset 5a91437d9dc5 (bug 1912328) for causing build bustages on SandboxFilter.cpp . CLOSED TREE 2024-08-09 18:20:26 +03:00
Andrew Osmond 7eb8c3f022 Bug 1912328 - Permit stat for allowed files in GMP process sandbox. r=gcp,gerard-majax
After updating the Widevine plugin to 4.10.2830.0, we would crash on
startup of the plugin because it attempted to use the stat syscall.
Allow uses of stat for files that we have already opened / allowed
access to in the GMP sandbox.

Differential Revision: https://phabricator.services.mozilla.com/D218855
2024-08-09 12:33:00 +00:00
ffxbld 52f3f87abe No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - r=release-managers,dmeehan
Differential Revision: https://phabricator.services.mozilla.com/D218828
2024-08-08 11:55:28 +00:00
Dana Keeler ddfb0b5c0a Bug 1911193 - update known certificate transparency logs in periodic-updates task r=leplatrem
Differential Revision: https://phabricator.services.mozilla.com/D218370
2024-08-07 18:57:08 +00:00
Noemi Erli 13939e6a33 Backed out changeset f5d5579141d4 (bug 1911193) for causing docker images bustages CLOSED TREE 2024-08-07 22:12:31 +03:00
Dana Keeler 0c50105508 Bug 1911193 - update known certificate transparency logs in periodic-updates task r=leplatrem
Differential Revision: https://phabricator.services.mozilla.com/D218370
2024-08-07 18:57:08 +00:00
Kershaw Chang 0aa93e371f Bug 1876423 - Make SocketProcessParent thread-safe, r=necko-reviewers,valentin
Differential Revision: https://phabricator.services.mozilla.com/D217800
2024-08-07 09:43:30 +00:00
Yanis Lagha a3e0575036 Bug 1910167 - Deleted nsIASN1Tree.idl unused file. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D218687
2024-08-06 22:53:39 +00:00
Dana Keeler b8219b7be2 Bug 1911385 - client certificate modules: return early if searching for irrelevant attributes r=jschanck
The PSM client certificate PKCS#11 modules can take some time to return from
function calls like C_FindObjects* (because they involve synchronous dispatch
to another thread or process). When determining the trust for a certificate,
NSS will query all modules. Querying the PSM modules for trust is just a waste
of time, so this patch makes them return early if NSS is looking for attributes
that are irrelevant to their functionality.

Differential Revision: https://phabricator.services.mozilla.com/D218582
2024-08-05 23:05:25 +00:00
Iulian Moraru 54f8616dab Backed out changeset cf5af528086f (bug 1911385) for causing windows build bustages. CLOSED TREE 2024-08-06 00:52:19 +03:00
Dana Keeler 312c6eaf85 Bug 1911385 - client certificate modules: return early if searching for irrelevant attributes r=jschanck
The PSM client certificate PKCS#11 modules can take some time to return from
function calls like C_FindObjects* (because they involve synchronous dispatch
to another thread or process). When determining the trust for a certificate,
NSS will query all modules. Querying the PSM modules for trust is just a waste
of time, so this patch makes them return early if NSS is looking for attributes
that are irrelevant to their functionality.

Differential Revision: https://phabricator.services.mozilla.com/D218582
2024-08-05 21:01:40 +00:00
Dana Keeler dfc171f072 Bug 1911005 - certificate transparency: note log states and timestamps r=jschanck
This patch uses the log state information in the known CT log list to
differentiate qualified, usable, and readonly (collectively now referred to as
"admissible") logs from retired logs. This patch also takes the opportunity to
update the language in the implementation from "disqualified" to "retired" to
match the current terminology from the source data.

Differential Revision: https://phabricator.services.mozilla.com/D218266
2024-08-05 18:36:23 +00:00
ffxbld c7bd40d8e1 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - r=release-managers,dmeehan
Differential Revision: https://phabricator.services.mozilla.com/D218524
2024-08-05 12:33:29 +00:00
Noemi Erli 02d3c8c7e9 Backed out changeset 3026b1b62d03 (bug 1911005) for causing bustages in CTPolicyEnforcer.cpp CLOSED TREE 2024-08-03 03:18:16 +03:00
Dana Keeler f1fe9ebab5 Bug 1911005 - certificate transparency: note log states and timestamps r=jschanck
This patch uses the log state information in the known CT log list to
differentiate qualified, usable, and readonly (collectively now referred to as
"admissible") logs from retired logs. This patch also takes the opportunity to
update the language in the implementation from "disqualified" to "retired" to
match the current terminology from the source data.

Differential Revision: https://phabricator.services.mozilla.com/D218266
2024-08-02 23:13:18 +00:00
Noemi Erli 12f78bd3c2 Backed out changeset 25bb41b1999f (bug 1911005) for causing build bustage in CTPolicyEnforcer.cpp CLOSED TREE 2024-08-03 00:50:01 +03:00
Dana Keeler 5b01dd7cf4 Bug 1911005 - certificate transparency: note log states and timestamps r=jschanck
This patch uses the log state information in the known CT log list to
differentiate qualified, usable, and readonly (collectively now referred to as
"admissible") logs from retired logs. This patch also takes the opportunity to
update the language in the implementation from "disqualified" to "retired" to
match the current terminology from the source data.

Differential Revision: https://phabricator.services.mozilla.com/D218266
2024-08-02 20:31:27 +00:00
Anna Weine dcf368874e Bug 1906193 - land NSS NSS_3_103_RTM UPGRADE_NSS_RELEASE, r=nss-reviewers,keeler
Differential Revision: https://phabricator.services.mozilla.com/D218318
2024-08-01 17:23:51 +00:00
Emilio Cobos Álvarez e1ad6294bf Bug 1910698 - Remove nsIScriptError.sourceLine. r=smaug,devtools-reviewers,webdriver-reviewers,necko-reviewers,nchevobbe,kershaw,jdescottes,credential-management-reviewers,dimi
Afaict the source lines are not exposed anywhere in the UI.

Differential Revision: https://phabricator.services.mozilla.com/D218115
2024-08-01 17:12:48 +00:00
ffxbld 973981f061 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - r=release-managers,dmeehan
Differential Revision: https://phabricator.services.mozilla.com/D218338
2024-08-01 16:14:31 +00:00