Граф коммитов

16396 Коммитов

Автор SHA1 Сообщение Дата
John Schanck c4e9fd647f Bug 1741932 - Enable EV Treatment for the renewed Autoridad de Certificacion Firmaprofesional CIF A62634068 root cert. r=keeler
Depends on D133687

Differential Revision: https://phabricator.services.mozilla.com/D133688
2021-12-22 00:04:03 +00:00
John Schanck 317db5ba4f Bug 1740099 - Enable EV Treatment for iTrusChina vTrus Root CA and vTrus ECC Root CA. r=keeler
Depends on D133686

Differential Revision: https://phabricator.services.mozilla.com/D133687
2021-12-22 00:04:03 +00:00
John Schanck df25d3a1d4 Bug 1733014 - Enable EV Treatment for Chunghwa Telecom HiPKI Root CA G1 root certificate. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D133686
2021-12-22 00:04:02 +00:00
ffxbld 0c74571b6a No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D134279
2021-12-20 13:37:10 +00:00
Dana Keeler e06d1bceee Bug 1712837 - introduce ipcclientcerts to allow client certificates to work with the socket process r=rmf,kershaw,necko-reviewers,ipc-reviewers,nika,glandium,jschanck
This patch introduces ipcclientcerts, a PKCS#11 module that the socket process
can load to get access to client certificates and keys managed by the parent
process. This enables client certificate authentication to work with the socket
process (particularly for keys stored outside of NSS, as with osclientcerts or
third-party PKCS#11 modules).

Depends on D130820

Differential Revision: https://phabricator.services.mozilla.com/D122392
2021-12-18 01:30:24 +00:00
Dana Keeler 6c0585e953 Bug 1712837 - avoid unnecessarily clearing the TLS session cache at startup r=jschanck
Differential Revision: https://phabricator.services.mozilla.com/D130820
2021-12-18 01:30:24 +00:00
Jed Davis 739cc884e7 Bug 1743928 - Allow DMA-Buf ioctls for RDD. r=stransky,alwu
In some cases (doing video decode on the CPU and uploading the result
with dmabuf) we'll need to use `DMA_BUF_IOCTL_SYNC` in the RDD process.
This patch allows that ioctl type ('b', used only by dmabuf and Android
binder; the latter doesn't apply on Desktop), for forward compatibility
with any future usage of dmabuf ioctls.

Differential Revision: https://phabricator.services.mozilla.com/D133715
2021-12-16 21:23:11 +00:00
Jed Davis eddb0fea50 Bug 1743611 - Allow uname in the RDD process sandbox. r=gcp
Mesa wants to see the OS version, and this is relatively harmless.

Differential Revision: https://phabricator.services.mozilla.com/D133714
2021-12-16 21:23:10 +00:00
Jed Davis 43f1258f8e Bug 1743609 - Quietly reject socket creation in the RDD process. r=gcp
Mesa tries to get the XDG cache directory value, but if `$XDG_CACHE_HOME`
is unset it tries to call `getpwuid_r` for the home directory instead of
checking the environment, and passwd lookup can use sockets (to connect to
`nscd`, or a server like NIS or LDAP).  This patch changes the RDD sandbox
policy to simply return an error instead of treating it as an unexpected
event.

Also, we don't allow access to that directory in the RDD process's
filesystem policy, so there's no point in Mesa trying to find it.

Differential Revision: https://phabricator.services.mozilla.com/D133713
2021-12-16 21:23:10 +00:00
Jed Davis 398e2ccd0e Bug 1742993 - Allow the `sched_*` syscalls in the RDD process sandbox for the calling thread only. r=gcp
As discussed in the previous patch, we'd like to allow these syscalls for
any thread of the calling process, but technical limitations mean that we
have to restrict them to the calling thread (or not at all).  Therefore,
they are allowed for the calling thread, and EPERM is returned otherwise.

This is a slight problem for Mesa, which in some cases changes a
thread's own scheduler attributes and in other places tries to modify
other threads, but at least if we allow this safe subset it's possible
that a future Mesa version could work within that.

The impact of denying the other-thread case of these syscalls should be
limited to slightly reduced performance via suboptimal scheduling.

Differential Revision: https://phabricator.services.mozilla.com/D133712
2021-12-16 21:23:10 +00:00
Jed Davis 87e3d9eabe Bug 1742993 - Non-fatally deny scheduling parameter operations on other threads in the GMP sandbox. r=gcp
These syscalls operate on a given thread ID, or 0 to indicate the
calling thread; the seccomp-bpf policy can allow the fixed value 0, and
a SIGSYS trap handler can check for the current thread's ID and remap it
to 0, but we don't have a safe way to check if it's another thread of
the current process (which is the policy we'd like to have).  If they
weren't filtered at all, they could act on any thread of any process
owned by the same user, which is not ideal.

Currently the GMP process policy allows them for the calling thread
and treats them as unexpected syscalls otherwise (crashing by default
on Nightly, else ENOSYS), while the content process policy allows them
without filtering (bug 1413313) and we need also them in the RDD process
(this bug).  The direction we're going to take is to allow them on the
current thread and fail with EPERM otherwise.

This patch, therefore, changes the default behavior to EPERM and moves
the code into the policy superclass so that other process types can share it.

Differential Revision: https://phabricator.services.mozilla.com/D133711
2021-12-16 21:23:09 +00:00
John Schanck e1b8c77126 Bug 1746404 - update PreloadedHPKPins.json using dumpGoogleRoots.js. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D134059
2021-12-16 19:13:32 +00:00
Randell Jesup 69eed5881c Bug 1746316: Lock when collecting SizeOfIncludingThis r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D133984
2021-12-16 18:44:27 +00:00
Markus Stange b71653d2f2 Bug 1746263 - Use BufReader when reading the crlite stash. r=keeler
This saves at least 140ms of CPU time during startup from repeated `read` calls.

Differential Revision: https://phabricator.services.mozilla.com/D133940
2021-12-16 10:12:57 +00:00
Marian-Vasile Laza fc3c365670 Backed out 2 changesets (bug 1744203) for causing bc test failures. CLOSED TREE
Backed out changeset 62c677d99313 (bug 1744203)
Backed out changeset 453b154f2cec (bug 1744203)
2021-12-16 05:30:43 +02:00
Jed Davis d37198937e Bug 1744203 - Fix the `connect_abstract_permit` test to handle X11 connections not being allowed. r=gerard-majax
Differential Revision: https://phabricator.services.mozilla.com/D132854
2021-12-16 01:43:16 +00:00
Jed Davis 7f74f590c3 Bug 1744203 - Fix SandboxTesting when test cases expect a specific error. r=gerard-majax
The original SandboxTesting protocol assumed tests would just care about
whether operations succeeded or failed, but now we have tests that check
for specific error codes.  Currently that doesn't work well: getting an
error with the wrong error code is misreported as the syscall succeeding.

This patch changes the protocol to simply indicate whether the test
passed and give an unstructured message about what happened, and fixes
the `SandboxTestingChild::*Test` methods to include the relevant
information in the message.

Differential Revision: https://phabricator.services.mozilla.com/D132853
2021-12-16 01:43:16 +00:00
Benjamin Beurdouche 6b81551a1f Bug 1743993 - land NSS 7d4f221b1fff UPGRADE_NSS_RELEASE, r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D133905
2021-12-15 16:29:10 +00:00
Cosmin Sabou 045a43b2c8 Backed out 2 changesets (bug 1712837) for causing an increase in crashes (bug 1735798). a=backout
Backed out changeset 51773d1ab7b5 (bug 1712837)
Backed out changeset 97b0a77e4ce7 (bug 1712837)
2021-12-15 12:24:03 +02:00
Dana Keeler fe0468b14a Bug 1712837 - introduce ipcclientcerts to allow client certificates to work with the socket process r=rmf,kershaw,necko-reviewers,ipc-reviewers,nika,jschanck
This patch introduces ipcclientcerts, a PKCS#11 module that the socket process
can load to get access to client certificates and keys managed by the parent
process. This enables client certificate authentication to work with the socket
process (particularly for keys stored outside of NSS, as with osclientcerts or
third-party PKCS#11 modules).

Differential Revision: https://phabricator.services.mozilla.com/D122392
2021-12-13 23:59:08 +00:00
Dana Keeler f573cb1470 Bug 1712837 - avoid unnecessarily clearing the TLS session cache at startup r=jschanck
Differential Revision: https://phabricator.services.mozilla.com/D130820
2021-12-13 23:59:08 +00:00
Nika Layzell 7b2e6d4996 Bug 1741665 - Align nsCString's public size_type better with other C++ APIs, r=mccr8,geckoview-reviewers,agi
Differential Revision: https://phabricator.services.mozilla.com/D131422
2021-12-13 21:47:56 +00:00
Butkovits Atila 98359f243b Merge mozilla-central to autoland. CLOSED TREE 2021-12-13 23:48:15 +02:00
Ryan VanderMeulen 6207bc5c67 Backed out changeset 56ae8059453e (bug 1738984) to see if it fixes bug 1745043. a=me 2021-12-13 14:52:08 -05:00
ffxbld fd626fb02c No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D133624
2021-12-13 18:37:07 +00:00
elfarto 6f097098e0 Bug 1743014 - Handle unlink("") calls internally. r=jld
unlink("") will always return -ENOENT if passed to the kernel, so just
do the same thing here. We need this as empty paths can't be whitelisted.

Differential Revision: https://phabricator.services.mozilla.com/D132174
2021-12-13 18:02:47 +00:00
Dana Keeler d74d5e91d6 Bug 1712972 - only call IsCertBuiltInRoot on the socket thread during certificate verification r=jschanck
Based on a patch authored by R. Martinho Fernandes <bugs@rmf.io>.

Differential Revision: https://phabricator.services.mozilla.com/D116505
2021-12-10 21:14:23 +00:00
Cristian Tuns 9ad5101118 Backed out changeset 5396b58ddae7 (bug 1712837) for causing Android ARMv7 build bustages. a=backout 2021-12-10 09:35:39 -05:00
Cosmin Sabou f8225b521f Backed out changeset d53bfb002c23 (bug 1712837) for causing Android ARMv7 build bustages. a=backout 2021-12-10 14:50:12 +02:00
Dana Keeler c52192ebff Bug 1712837 - introduce ipcclientcerts to allow client certificates to work with the socket process r=rmf,kershaw,necko-reviewers,ipc-reviewers,nika,jschanck
This patch introduces ipcclientcerts, a PKCS#11 module that the socket process
can load to get access to client certificates and keys managed by the parent
process. This enables client certificate authentication to work with the socket
process (particularly for keys stored outside of NSS, as with osclientcerts or
third-party PKCS#11 modules).

Differential Revision: https://phabricator.services.mozilla.com/D122392
2021-12-10 00:24:49 +00:00
Dana Keeler 654f5edc31 Bug 1712837 - avoid unnecessarily clearing the TLS session cache at startup r=jschanck
Differential Revision: https://phabricator.services.mozilla.com/D130820
2021-12-10 00:24:48 +00:00
ffxbld cd45866888 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D133356
2021-12-09 15:07:56 +00:00
Mike Hommey 8e411675ac Bug 1744877 - Remove --disable-xul. r=Gijs
Building with --disable-xul has been busted since _at least_ bug
1082579, for more than 7 years (I didn't try to track that down
further). It's time to recognize that the option serves no purpose.

Differential Revision: https://phabricator.services.mozilla.com/D133161
2021-12-08 21:37:11 +00:00
Valentin Gosu 2b555ca6ac Bug 1738984 - Prevent NSS initialization and channel creation during shutdown r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D133065
2021-12-07 22:52:20 +00:00
Andreea Pavel 041f6f706d Backed out 2 changesets (bug 1712837) for win build bustages on a CLOSED TREE
Backed out changeset e754af875d57 (bug 1712837)
Backed out changeset 020eaab241a8 (bug 1712837)
2021-12-07 02:21:09 +02:00
Dana Keeler 8d68ea1d86 Bug 1712837 - introduce ipcclientcerts to allow client certificates to work with the socket process r=rmf,kershaw,necko-reviewers,ipc-reviewers,nika,jschanck
This patch introduces ipcclientcerts, a PKCS#11 module that the socket process
can load to get access to client certificates and keys managed by the parent
process. This enables client certificate authentication to work with the socket
process (particularly for keys stored outside of NSS, as with osclientcerts or
third-party PKCS#11 modules).

Differential Revision: https://phabricator.services.mozilla.com/D122392
2021-12-06 23:43:32 +00:00
Dana Keeler d2380075fb Bug 1712837 - avoid unnecessarily clearing the TLS session cache at startup r=jschanck
Differential Revision: https://phabricator.services.mozilla.com/D130820
2021-12-06 23:43:32 +00:00
ffxbld d6d157ed1e No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D132932
2021-12-06 21:21:07 +00:00
Randell Jesup 08f296ee63 Bug 1743895: Add names to all TaskQueues, remove no-name constructor r=nika,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D132638
2021-12-03 03:16:15 +00:00
Jed Davis 5c9a594910 Bug 1744126 - Allow `sigaltstack` in all sandboxed processes. r=gcp
Differential Revision: https://phabricator.services.mozilla.com/D132739
2021-12-03 00:33:22 +00:00
Dana Keeler df120d1954 Bug 1742205 - reorganize setting TLS handshake information r=jschanck
Differential Revision: https://phabricator.services.mozilla.com/D132413
2021-12-02 22:04:55 +00:00
Csoregi Natalia 59f022092c Backed out 2 changesets (bug 1712837) for causing RemoteProcessMonitor failures. CLOSED TREE
Backed out changeset e3ed61b61357 (bug 1712837)
Backed out changeset 19b9dfd60749 (bug 1712837)
2021-12-01 22:36:35 +02:00
Benjamin Beurdouche 2ee234be4b Bug 1738222 - land NSS NSS_3_73_RTM UPGRADE_NSS_RELEASE, r=jschanck
Differential Revision: https://phabricator.services.mozilla.com/D132621
2021-12-01 18:24:50 +00:00
Dana Keeler c02a76841b Bug 1712837 - introduce ipcclientcerts to allow client certificates to work with the socket process r=rmf,kershaw,necko-reviewers,ipc-reviewers,nika,jschanck
This patch introduces ipcclientcerts, a PKCS#11 module that the socket process
can load to get access to client certificates and keys managed by the parent
process. This enables client certificate authentication to work with the socket
process (particularly for keys stored outside of NSS, as with osclientcerts or
third-party PKCS#11 modules).

Differential Revision: https://phabricator.services.mozilla.com/D122392
2021-12-01 18:10:34 +00:00
Dana Keeler 6d37a3da3d Bug 1712837 - avoid unnecessarily clearing the TLS session cache at startup r=jschanck
Differential Revision: https://phabricator.services.mozilla.com/D130820
2021-12-01 18:10:34 +00:00
Greg Tatum d642b72ac3 Bug 1715892 - Unify locale/DateTimeFormat to mozilla::intl::AppDateTimeFormat; r=platform-i18n-reviewers,dminor
I considered removing this class initially, but it's actually a pretty
useful abstraction over the DateTimeFormat interface when used
specifically with Gecko. It applies the OS preferences and provides some
caching behavior.

Differential Revision: https://phabricator.services.mozilla.com/D131671
2021-12-01 17:41:37 +00:00
Chris Peterson f6fdbf028a Bug 1738401 - Remove -Wno-shadow warning suppressions. r=firefox-build-system-reviewers,glandium
-Wshadow warnings are not enabled globally, so these -Wno-shadow suppressions have no effect. I had intended to enable -Wshadow globally along with these suppressions in some directories (in bug 1272513), but that was blocked by other issues.

There are too many -Wshadow warnings (now over 2000) to realistically fix them all. We should remove all these unnecessary -Wno-shadow flags cluttering many moz.build files.

Differential Revision: https://phabricator.services.mozilla.com/D132289
2021-12-01 06:40:04 +00:00
Marian-Vasile Laza 3bfa529b3e Backed out 6 changesets (bug 1715892, bug 1719735) for causing bc test failures. CLOSED TREE
Backed out changeset 196952bd8c9c (bug 1715892)
Backed out changeset 9105fe01c025 (bug 1715892)
Backed out changeset 4c15d1a24ccd (bug 1715892)
Backed out changeset 2c328b84285f (bug 1715892)
Backed out changeset 8fcdcdf44b62 (bug 1719735)
Backed out changeset c48f398e301f (bug 1719735)
2021-11-30 23:30:59 +02:00
Greg Tatum 9b5497020e Bug 1715892 - Unify locale/DateTimeFormat to mozilla::intl::AppDateTimeFormat; r=platform-i18n-reviewers,dminor
I considered removing this class initially, but it's actually a pretty
useful abstraction over the DateTimeFormat interface when used
specifically with Gecko. It applies the OS preferences and provides some
caching behavior.

Differential Revision: https://phabricator.services.mozilla.com/D131671
2021-11-30 19:05:58 +00:00
ffxbld aac1ce7369 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D132345
2021-11-29 15:03:20 +00:00
Deian Stefan 1ee9a841d8 Bug 1732201 - Sandbox woff2 in OTS using RLBox r=bholley
Differential Revision: https://phabricator.services.mozilla.com/D126435
2021-11-27 23:30:49 +00:00
Cristian Tuns f0ef0360eb Backed out changeset d486edc7499b (bug 1732201) for causing web-platform-tests failures on header-totalsfntsize-001.xht CLOSED TREE 2021-11-27 07:32:22 -05:00
Deian Stefan 0a5e1f2075 Bug 1732201 - Sandbox woff2 in OTS using RLBox r=bholley
Differential Revision: https://phabricator.services.mozilla.com/D126435
2021-11-27 04:41:21 +00:00
Nika Layzell acedd82927 Bug 1734739 - Part 3: Stop providing pids in places where it's not needed/used, r=handyman
Differential Revision: https://phabricator.services.mozilla.com/D128220
2021-11-24 17:56:01 +00:00
Nika Layzell c8c4669312 Bug 1734739 - Part 2: Stop requiring the OtherPid to create Endpoint, r=handyman
Differential Revision: https://phabricator.services.mozilla.com/D128219
2021-11-24 17:56:00 +00:00
Kershaw Chang 89050e7a2e Bug 1738664 - Add peerId to nsITransportSecurityInfo, r=necko-reviewers,dragana
Differential Revision: https://phabricator.services.mozilla.com/D130034
2021-11-23 11:59:47 +00:00
Jed Davis 23ba2c71df Bug 1698778 - Loosen the RDD sandbox policy to support VA-API (including Intel VCS2). r=gcp
Changes:

1. For the `intel` drivers [on newer hardware][VCS2], access to SysV IPC
   is granted.  There is a slight restriction: `semget` and `shmget` are
   restricted to the fixed `key_t` value used by the driver; however,
   the other calls take shm/sem identifiers, which are dynamically
   assigned and globally scoped, so an attacker could still access
   other resources.  This is considered a reasonable tradeoff for not
   needing to allow this (or, eventually, any GPU access) in the content
   process, which is much easier for malicious content to attack than
   RDD.

2. Access to devices in `/dev/dri` and the `DRM_IOCTL_*` ioctls (type `'d'`).

3. Read access to the parts of sysfs used by Mesa to do device detection;
   again, given the choice we'd rather allow this in RDD than content.

4. Read access to directories containing libraries, for plugin loading.

5. Allowing `kcmp` in the special case of comparing the process's
   own fds, for `amdgpu` (already allowed for content).

6. The `eventfd2` syscall, which we use in connection with dma-buf.

[VCS2]: https://github.com/intel/media-driver/blob/77b3b2a6c366/media_driver/linux/common/os/mos_os_specific.c#L1508-L1512

Differential Revision: https://phabricator.services.mozilla.com/D131680
2021-11-23 01:14:41 +00:00
Jed Davis 158787246c Bug 1698778 - Move several pieces of the seccomp-bpf policies into SandboxPolicyCommon. r=gcp
Minor functional changes:

1. `fcntl` `F_DUPFD_CLOEXEC` is now allowed everywhere instead of
   just content.  It's the obvious (and maybe only? and probably
   only portable) way for a library to `dup` and atomically set the
   close-on-exec flag, and appears harmless.

2. `ioctl`s used by the `isatty` function are denied with `ENOTTY` by
   default in all processes, instead of being treated as an invalid
   syscall, and this now applies to `TIOCGWINSZ` (used by musl) as well
   as `TCGETS` (used by glibc).  Nothing new is allowed here; it's just
   that this is treated as an expected denial.

3. Getting the real or effective user or group ID is allowed everywhere.
   Every process type except RDD previously did, and RDD soon will.  See
   also the new comment about why GMP may not always need it, but that
   it's not very meaningful to block.

Refactoring, no functional change intended:

1. The policy for the `kcmp` syscall as used by Mesa's `amdgpu` driver
   is now in a protected method of SandboxPolicyCommon, but is used only
   in the content process as previously.  A later patch will also apply
   it to the RDD process, so this avoids code duplication.

Differential Revision: https://phabricator.services.mozilla.com/D131679
2021-11-23 01:14:41 +00:00
Jed Davis ac85827e83 Bug 1698778 - Allow filtering SysV IPC call arguments. r=gcp
On 32-bit x86, Linux originally used a single system call, ipc(2), for
all SysV IPC.  This is similar to socketcall(2), but the arguments are
passed directly (shifted by one position) instead of indirected via
a pointer, so seccomp-bpf can filter them normally.  Also similar to
socketcall(2), individual syscalls were added later (in kernel 5.1,
vs. 4.3 for socket calls), so the policy needs to handle both of them,
adjusting argument offsets as needed.  This patch adds an argument to
`EvaluateIpcCall` to allow that.

Differential Revision: https://phabricator.services.mozilla.com/D131678
2021-11-23 01:14:40 +00:00
Sylvestre Ledru 70be2344fc Bug 1707591 - ride along - reformat the tree with black 21.10b0 r=ahal,webdriver-reviewers,perftest-reviewers,whimboo,gerard-majax,alexandru.irimovici
This changed with this:
https://github.com/psf/black/pull/1740

Depends on D130964

Differential Revision: https://phabricator.services.mozilla.com/D130965
2021-11-22 22:10:03 +00:00
dmeehan 76b501598c Bug 1741451 - Replace inBytes.size == 0 with inBytes.empty(). r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D131796
2021-11-22 18:38:27 +00:00
ffxbld 22362d9482 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D131775
2021-11-22 14:38:03 +00:00
Deian Stefan 86e82e1036 Bug 1688452 - Retrofit nsExpatDriver to use RLBoxed libexpat r=tjr,peterv,bholley,glandium
Differential Revision: https://phabricator.services.mozilla.com/D104658
2021-11-22 06:19:17 +00:00
Sandor Molnar 51a05715fe Backed out changeset 4294063f1606 (bug 1688452) for causing mochitest and wpt failures. CLOSED TREE 2021-11-20 13:00:27 +02:00
Deian Stefan fcd2e09518 Bug 1688452 - Retrofit nsExpatDriver to use RLBoxed libexpat r=tjr,peterv,bholley,glandium
Differential Revision: https://phabricator.services.mozilla.com/D104658
2021-11-19 21:28:53 +00:00
Alexandru Michis d4f3d0994e Backed out changeset 7893bbd002e0 (bug 1688452) for causing bustages in nsRLBoxExpatDriver.
CLOSED TREE
2021-11-19 15:54:31 +02:00
Deian Stefan 76c5d8907d Bug 1688452 - Retrofit nsExpatDriver to use RLBoxed libexpat r=tjr,peterv,bholley,glandium
Differential Revision: https://phabricator.services.mozilla.com/D104658
2021-11-19 06:08:36 +00:00
Benjamin Beurdouche 9d4b719a04 Bug 1738222 - land NSS 4b8ce9641338 UPGRADE_NSS_RELEASE, r=jschanck
Differential Revision: https://phabricator.services.mozilla.com/D131519
2021-11-18 18:55:20 +00:00
ffxbld a7ed70886d No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D131481
2021-11-18 13:33:04 +00:00
M. Sirringhaus 59c1dc3789 Bug 1736990 - Expose /dev/random and /proc/sys/crypto/fips_enabled in sandboxes. r=bryce,gcp
For running in FIPS mode, NSS needs to check /proc/sys/crypto/fips_enabled, to be able to tell whether FIPS is enabled or not.
FIPS also mandates using /dev/random instead of /dev/urandom.

Differential Revision: https://phabricator.services.mozilla.com/D129126
2021-11-16 14:16:19 +00:00
ffxbld 42035ddc2c No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D131121
2021-11-15 16:59:48 +00:00
Iulian Moraru 897bb9d353 Backed out 2 changesets (bug 1707591) for causing python mozlint failures on test_yaml.py. CLOSED TREE
Backed out changeset a730ab2d0dbe (bug 1707591)
Backed out changeset 0269849fd7ef (bug 1707591)
2021-11-12 18:44:36 +02:00
Sylvestre Ledru c1b5edd8be Bug 1707591 - ride along - reformat the tree with black 21.10b0 r=webdriver-reviewers,whimboo,gerard-majax
This changed with this:
https://github.com/psf/black/pull/1740

Differential Revision: https://phabricator.services.mozilla.com/D130965
2021-11-12 15:06:56 +00:00
Deian Stefan 94453a2008 Bug 1740624 - Add RLBox sandbox pool support r=bholley
Differential Revision: https://phabricator.services.mozilla.com/D130934
2021-11-12 05:20:29 +00:00
ffxbld 1a1b639d54 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D130973
2021-11-11 17:39:17 +00:00
Marian-Vasile Laza 133cd29435 Backed out 2 changesets (bug 1712837) for causing mochitest and marionette test failures. CLOSED TREE
Backed out changeset ecfd23a7ef69 (bug 1712837)
Backed out changeset 51529cb4682e (bug 1712837)
2021-11-11 01:52:57 +02:00
Dana Keeler 15ebcb5e82 Bug 1712837 - introduce ipcclientcerts to allow client certificates to work with the socket process r=rmf,kershaw,necko-reviewers,ipc-reviewers,nika
This patch introduces ipcclientcerts, a PKCS#11 module that the socket process
can load to get access to client certificates and keys managed by the parent
process. This enables client certificate authentication to work with the socket
process (particularly for keys stored outside of NSS, as with osclientcerts or
third-party PKCS#11 modules).

Differential Revision: https://phabricator.services.mozilla.com/D122392
2021-11-10 21:48:47 +00:00
Dana Keeler e1caabbab2 Bug 1712837 - avoid unnecessarily clearing the TLS session cache at startup r=jschanck
Differential Revision: https://phabricator.services.mozilla.com/D130820
2021-11-10 21:48:47 +00:00
shravanrn@gmail.com 6314f91304 Bug 1740187 - Annotate crash reports with rlbox sandbox malloc failures r=bholley
Differential Revision: https://phabricator.services.mozilla.com/D130727
2021-11-10 00:03:25 +00:00
John Schanck 6f32971701 Bug 1738809 - Remove EV Treatment for Expiring Cybertrust Global Root. r=rmf
Differential Revision: https://phabricator.services.mozilla.com/D130207
2021-11-09 09:26:17 +00:00
ffxbld 4acc092a76 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D130621
2021-11-08 16:54:40 +00:00
Jed Davis 3f4202c5c0 Bug 1401774 - Make fd exhaustion errors from the Linux sandbox broker more obvious. r=gcp
If we get `MSG_CTRUNC` back from `recvmsg` in this context, it means
a file descriptor couldn't be received; because the sender will never
attach too many fds, the only reasonable cause is fd exhaustion in the
receiving process.  Therefore, we should return `EMFILE` ("Too many open
files") instead of `EMSGSIZE` ("Message too long") to reduce confusion
when reading log messages.

Differential Revision: https://phabricator.services.mozilla.com/D129891
2021-11-03 23:53:43 +00:00
Jed Davis b0774ee6e3 Bug 1408438 - Remove O_ASYNC from Linux sandbox file broker allowed flags. r=gcp
Differential Revision: https://phabricator.services.mozilla.com/D129890
2021-11-03 23:53:43 +00:00
ffxbld 77b1c7801c No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D130015
2021-11-01 16:11:24 +00:00
Mark Banner ed96f8961f Bug 1738236 - Clean up remaining production uses of the second argument to ChromeUtils.import and change rule to a warning. r=Gijs
Differential Revision: https://phabricator.services.mozilla.com/D129824
2021-11-01 14:25:46 +00:00
Moritz Birghan ce95630c6e Bug 1700165 - Remove NSS types from nsICertOverrideService.idl r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D109382
2021-10-28 20:26:08 +00:00
ffxbld e156d378d8 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D129802
2021-10-28 13:15:42 +00:00
Benjamin Beurdouche 8d6f6ce097 Bug 1733374 - land NSS NSS_3_72_RTM UPGRADE_NSS_RELEASE, r=djackson
Differential Revision: https://phabricator.services.mozilla.com/D129793
2021-10-28 09:41:31 +00:00
shravanrn@gmail.com 0e49f3d498 Bug 1737718 - Configure wasm2c runtime to redirect crashes to MOZ_CRASH r=glandium
Differential Revision: https://phabricator.services.mozilla.com/D129461
2021-10-27 00:55:47 +00:00
Dana Keeler 35c80429f0 Bug 1705360 - un-do nightly experiment obsfucating NSS DB locations r=jschanck,perftest-reviewers,AlexandruIonescu
Acording to crash reports, obsfucating the NSS DB locations did not help, so
this patch un-does the changes and un-migrates any migrated DB locations.

Differential Revision: https://phabricator.services.mozilla.com/D129323
2021-10-27 00:26:59 +00:00
shravanrn@gmail.com 2a11cb1f78 Bug 1737733 - Update rlbox wasm configuration to use direct function calls r=glandium
Differential Revision: https://phabricator.services.mozilla.com/D128566
2021-10-26 23:41:11 +00:00
Jon Bauman 874adf9b96 Bug 1734058 - Update dav1d to new version f52aee04fbd711cddab23d0aa9b196e9c963e7b8 from 2021-10-04 21:58:36. r=mjf,haik
This is a fairly significant update, so required a few changes to Gecko code, but I've commented on the interesting details, so they should be easy to find

Differential Revision: https://phabricator.services.mozilla.com/D129465
2021-10-26 17:11:36 +00:00
Bob Owen 93b7d525df Bug 1713973 p4: Test brokered complex breaker against Uniscribe in content. r=jfkthame
Depends on D129143

Differential Revision: https://phabricator.services.mozilla.com/D129144
2021-10-26 09:58:52 +00:00
Bob Owen 2db5ff3913 Bug 1713973 p2: Add Uniscribe Line Breaking via chromium-sandbox IPC. r=tkikuchi,jfkthame
This adds a new cross call using the chromium shared memory IPC to proxy use of
the Uniscribe line breaker, because it cannot be used in the content process
with win32k lockdown enabled.

If the text being processed is too long to fit into the IPC params then it is
processed in chunks.

This change implements an INPTR_TYPE in the sandbox, which appears to have
been removed at some point.
It also fixes a bug in OpcodeFactory::MakeOpAction, so that a null param is
passed and we can use an empty parameter set.

New files are in chromium-shim as these are most likely to require changes and
this means we will not have to update the main chromium patch.

Depends on D129125

Differential Revision: https://phabricator.services.mozilla.com/D126809
2021-10-26 09:58:51 +00:00
Florian Quèze bcdfb763fc Bug 1736040 - collect CPU time through Glean, r=chutten,gerald,gcp
Differential Revision: https://phabricator.services.mozilla.com/D128609
2021-10-25 18:27:24 +00:00
ffxbld 162bc0c338 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D129377
2021-10-25 13:04:02 +00:00
Evgenia Kotovich 228e38a58c Bug 1576768 [eslint] Turn on JavaScript linting and formatting rules for .sjs files. r=Standard8
Differential Revision: https://phabricator.services.mozilla.com/D128483
2021-10-25 11:12:41 +00:00
Dennis Jackson 1ee43111c5 Bug 1733374 - land NSS NSS_3_72_BETA1 UPGRADE_NSS_RELEASE, r=bbeurdouche
```
2021-10-19  Giulio Benetti  <giulio.benetti@benettiengineering.com>

	* coreconf/rules.mk:
	Bug 1731911 - Fix nsinstall parallel failure r=nss-
	reviewers,djackson

	[f7b146b603f7] [NSS_3_72_BETA1]
```

Differential Revision: https://phabricator.services.mozilla.com/D129242
2021-10-22 16:03:22 +00:00
criss 152f71d4d3 Backed out changeset b60f98f26664 (bug 1576768) for causing mochitest failures. CLOSED TREE 2021-10-22 15:55:50 +03:00
Evgenia Kotovich e29e29aa5a Bug 1576768 [eslint] Turn on JavaScript linting and formatting rules for .sjs files. r=Standard8
Differential Revision: https://phabricator.services.mozilla.com/D128483
2021-10-22 11:39:46 +00:00
ffxbld b9fcc3a375 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D129142
2021-10-21 13:15:44 +00:00
Haik Aftandilian 96b2e2a022 Bug 1467758 - WindowServer connection never being terminated r=spohl
Drop the window server connection from the content process sandbox when out-of-process WebGL is enabled.

Differential Revision: https://phabricator.services.mozilla.com/D128842
2021-10-19 16:38:33 +00:00
Bryce Seager van Dyk 8cb38eecfd Bug 1736453 - Update pysign.py to work under python 3. r=keeler
This also fixes the relative path to pykey.py, which appears to have changed
since the script was first written.

Differential Revision: https://phabricator.services.mozilla.com/D128797
2021-10-19 15:06:58 +00:00
ffxbld e3470aac9e No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D128723
2021-10-19 13:04:19 +00:00
Dennis Jackson 2858bd1345 Bug 1733374 - land NSS de3db3a55aef UPGRADE_NSS_RELEASE, r=bbeurdouche
Differential Revision: https://phabricator.services.mozilla.com/D128763
2021-10-18 16:54:04 +00:00
Evgenia Kotovich 0d0980ee0d Bug 1576768 - Automatically format .sjs files using prettier. r=Standard8,agi,zombie,extension-reviewers
# ignore-this-changeset

Differential Revision: https://phabricator.services.mozilla.com/D128482
2021-10-18 09:26:33 +00:00
Noemi Erli 2bba3cec69 Backed out changeset 2ab6bb03dcc1 (bug 1576768) for causing failures in test_double_submit.html CLOSED TREE 2021-10-18 02:05:57 +03:00
Evgenia Kotovich 3e3dff109c Bug 1576768 - Automatically format .sjs files using prettier. r=Standard8,agi,zombie,extension-reviewers
# ignore-this-changeset

Differential Revision: https://phabricator.services.mozilla.com/D128482
2021-10-17 14:59:14 +00:00
Alexandru Michis dac6815201 Backed out changeset 7c08aa027893 (bug 1576768) for causing multiple failures.
CLOSED TREE
2021-10-15 16:52:43 +03:00
Evgenia Kotovich a8b32926fa Bug 1576768 - Automatically format .sjs files using prettier. r=Standard8,agi,zombie,extension-reviewers
# ignore-this-changeset

Differential Revision: https://phabricator.services.mozilla.com/D128482
2021-10-15 12:58:11 +00:00
Mike Hommey 7debb35262 Bug 1572618 - Statically link the rlbox library to libxul. r=firefox-build-system-reviewers,nika,andi
We still rely on dynamic loading to find the symbols, but since we get
them from libxul, we don't need to load the library before activating
the process sandbox anymore.

Differential Revision: https://phabricator.services.mozilla.com/D128333
2021-10-15 01:17:58 +00:00
Mike Hommey 64f94bf6c9 Bug 1735455 - Make the rlbox library a more normal library. r=firefox-build-system-reviewers,andi,mhentges
The SandoxedWasmLibrary now represents the wasm static library, which
is automatically converted to C via wasm2c. The corresponding source
is handled like a normal source, and the rlbox library is generated
as a normal GeckoSharedLibrary with no xpcom linkage.

Differential Revision: https://phabricator.services.mozilla.com/D128329
2021-10-14 21:09:29 +00:00
ffxbld 52ae48b688 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D128468
2021-10-14 18:52:14 +00:00
Mark Banner 3633fd7457 Bug 1378173 - Remove Promise.jsm. r=Gijs
Differential Revision: https://phabricator.services.mozilla.com/D128098
2021-10-14 08:28:28 +00:00
Jed Davis cbde13526d Bug 1725148 - Fix how we find the Xauthority file for sandbox policies. r=gcp
If the `XAUTHORITY` env var is unset, libXau will fall back to
`$HOME/.Xauthority`, but our content sandbox policy didn't handle that
case when it needs to allow access to that file; this patch corrects
that oversight.

This broke WebGL as of bug 1635451, because we no longer eagerly connect
to the X server before sandbox startup, only as needed for WebGL.

Usually the `XAUTHORITY` env var is set even if the file is in its
default location, but some environments (including but not limited to
the Linux VMs on Chrome OS) do not set it.

Differential Revision: https://phabricator.services.mozilla.com/D127984
2021-10-14 03:12:40 +00:00
criss 9eb751c548 Backed out changeset 9963c30121ab (bug 1700165) for causing failures on test_certs.js. CLOSED TREE 2021-10-12 15:31:11 +03:00
Moritz Birghan 9b720034a0 Bug 1700165 - Remove NSS types from nsICertOverrideService.idl r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D109382
2021-10-12 11:59:49 +00:00
criss 7b08264b23 Backed out changeset b20fc3c89cf8 (bug 1700165) for causing bustages on nsCertOverrideService.cpp. CLOSED TREE 2021-10-12 12:22:14 +03:00
Moritz Birghan 59ddfb41f3 Bug 1700165 - Remove unused API nsICertOverrideService.isCertUsedForOverrides r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D109382
2021-10-12 08:51:33 +00:00
Kershaw Chang 6f1e16637d Bug 1732150 - Remove MITIGATION_DYNAMIC_CODE_DISABLE when we want to parsing PAC on socket process, r=bobowen
Differential Revision: https://phabricator.services.mozilla.com/D127552
2021-10-11 19:17:58 +00:00
ffxbld cd949b6356 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D128060
2021-10-11 13:09:31 +00:00
Cristian Tuns 557947a3d8 Backed out 2 changesets (bug 1732150, bug 1475641) for causing GTest failures on SocketProcessChild.cpp. CLOSED TREE
Backed out changeset 45877c2e8d6b (bug 1475641)
Backed out changeset d6684da1c643 (bug 1732150)
2021-10-11 07:07:33 -04:00
Kershaw Chang 467f33dd4d Bug 1732150 - Remove MITIGATION_DYNAMIC_CODE_DISABLE when we want to parsing PAC on socket process, r=bobowen
Differential Revision: https://phabricator.services.mozilla.com/D127552
2021-10-11 08:30:41 +00:00
Geoff Brown 7e36862b61 Bug 1724296 - Remove many skip-if(verify) test annotations (mochitest pt 2); r=jmaher
This completes the review of skip-if(verify) in mochitest.ini.

Differential Revision: https://phabricator.services.mozilla.com/D127992
2021-10-09 16:07:32 +00:00
Olivier Tilloy bf8b8ae679 Bug 1732580 - Allow read access to files under $SNAP/ in the webcontent sandbox. r=gcp
Differential Revision: https://phabricator.services.mozilla.com/D127565
2021-10-08 19:12:16 +00:00
Dana Keeler 51ad07b3b9 Bug 1705360 - "hide" NSS DBs from meddling third party software r=jschanck,bbeurdouche,perftest-reviewers,sparky
Some crash reports appear to be indicating that initializing NSS' certificate
and key databases is taking on the order of minutes in some cases, which is
unexpected. One hypothesis is that third-party software is opening these DBs at
the same time that NSS is operating on them, causing contention and thus
slowness. This patch experimentally (in Nightly only) renames these DBs in the
hopes that third-party software might not recognize them as the DBs it's
looking for, and will thus leave them alone.

Differential Revision: https://phabricator.services.mozilla.com/D126028
2021-10-08 18:33:46 +00:00
Mike Hommey 46b638b007 Bug 1731976 - Generally allow warnings in security/rlbox. r=firefox-build-system-reviewers,andi
Differential Revision: https://phabricator.services.mozilla.com/D127771
2021-10-08 09:48:38 +00:00
ffxbld 518bed94e6 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D127793
2021-10-07 17:17:12 +00:00
John M. Schanck e8ced8b530 Bug 1717711 - Enable EV Treatment for HARICA's 2015 and 2021 root certificates r=rmf,keeler
Differential Revision: https://phabricator.services.mozilla.com/D127167
2021-10-07 16:22:49 +00:00
Jens Stutte 4320224207 Bug 1731564: Use motivated SpinEventLoopUntil inside security/*. r=bobowen
Depends on D127231

Differential Revision: https://phabricator.services.mozilla.com/D127232
2021-10-07 08:06:14 +00:00
Marian-Vasile Laza 18fb16c542 Backed out 18 changesets (bug 1731564) for causing build bustages on SpinEventLoopUntil. CLOSED TREE
Backed out changeset 0464dbdc8584 (bug 1731564)
Backed out changeset 0d996df13545 (bug 1731564)
Backed out changeset 5630a0e7a109 (bug 1731564)
Backed out changeset 37b41d187cdb (bug 1731564)
Backed out changeset d37700fa60b6 (bug 1731564)
Backed out changeset b0ce7db44b99 (bug 1731564)
Backed out changeset aa5ec3aa1535 (bug 1731564)
Backed out changeset 73b648f1fa70 (bug 1731564)
Backed out changeset bb8fb0f9833e (bug 1731564)
Backed out changeset 0d8905144f5d (bug 1731564)
Backed out changeset 2cfb094a1ec3 (bug 1731564)
Backed out changeset 78d3b0257a6a (bug 1731564)
Backed out changeset e9d32926e93c (bug 1731564)
Backed out changeset 874cab520ce5 (bug 1731564)
Backed out changeset d8071cc32bd9 (bug 1731564)
Backed out changeset 283c5393cbbc (bug 1731564)
Backed out changeset 317bc38e3de5 (bug 1731564)
Backed out changeset 53e3f4862439 (bug 1731564)
2021-10-07 00:09:19 +03:00
Jens Stutte 7b6bc8c02e Bug 1731564: Use motivated SpinEventLoopUntil inside security/*. r=bobowen
Depends on D127231

Differential Revision: https://phabricator.services.mozilla.com/D127232
2021-10-06 19:45:15 +00:00
Mike Hommey 4ca51203f1 Bug 1732824 - Update wasi-sdk to the latest trunk. r=firefox-build-system-reviewers,andi
Differential Revision: https://phabricator.services.mozilla.com/D126749
2021-10-06 08:56:32 +00:00
Alexandre Lissy a44a09d056 Bug 1733814 - Add /run/host/local-fonts to sandbox r=gcp
Differential Revision: https://phabricator.services.mozilla.com/D127519
2021-10-05 08:19:03 +00:00
ffxbld 37e818c16c No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D127414
2021-10-04 13:08:14 +00:00
Narcis Beleuzu cdfdd9704d Backed out changeset afd3d1fef036 (bug 1705360) for Android Btime failures 2021-10-02 03:32:23 +03:00
Dana Keeler 8e59b5f49b Bug 1705360 - "hide" NSS DBs from meddling third party software r=jschanck,bbeurdouche,perftest-reviewers,sparky
Some crash reports appear to be indicating that initializing NSS' certificate
and key databases is taking on the order of minutes in some cases, which is
unexpected. One hypothesis is that third-party software is opening these DBs at
the same time that NSS is operating on them, causing contention and thus
slowness. This patch experimentally (in Nightly only) renames these DBs in the
hopes that third-party software might not recognize them as the DBs it's
looking for, and will thus leave them alone.

Differential Revision: https://phabricator.services.mozilla.com/D126028
2021-10-01 17:40:38 +00:00
ffxbld 83e68e8168 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D127083
2021-10-01 12:44:02 +00:00
Csoregi Natalia f4117debbf Backed out changeset b9abaf976608 (bug 1652463) as per request. CLOSED TREE 2021-09-30 21:05:47 +03:00
Benjamin Beurdouche 9c5d130d24 Bug 1729163 - land NSS NSS_3_71_RTM UPGRADE_NSS_RELEASE, r=djackson DONTBUILD
```
2021-09-30  Benjamin Beurdouche  <bbeurdouche@mozilla.com>

	* lib/nss/nss.h, lib/softoken/softkver.h, lib/util/nssutil.h:
	Set version numbers to 3.71 final
	[2257d7391ec1] [NSS_3_71_RTM] <NSS_3_71_BRANCH>

2021-09-24  Benjamin Beurdouche  <bbeurdouche@mozilla.com>

	* .hgtags:
	Added tag NSS_3_71_BETA1 for changeset 2199f01d7f1e
	[17957377f710] <NSS_3_71_BRANCH>
```

Differential Revision: https://phabricator.services.mozilla.com/D127116
2021-09-30 12:57:34 +00:00
Marian-Vasile Laza 4b2ed8e8b4 Backed out changeset ee866eada1ad (bug 1705360) for causing talos failures. CLOSED TREE DONTBUILD 2021-09-30 06:54:43 +03:00
Dana Keeler 9aa0ad981f Bug 1705360 - "hide" NSS DBs from meddling third party software r=jschanck,bbeurdouche
Some crash reports appear to be indicating that initializing NSS' certificate
and key databases is taking on the order of minutes in some cases, which is
unexpected. One hypothesis is that third-party software is opening these DBs at
the same time that NSS is operating on them, causing contention and thus
slowness. This patch experimentally (in Nightly only) renames these DBs in the
hopes that third-party software might not recognize them as the DBs it's
looking for, and will thus leave them alone.

Differential Revision: https://phabricator.services.mozilla.com/D126028
2021-09-29 21:23:59 +00:00
Cosmin Sabou 0d612db0fb Backed out 4 changesets (bug 1688452) for assertion and bc failures on browser_translation_bing.js.
Backed out changeset 1a720cffc019 (bug 1688452)
Backed out changeset 797a7e243d43 (bug 1688452)
Backed out changeset 00fd325069fa (bug 1688452)
Backed out changeset 23ef68478e93 (bug 1688452)
2021-09-29 20:13:33 +03:00
Deian Stefan 20476da693 Bug 1688452 - Part 4: Add Wasm sandbox support for RLBoxed libexpat r=tjr
Depends on D126369

Differential Revision: https://phabricator.services.mozilla.com/D106254
2021-09-29 14:31:45 +00:00
Butkovits Atila 8b745c7243 Backed out changeset 2f93c060a50c (bug 1732824) as per dev's request. CLOSED TREE 2021-09-29 04:21:35 +03:00
Butkovits Atila 932ea37867 Backed out changeset 4b6b66ff77ea (bug 1705360) for causing failures in test_refresh_firefox.py. CLOSED TREE 2021-09-29 01:12:25 +03:00
Dana Keeler bcda0806c6 Bug 1705360 - "hide" NSS DBs from meddling third party software r=jschanck,bbeurdouche
Some crash reports appear to be indicating that initializing NSS' certificate
and key databases is taking on the order of minutes in some cases, which is
unexpected. One hypothesis is that third-party software is opening these DBs at
the same time that NSS is operating on them, causing contention and thus
slowness. This patch experimentally (in Nightly only) renames these DBs in the
hopes that third-party software might not recognize them as the DBs it's
looking for, and will thus leave them alone.

Differential Revision: https://phabricator.services.mozilla.com/D126028
2021-09-28 18:54:04 +00:00
Mike Hommey f43531930b Bug 1732824 - Update wasi-sdk to the latest trunk. r=firefox-build-system-reviewers,andi
Differential Revision: https://phabricator.services.mozilla.com/D126749
2021-09-28 09:08:35 +00:00
Alex Lopez 63022efc7a Bug 1696251: Allow mach commands as stand-alone functions and adapt existing commands. r=mhentges,webdriver-reviewers,perftest-reviewers,sparky,whimboo
This removes the `@CommandProvider` decorator and the need to implement
mach commands inside subclasses of `MachCommandBase`, and moves all
existing commands out from classes to module level functions.

Differential Revision: https://phabricator.services.mozilla.com/D121512
2021-09-27 18:12:51 +00:00
ffxbld 90a178e4f2 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D126655
2021-09-27 13:31:34 +00:00
Dana Keeler 589bd3a862 Bug 1675655 - gather telemetry on how often CRLite and OCSP disagree data-review=chutten r=jschanck
The added telemetry category labels are cryptically short because there is a
limit of 20 characters for each one.

Differential Revision: https://phabricator.services.mozilla.com/D125602
2021-09-23 19:53:23 +00:00
ffxbld acd813f1dd No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D126479
2021-09-23 15:38:10 +00:00
Butkovits Atila eb735ac57e Backed out changeset 53b1fa0faa6d (bug 1696251) for breaking the static-analysis integration. a=backout 2021-09-23 13:06:40 +03:00
Dana Keeler a1c4e115cf Bug 1546720 - don't unload temporary PKCS#11 modules when PSM shuts down r=jschanck,bbeurdouche
NSS shutdown happens in ShutdownXPCOM, after PSM (namely, nsINSSComponent) has
been shut down. Unloading temporarily-loaded PKCS#11 modules like the built-in
roots module and the osclientcerts module when PSM shuts down is redundant,
because this will happen when NSS shuts down anyway. Furthermore, doing so can
run afoul of some race conditions in NSS, so removing this redundant code is
the way to go.

Differential Revision: https://phabricator.services.mozilla.com/D126141
2021-09-22 16:09:48 +00:00
Dragana Damjanovic df4152feaf Bug 1382886 - Make sure that nsHttpConnection immediately knows that the handshake is done. r=necko-reviewers,kershaw
Differential Revision: https://phabricator.services.mozilla.com/D123919
2021-09-22 09:19:31 +00:00
Dragana Damjanovic 985c02c2f1 Bug 1382886 - Use HandshakeDone to signal that a handshake is done r=necko-reviewers,keeler,kershaw
HandshakeDone will be called after a handshake is finished and also after the certificate verifications are done.
The code relies on HandshakeDone to signal that the handshake is done. When early-data is not available HandshakeDone is responsible for setting up a Http2 session if needed. There are 2 outcomes when early-data is used:
1) early-data is accepted and transaction continues polling for read,
2) early-data is rejected. In this case, the transaction is restarted as well as polling flags, i.e. the connection will stop polling for read and start polling for write.
Another difference is that a transaction that is started during the early-data period will behave as a normal transaction, i.e. it will write data and continue polling for read to receive response. The special cases during early-data(mWaitingFor0RTTResponse==true) are removed from nsHttpConnection::OnSocketWritable().

EnsureNPNComplete is only responsible for driving handshake and checking the early-data availability. All logic for finishing a handshake (i.e. checking whether early-data is accepted and checking alpn value) has been moved to HandshakeDone.
The patch also extracts FinishNPNSetup that is responsible for the bookkeeping after a handshake is done or fails, e.g. resetting transactions if 0Rtt is used but handshake fails, updating timings and sending telemetry.

HandshakeDone needs to be dispatched so that it is not called inside nss locks. The side effect of this is that nsHttpConnection::OnSocketWritable() may be called in between  HandshakeDone being dispatched and executed. Therefore we still need to keep CheckCanWrite0RTTData(). This can be fixed in a follow up patch.

Side cleanups:
Remove mNotTrustedMitmDetected - his was used for ESNI, but it is not used anymore

Differential Revision: https://phabricator.services.mozilla.com/D123824
2021-09-22 09:19:31 +00:00
Dragana Damjanovic c116b60b2c Bug 1382886 - Add a callback when the handshake is done. r=necko-reviewers,kershaw,keeler
Differential Revision: https://phabricator.services.mozilla.com/D123601
2021-09-22 09:19:30 +00:00
Alex Lopez a8e7083c84 Bug 1696251: Allow mach commands as stand-alone functions and adapt existing commands. r=mhentges,webdriver-reviewers,perftest-reviewers,sparky,whimboo
This removes the `@CommandProvider` decorator and the need to implement
mach commands inside subclasses of `MachCommandBase`, and moves all
existing commands out from classes to module level functions.

Differential Revision: https://phabricator.services.mozilla.com/D121512
2021-09-21 20:38:16 +00:00
Butkovits Atila c06a3dd9fa Backed out changeset 510dd46a9de7 (bug 1696251) for causing Android build bustages. 2021-09-21 05:16:50 +03:00
Alex Lopez fe61e94ec8 Bug 1696251: Allow mach commands as stand-alone functions and adapt existing commands. r=mhentges,webdriver-reviewers,perftest-reviewers,sparky,whimboo
This removes the `@CommandProvider` decorator and the need to implement
mach commands inside subclasses of `MachCommandBase`, and moves all
existing commands out from classes to module level functions.

Differential Revision: https://phabricator.services.mozilla.com/D121512
2021-09-20 20:21:07 +00:00
ffxbld 92e7975dba No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D126089
2021-09-20 13:59:31 +00:00
Butkovits Atila e097708c27 Backed out 7 changesets (bug 1382886) for causing very frequent networking crashes. a=backout DONTBUILD
Backed out changeset e0d76ea1bdd2 (bug 1382886)
Backed out changeset 1db60c600b97 (bug 1382886)
Backed out changeset c922a30d444e (bug 1382886)
Backed out changeset 7f2260b49e60 (bug 1382886)
Backed out changeset 0c049a8ee4a8 (bug 1382886)
Backed out changeset 632eefa7e529 (bug 1382886)
Backed out changeset fe6b8f41ca83 (bug 1382886)
2021-09-18 12:37:24 +03:00
Dragana Damjanovic 3f98b48466 Bug 1382886 - Make sure that nsHttpConnection immediately knows that the handshake is done. r=necko-reviewers,kershaw
Differential Revision: https://phabricator.services.mozilla.com/D123919
2021-09-17 13:19:01 +00:00
Dragana Damjanovic 72ccc52dcc Bug 1382886 - Use HandshakeDone to signal that a handshake is done r=necko-reviewers,keeler,kershaw
HandshakeDone will be called after a handshake is finished and also after the certificate verifications are done.
The code relies on HandshakeDone to signal that the handshake is done. When early-data is not available HandshakeDone is responsible for setting up a Http2 session if needed. There are 2 outcomes when early-data is used:
1) early-data is accepted and transaction continues polling for read,
2) early-data is rejected. In this case, the transaction is restarted as well as polling flags, i.e. the connection will stop polling for read and start polling for write.
Another difference is that a transaction that is started during the early-data period will behave as a normal transaction, i.e. it will write data and continue polling for read to receive response. The special cases during early-data(mWaitingFor0RTTResponse==true) are removed from nsHttpConnection::OnSocketWritable().

EnsureNPNComplete is only responsible for driving handshake and checking the early-data availability. All logic for finishing a handshake (i.e. checking whether early-data is accepted and checking alpn value) has been moved to HandshakeDone.
The patch also extracts FinishNPNSetup that is responsible for the bookkeeping after a handshake is done or fails, e.g. resetting transactions if 0Rtt is used but handshake fails, updating timings and sending telemetry.

HandshakeDone needs to be dispatched so that it is not called inside nss locks. The side effect of this is that nsHttpConnection::OnSocketWritable() may be called in between  HandshakeDone being dispatched and executed. Therefore we still need to keep CheckCanWrite0RTTData(). This can be fixed in a follow up patch.

Side cleanups:
Remove mNotTrustedMitmDetected - his was used for ESNI, but it is not used anymore

Differential Revision: https://phabricator.services.mozilla.com/D123824
2021-09-17 13:19:01 +00:00
Dragana Damjanovic 1f0044c034 Bug 1382886 - Add a callback when the handshake is done. r=necko-reviewers,kershaw,keeler
Differential Revision: https://phabricator.services.mozilla.com/D123601
2021-09-17 13:19:00 +00:00
Benjamin Beurdouche 4fcdfbc981 Bug 1729163 - land NSS 2199f01d7f1e UPGRADE_NSS_RELEASE, r=beurdouche
Differential Revision: https://phabricator.services.mozilla.com/D125872
2021-09-16 19:27:33 +00:00
ffxbld e4c4aa44cc No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D125820
2021-09-16 15:49:00 +00:00
Tim Huang ea93c4f3a8 Bug 1664995 - Part 3: Add tests for private browsing mode. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D124470
2021-09-16 09:20:40 +00:00
Tim Huang 1a69e0aa82 Bug 1664995 - Part 2: Add tests to verify that OCSP cache is isolated by partitionKey. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D123958
2021-09-16 09:20:40 +00:00
Tim Huang 374fb44e84 Bug 1664995 - Part 1: Make OCSP cache to be aware of the partitionKey in the originAttributes. r=keeler
The patch add partitionKey into the certIDHash to isolate OCSP by the
partitionKey.

Differential Revision: https://phabricator.services.mozilla.com/D123957
2021-09-16 09:20:39 +00:00
Jens Stutte 87de42e070 Bug 1726813: Ensure AppShutdown remains in sync with shutdown notifications in the parent process. r=xpcom-reviewers,nika,dom-worker-reviewers,asuth
The goal here is to ensure we can always rely on `AppShutdown::GetShutdownPhase` to be in sync with the "real" application status, mainly this was needed for xpcshell tests to not break if we add assertions on our shutdown state on some global singletons.

We keep the existing observer notification topics but force them (on the parent process) to be issued through the new `advanceShutdownPhase` function of the startup service using the `ShutdownPhase` enum. This way we can synchronize `AppShutdown`'s internal status accordingly.

Some further notes:

  # The `MOZ_ASSERT(AppShutdown::IsNoOrLegalShutdownTopic(aTopic));` in `NotifyObservers` helped a lot to identify missing cases. I think we should keep it in order to stay safe.
  # Introducing the `cenum IDLShutdownPhase` helps to keep the knowledge about the mapping from shutdown phases to observer topics exclusively inside AppShutdown.cpp. Still callers must know what they do in order to choose a proper phase, of course.
  # However we must be aware that `AppShutdown` this way can be kept in sync with the shutdown notifications only in the parent process and that `GetCurrentShutdownPhase` might not give the correct result in child processes. We might want to file a follow up bug that adds some asserts to avoid improper use of `AppShutdown` functions in child processes (but I do not want to make this patch bigger as needed to solve the blocking dependency for bug 1697972).
  # The socket process is one example of a child process that "overloads" shutdown topics. I was wondering if it is the right call to use the very same topic names here to request shutdown to the socket process or if it should have its own topics. Those topics triggered the assert and thus I had to disable it for child processes, for now.
  # This goes together with the more general approach to define process type specific shutdown phases (and hence mappings to topics) as drafted very roughly in bug 1697745.
  # This patch seemed to trigger a known intermittent more often, thus the change here in `ServiceWorkerManager`.

Differential Revision: https://phabricator.services.mozilla.com/D124350
2021-09-15 07:25:29 +00:00
R. Martinho Fernandes 4fa1dee9c4 Bug 1713605 - Avoid NSS usage in CertVerifier::VerifySSLServerCert r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D118030
2021-09-14 18:11:05 +00:00
ffxbld fb7c66cb59 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D125385
2021-09-13 15:09:05 +00:00
Daniel Holbert 80262e03fb Bug 1730265: Add includes to SandboxTestingChild.cpp and SandboxTestingParent.cpp to fix build errors with --disable-unified-build. r=handyman
These includes provide some types and functionality that these files need. In
the default build environment, there's no issue because they pick up these
includes via piggybacking on neighboring files that they're unified with; but
in a non-unified build, the files need to directly have these includes, to
avoid build errors.

See https://bugzilla.mozilla.org/show_bug.cgi?id=1730265#c0 for the specific
build errors being addressed here.

Differential Revision: https://phabricator.services.mozilla.com/D125285
2021-09-10 22:07:52 +00:00
ffxbld a9b982bfec No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D125057
2021-09-09 14:38:12 +00:00
Ben Hearsum 1ce8af6321 Bug 1714200: annotate remaining M1 test failures. r=jmaher,application-update-reviewers,bytesized DONTBUILD
Depends on D124907

Differential Revision: https://phabricator.services.mozilla.com/D124908
2021-09-08 18:14:01 +00:00
Csoregi Natalia f8eade1ce0 Backed out changeset 0b97742fcc62 (bug 1722306) for causing UI prompts on macOS pre-Big Sur. CLOSED TREE 2021-09-08 19:22:40 +03:00
Kershaw Chang db54d51818 Bug 1729453 - Allow socket process to enable TCSM, r=haik
Differential Revision: https://phabricator.services.mozilla.com/D124798
2021-09-08 07:17:23 +00:00
Dana Keeler a9849f5f68 Bug 1722306 - osclientcerts: differentiate between RSA keys that support RSA-PSS and those that do not on macOS r=rmf
This was previously attempted in bug 1658042, but the library function that
this relies on (SecKeyIsAlgorithmSupported) was causing OS dialogs to appear on
our test machines, so it wasn't a viable option. Something seems to have
changed in the meantime (perhaps these dialogs were a bug in macOS?), and now
the function works as expected without dialogs.

Differential Revision: https://phabricator.services.mozilla.com/D124114
2021-09-07 18:55:48 +00:00
ffxbld a166f59fba No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D124611
2021-09-07 14:25:19 +00:00
Mark Banner 11bfa90d06 Bug 1602940 - Automated replacements to use Services.uuid. r=Gijs,necko-reviewers,preferences-reviewers,kershaw
Depends on D124391

Differential Revision: https://phabricator.services.mozilla.com/D124392
2021-09-06 09:53:52 +00:00
Sylvestre Ledru 3cb3d2ac04 Bug 1729222 - pylint - ride along - remove items from the exclude + fix a warning r=linter-reviewers,marco DONTBUILD
Differential Revision: https://phabricator.services.mozilla.com/D124581
2021-09-06 08:05:39 +00:00
Benjamin Beurdouche e499334524 Bug 1724869 - land NSS NSS_3_70_RTM UPGRADE_NSS_RELEASE, r=beurdouche DONTBUILD
```
2021-09-04  Benjamin Beurdouche  <bbeurdouche@mozilla.com>

	* lib/nss/nss.h, lib/softoken/softkver.h, lib/util/nssutil.h:
	Set version numbers to 3.70 final
	[c4e7630cbfec] [NSS_3_70_RTM] <NSS_3_70_BRANCH>

	* doc/rst/releases/index.rst, doc/rst/releases/nss_3_70.rst:
	Documentation: release notes for NSS 3.70
	[a86217c0ce0d] <NSS_3_70_BRANCH>

2021-08-31  Benjamin Beurdouche  <bbeurdouche@mozilla.com>

	* doc/rst/releases/nss_3_69_1.rst:
	Release notes for NSS 3.69.1
	[3160cfcbec3b] <NSS_3_70_BRANCH>

2021-08-26  Benjamin Beurdouche  <bbeurdouche@mozilla.com>

	* .hgtags:
	Added tag NSS_3_70_BETA1 for changeset e55700ee052e
	[8a2ba28dd68a] <NSS_3_70_BRANCH>
```

Differential Revision: https://phabricator.services.mozilla.com/D124539
2021-09-04 18:04:02 +00:00
Marian-Vasile Laza c6b30230dd Backed out changeset f4a35daa5ed7 for causing build bustages. CLOSED TREE 2021-09-02 16:17:10 +03:00
ffxbld 2102d03a39 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D124331
2021-09-02 12:55:49 +00:00
Agi Sferro 52b49a2dbe Bug 1676216 - Remove unused checkbox on promptAuth and similar. r=dimi,owlish,necko-reviewers,kershaw
The checkbox is never actually displayed (I think) so we don't need any of this
code.

Differential Revision: https://phabricator.services.mozilla.com/D122502
2021-09-01 23:42:25 +00:00
Dragana Damjanovic 9c5412108c Bug 1718719 - Disable the TLS early-data if proxy is use r=necko-reviewers,keeler,kershaw
Currently we do not use the early-data when a proxy is used, but we do not disable it in the nss layer.

Differential Revision: https://phabricator.services.mozilla.com/D123492
2021-09-01 19:57:10 +00:00
Iulian Moraru 0672e33a18 Backed out 8 changesets (bug 1676216, bug 1710668) for causing build bustages. CLOSED TREE
Backed out changeset b18aea9590ee (bug 1676216)
Backed out changeset bb5fc7f9df83 (bug 1676216)
Backed out changeset dfc0ce411a75 (bug 1676216)
Backed out changeset d83b518be746 (bug 1676216)
Backed out changeset a7c71027c898 (bug 1676216)
Backed out changeset 41fee786f8ec (bug 1676216)
Backed out changeset 86546e1132f5 (bug 1710668)
Backed out changeset 8e3d053f5f55 (bug 1710668)
2021-09-01 21:57:28 +03:00
Agi Sferro 22c6b5887b Bug 1676216 - Remove unused checkbox on promptAuth and similar. r=dimi,owlish,necko-reviewers,kershaw
The checkbox is never actually displayed (I think) so we don't need any of this
code.

Differential Revision: https://phabricator.services.mozilla.com/D122502
2021-09-01 17:19:41 +00:00
Sandor Molnar 1a9baf6591 Backed out changeset 028b3aadad28 (bug 1718719) for causing bustages in build fuzzing. CLOSED TREE 2021-09-01 17:46:12 +03:00
Dragana Damjanovic 75908ae9b0 Bug 1718719 - Disable the TLS early-data if proxy is use r=necko-reviewers,keeler,kershaw
Currently we do not use the early-data when a proxy is used, but we do not disable it in the nss layer.

Differential Revision: https://phabricator.services.mozilla.com/D123492
2021-09-01 13:05:12 +00:00
ffxbld 06c451e911 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D123933
2021-08-30 13:12:48 +00:00
Emilio Cobos Álvarez cfca657d9c Bug 1722487 - Avoid some work for font list updates. r=jfkthame
Differential Revision: https://phabricator.services.mozilla.com/D123363
2021-08-26 23:17:54 +00:00
Jed Davis 3e1dc3d1eb Bug 1712506 - In the Linux CDM sandbox, don't log when denying access to certain files. r=gcp
The Widevine CDM tries to open certain procfs/sysfs files, as noted
in the bug, but doesn't appear to need them; some of them are opened
repeatedly, causing log spam.  This patch suppresses logging for the
files where this is known to happen, by adding "opened file" objects
that always silently fail.

It would also be possible to turn off all of this logging by default
and make it conditional on MOZ_SANDBOX_LOGGING, but it's relatively
low-noise (compared to content process file access) and provides some
value (see bug 1725828), so for now let's leave it enabled and just
blocklist a few files.

Differential Revision: https://phabricator.services.mozilla.com/D123562
2021-08-26 23:10:30 +00:00
Benjamin Beurdouche 9eb74dd71e Bug 1724869 - land NSS NSS_3_70_BETA1 UPGRADE_NSS_RELEASE, r=jschanck
```
2021-08-26  Benjamin Beurdouche  <bbeurdouche@mozilla.com>

	* lib/ssl/tls13con.c:
	Backed out changeset fae49696d374
	[e55700ee052e] [NSS_3_70_BETA1] <NSS_3_70_BRANCH>

	* tests/tlsfuzzer/config.json.in, tests/tlsfuzzer/tlsfuzzer.sh:
	Backed out changeset 7c3a0a99f7fa
	[e79531c04e6b] <NSS_3_70_BRANCH>

	* automation/abi-check/previous-nss-release, lib/nss/nss.h,
	lib/softoken/softkver.h, lib/util/nssutil.h:
	Set version numbers to 3.70 Beta
	[cc0d44da6a0e]

2021-08-26  John M. Schanck  <jschanck@mozilla.com>

	* tests/tlsfuzzer/config.json.in, tests/tlsfuzzer/tlsfuzzer.sh:
	Bug 1662515 - Enable tlsfuzzer/test-tls13-zero-content-type.py
	r=bbeurdouche,djackson

	[7c3a0a99f7fa]

2021-08-26  Benjamin Beurdouche  <bbeurdouche@mozilla.com>

	* lib/ssl/tls13con.c:
	Bug 1662515 - Fix incorrect alert after successful decryption
	r=djackson

	[fae49696d374]

2021-08-24  Robert Relyea  <rrelyea@redhat.com>

	* tests/cert/cert.sh, tests/common/init.sh, tests/sdr/sdr.sh:
	Bug 1726022 Update test case to verify fix.

	Updated test cases to verify pbe caching fix. NOTE: putting
	passwords on databases are key to reproducing the original issue.

	[ff19b674c468]

2021-08-24  John M. Schanck  <jschanck@mozilla.com>

	* gtests/ssl_gtest/tls_ech_unittest.cc:
	Bug 1714579 - Explicitly disable downgrade check in
	TlsConnectStreamTls13.EchOuterWith12Max r=nss-reviewers,bbeurdouche

	Depends on D123535

	[608fd450d499]

	* gtests/ssl_gtest/ssl_version_unittest.cc:
	Bug 1714579 - Explicitly disable downgrade check in
	TlsConnectTest.DisableFalseStartOnFallback r=nss-
	reviewers,bbeurdouche

	Depends on D122988

	[7bd94de62243]

2021-08-24  Benjamin Beurdouche  <bbeurdouche@mozilla.com>

	* lib/util/nssb64d.c:
	Formatting for lib/util
	[db95b15ce1ff]

2021-08-24  John M. Schanck  <jschanck@mozilla.com>

	* lib/util/nssb64d.c:
	Bug 1681975 - Avoid using a lookup table in nssb64d r=bbeurdouche

	[d454db6ad1fb]

2021-08-24  Benjamin Beurdouche  <bbeurdouche@mozilla.com>

	* lib/freebl/sha512.c:
	Bug 1724629 - Use HW accelerated SHA2 on AArch64 Big Endian.
	r=jschanck

	[7e31b8f7f741]

2021-08-24  John M. Schanck  <jschanck@mozilla.com>

	* lib/ssl/sslsock.c:
	Bug 1714579 Change default value of enableHelloDowngradeCheck to
	true r=mt

	Firefox sets enableHelloDowngradeCheck to true by default, as of
	[1576790](https://bugzilla.mozilla.org/show_bug.cgi?id=1576790). We
	have a two year old open issue noting some issues with that
	[1590870](https://bugzilla.mozilla.org/show_bug.cgi?id=1590870), but
	I see no reason not to update the default in NSS.

	[52137aa125f5]

2021-08-24  Benjamin Beurdouche  <bbeurdouche@mozilla.com>

	* gtests/pk11_gtest/pk11_hpke_unittest.cc:
	Formatting for gtests/pk11_gtest/pk11_hpke_unittest.cc r=jschanck

	The clang-format target was failing.
	https://treeherder.mozilla.org/logviewer?job_id=348100377&repo=nss-
	try

	[36bc1c231bf6]
```

Differential Revision: https://phabricator.services.mozilla.com/D123784
2021-08-26 17:45:23 +00:00
ffxbld 628d087420 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=jcristau
Differential Revision: https://phabricator.services.mozilla.com/D123745
2021-08-26 12:33:25 +00:00
Bob Owen 86f8ba4dc4 Bug 1652463: Add rule to allow socket process to create server side of our IPC pipes. r=handyman
Differential Revision: https://phabricator.services.mozilla.com/D83976
2021-08-25 11:43:46 +00:00
Andi-Bogdan Postelnicu 2fc4f70e9b Bug 1725145 - Preparation for the hybrid build env. r=necko-reviewers,firefox-build-system-reviewers,valentin,glandium
Automatically generated path that adds flag `REQUIRES_UNIFIED_BUILD = True` to `moz.build`
when the module governed by the build config file is not buildable outside on the unified environment.

This needs to be done in order to have a hybrid build system that adds the possibility of combing
unified build components with ones that are built outside of the unified eco system.

Differential Revision: https://phabricator.services.mozilla.com/D122345
2021-08-25 10:46:17 +00:00
Benjamin Beurdouche 9bdc7ccc5d Bug 1724869 - land NSS fe82761e35aa UPGRADE_NSS_RELEASE, r=djackson
```
2021-08-17  Robert Relyea  <rrelyea@redhat.com>

	* lib/softoken/lowpbe.c:
	Bug 1726022 Cache additional PBE entries

	Firefox password manager is slow to load (22s for 361 passwords on
	an i7), using 100% CPU and causing laptop fans to spin up

	Possible solution based on increasing the number of cache entries
	used by the PKCS5v2 values as the current code thrashes the cache as
	we use 2 pbe's per read operation.

	This patch is tested for correctness, but not fixing the issue. New
	test cases are needed.

	[fe82761e35aa] [tip]
```

Differential Revision: https://phabricator.services.mozilla.com/D123442
2021-08-24 13:19:13 +00:00
Dana Keeler 3b68845290 Bug 1724072 - allow enabling 3DES only when deprecated versions of TLS are enabled r=rmf
Chrome has removed 3DES completely[0], but we're still seeing some uses of it
in telemetry. Our assumption is that this is either due to old devices that
can't be upgraded, and hence probably use TLS 1.0, or servers that bafflingly
choose 3DES when there are other, better, ciphersuites in common.
This patch allows 3DES to only be enabled when deprecated versions of TLS are
enabled. This should protect users against the latter case (where 3DES is
unnecessary) while allowing them to use it in the former case (where it may be
necessary).

NB: The only 3DES ciphersuite gecko makes possible to enable is
TLS_RSA_WITH_3DES_EDE_CBC_SHA. This patch also changes the preference
corresponding to this ciphersuite from "security.ssl3.rsa_des_ede3_sha" to
"security.ssl3.deprecated.rsa_des_ede3_sha".

[0] https://www.chromestatus.com/feature/6678134168485888

Differential Revision: https://phabricator.services.mozilla.com/D121797
2021-08-24 01:25:07 +00:00