Граф коммитов

15756 Коммитов

Автор SHA1 Сообщение Дата
Dana Keeler 78b4f0d3f1 Bug 1689796 - asynchronously load crlite stashes r=mbirghan,bbeurdouche
Loading an accumulated set of crlite stashes can take some time. To address
this, this patch dispatches an asynchronous background task to read the
accumulated set of crlite stashes in a way that doesn't block certificate
verification. Of course, this means that the stash information won't
necessarily be available for the first few verifications. This shouldn't be a
security concern as long as the crlite filter is no more than 10 days out of
date (the maximum lifespan of an OCSP response, which is what Firefox relies on
currently in release). Note that currently crlite filters as published by
remote settings regularly end up being more than 10 days old, which will be
addressed in https://github.com/mozilla/crlite/issues/153. Note further that
crlite is currently not being enforced by default on any channel, so making
this change now is not a security concern.

Differential Revision: https://phabricator.services.mozilla.com/D104447
2021-02-11 22:35:26 +00:00
Mark Banner 263d555274 Bug 1608272 - Remove 'this' as the second argument to 'ChromeUtils.import', use object destructuring instead (test-only changes). r=Gijs
Differential Revision: https://phabricator.services.mozilla.com/D104683
2021-02-11 22:02:15 +00:00
ffxbld 2a5a3fe221 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=jcristau
Differential Revision: https://phabricator.services.mozilla.com/D104827
2021-02-11 16:31:23 +00:00
Moritz Birghan 84e35e0326 Bug 1678470 - convert the serialization version of TransportSecurityInfo to an integer. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D103887
2021-02-11 09:16:58 +00:00
Bogdan Tara 35e6e1afb1 Backed out changeset 3c7ae91a5486 (bug 1683761) for assertion failure at ExtendedValidation.cpp CLOSED TREE 2021-02-11 03:24:23 +02:00
Dana Keeler b9d992a73c Bug 1690331 - enable AES for importing PKCS12 files r=bbeurdouche
InitializeCipherSuite() in nsNSSComponent.cpp controls which encryption schemes
are allowed when decrypting PKCS12 files. Before this patch, the AES ciphers
were not enabled, which prevented importing PKCS12 files that used AES.
This patch fixes this and adds a test.

Differential Revision: https://phabricator.services.mozilla.com/D104567
2021-02-10 23:58:14 +00:00
Moritz Birghan cf8c48ef67 Bug 1683761 - Enable EV Treatment for AC RAIZ FNMT-RCM SERVIDORES SEGUROS root certificate. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D104701
2021-02-10 23:56:27 +00:00
Michael Goossens 0747b8564f Bug 1649590 - Convert XPIProvider.jsm to use IOUtils r=emalysz,mixedpuppy,barret,gcp
Differential Revision: https://phabricator.services.mozilla.com/D97354
2021-02-10 02:46:04 +00:00
ffxbld 2b98b4c743 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=jcristau
Differential Revision: https://phabricator.services.mozilla.com/D104396
2021-02-08 14:50:41 +00:00
smolnar 9a5a166751 Backed out changeset 5dc57770d113 (bug 1685883) for causing failures nsICertOverrideService. CLOSED TREE DONTBUILD 2021-02-07 02:29:09 +02:00
Horst efff090e64 Bug 1685883 - building with --disable-marionette fails with compile error r=keeler
building firefox 84.0.2 from source (https://archive.mozilla.org/pub/firefox/releases/84.0.2/source/) fails when using `ac_add_options --disable-marionette` because of missing header

Differential Revision: https://phabricator.services.mozilla.com/D101390
2021-02-06 21:45:08 +00:00
Benjamin Beurdouche d901b16ba2 Bug 1688685 - land NSS fc3a4c142c16 UPGRADE_NSS_RELEASE, r=kjacobs
2021-02-04  Kevin Jacobs  <kjacobs@mozilla.com>

	* gtests/ssl_gtest/ssl_recordsize_unittest.cc, lib/ssl/ssl3ext.c:
	Bug 1690583 - Fix CH padding extension size calculation. r=mt

	Bug 1654332 changed the way that NSS constructs Client Hello
	messages. `ssl_CalculatePaddingExtLen` now receives a
	`clientHelloLength` value that includes the 4B handshake header.
	This looks okay per the inline comment (which states that only the
	record header is omitted from the length), but the function actually
	assumes that the handshake header is also omitted.

	This patch removes the addition of the handshake header length.
	Those bytes are already included in the buffered CH.

	[fc3a4c142c16] [tip]

	* automation/abi-check/expected-report-libnss3.so.txt:
	Bug 1690421 - Adjust 3.62 ABI report formatting for new libabigail.
	r=bbeurdouche

	[a1ed44dba32e]

2021-02-03  Kevin Jacobs  <kjacobs@mozilla.com>

	* automation/taskcluster/docker-builds/Dockerfile:
	Bug 1690421 - Install packaged libabigail in docker-builds image
	r=bbeurdouche

	[3c719b620136]

2021-01-31  Kevin Jacobs  <kjacobs@mozilla.com>

	* cmd/selfserv/selfserv.c, cmd/tstclnt/tstclnt.c,
	lib/ssl/tls13hashstate.c, lib/ssl/tls13hashstate.h:
	Bug 1689228 - Minor ECH -09 fixes for interop testing, fuzzing. r=mt

	A few minor ECH -09 fixes for interop testing and fuzzing:
	- selfserv now takes a PKCS8 keypair for ECH. This is more
	maintainable and significantly less terrible than parsing the
	ECHConfigs and cobbling one together within selfserv (e.g. we can
	support other KEMs without modifying the server).
	- Get rid of the newline character in tstclnt retry_configs output.
	- Fuzzer fixes in tls13_HandleHrrCookie:
	 - We shouldn't use internal_error when PK11_HPKE_ImportContext fails.
	Cookies are unprotected in fuzzer mode, so this can be expected to
	occur.
	 - Only restore the application token when recovering hash state,
	otherwise the copy could happen twice, leaking one of the
	allocations.

	[8bbea1902024]

2021-01-25  Kevin Jacobs  <kjacobs@mozilla.com>

	* lib/ssl/ssl3exthandle.c:
	Bug 1674819 - Fixup a51fae403328, enum type may be signed.
	r=bbeurdouche

	[2004338a2080]

Differential Revision: https://phabricator.services.mozilla.com/D104258
2021-02-05 21:13:47 +00:00
Csoregi Natalia cc417af149 Backed out changeset ee49da8ea890 (bug 1649590) for failures on browser_content_sandbox_fs.js. CLOSED TREE 2021-02-05 04:21:45 +02:00
Michael Goossens 1fa798a7eb Bug 1649590 - Convert XPIProvider.jsm to use IOUtils r=emalysz,mixedpuppy,barret,gcp
Differential Revision: https://phabricator.services.mozilla.com/D97354
2021-02-04 23:08:01 +00:00
Dana Keeler aa773f5c8c Bug 1689729 - use NSS only on the socket thread in NSSCertDBTrustDomain::GetCertTrust and FindIssuer r=rmf,dragana
See bug 1689728. To avoid contention on NSS resources and thread-safety issues,
this patch dispatches synchronous events to the socket thread in
NSSCertDBTrustDomain::GetCertTrust and FindIssuer to gather information from
NSS rather than using NSS directly on the cert verification threads.

Differential Revision: https://phabricator.services.mozilla.com/D103514
2021-02-04 16:59:48 +00:00
ffxbld 4c04216f60 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=jcristau
Differential Revision: https://phabricator.services.mozilla.com/D104064
2021-02-04 14:55:37 +00:00
Dana Keeler a298d5ed49 Bug 1689698 - improve performance of DER.jsm r=mbirghan
This patch improves the performance of DER.jsm by changing readBytes to use
slice rather than repeatedly calling readByte.
Additionally, this patch removes the validation that the input to DERDecoder
consists of an array of integers in the range [0, 255]. This check is
unnecessary for all current consumers of DER.jsm because the input comes from
atob, which only outputs values in that range. If other consumers use DER.jsm
in the future, they will have to determine whether or not they need to validate
the input themselves first.

Differential Revision: https://phabricator.services.mozilla.com/D103838
2021-02-03 22:33:00 +00:00
Moritz Birghan 1ce3e1a549 Bug 1688922 - Remove IsCertificateDistrustImminent UI. r=johannh
Differential Revision: https://phabricator.services.mozilla.com/D103059
2021-02-03 08:50:20 +00:00
ffxbld be3d1194cd No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=jcristau
Differential Revision: https://phabricator.services.mozilla.com/D103667
2021-02-01 14:47:08 +00:00
Bob Owen 4967e1cddf Bug 1689398 p2: Add prefs to allow CET Strict Mode to be turned on for each sandboxed child process. r=handyman
Differential Revision: https://phabricator.services.mozilla.com/D103474
2021-01-31 16:47:11 +00:00
Bob Owen cc73dd0338 Bug 1689398 p1: Add MITIGATION_CET_STRICT_MODE to chromium sandbox code. r=handyman
The patch for the chromium changes doesn't include the updates to
windows_version, because these are already in the release version of chromium
and so will be picked up when we next update.

Differential Revision: https://phabricator.services.mozilla.com/D103473
2021-01-31 16:46:48 +00:00
Xidorn Quan 1479c9d9e2 Bug 1687056 - Upgrade rkv to 0.17 and remove failure from rkv's dependent crates. r=vporof
Differential Revision: https://phabricator.services.mozilla.com/D102052
2021-01-29 12:58:00 +00:00
ffxbld 60fb840032 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D103352
2021-01-28 18:16:14 +00:00
Benjamin Beurdouche 13d4b68816 Bug 1687701 - Remove IsCertificateDistrustImminent. r=keeler,necko-reviewers,dragana
Differential Revision: https://phabricator.services.mozilla.com/D102416
2021-01-27 18:05:24 +00:00
Dorel Luca 155fbede67 Backed out changeset 831388d8f118 (bug 1687701) for Build bustages. CLOSED TREE 2021-01-27 19:08:38 +02:00
Benjamin Beurdouche 207e18f326 Bug 1687701 - Remove IsCertificateDistrustImminent. r=keeler,necko-reviewers,dragana
Differential Revision: https://phabricator.services.mozilla.com/D102416
2021-01-27 16:38:37 +00:00
Dana Keeler cf49738fe6 Bug 1688924 - fix sign_app.py and regenerate test_signed_app.js files r=mbirghan
When we moved to python3, sign_app.py had some issues that weren't addressed.
This patch addresses those issues and regenerates the input files for
test_signed_apps.js because the issuing certificates will expire soon.

Differential Revision: https://phabricator.services.mozilla.com/D103063
2021-01-26 20:45:08 +00:00
Kershaw Chang 119a94bbef Bug 1684040 - P3: Encrypt and decrypt DNS packet r=necko-reviewers,kjacobs,valentin
Differential Revision: https://phabricator.services.mozilla.com/D101684
2021-01-26 17:44:45 +00:00
Kevin Jacobs 0fd6f4034d Bug 1688317 - Update PSM test ECHConfigs for draft -09 r=necko-reviewers,valentin
Changes hardcoded ECHConfigs version from -08 to -09.

Differential Revision: https://phabricator.services.mozilla.com/D102810
2021-01-26 15:41:14 +00:00
Kevin Jacobs f9716bc8ab Bug 1688685 - land NSS 92dcda94c1d4 UPGRADE_NSS_RELEASE, r=bbeurdouche
2021-01-22  Kevin Jacobs  <kjacobs@mozilla.com>

	* automation/abi-check/previous-nss-release, lib/nss/nss.h,
	lib/softoken/softkver.h, lib/util/nssutil.h:
	Set version numbers to 3.62 Beta
	[680ec01577b9]

2021-01-23  Kevin Jacobs  <kjacobs@mozilla.com>

	* tests/chains/scenarios/nameconstraints.cfg,
	tests/libpkix/certs/NameConstraints.ipaca.cert,
	tests/libpkix/certs/NameConstraints.ocsp1.cert:
	Bug 1686134 - Renew two chains libpkix test certificates. r=rrelyea

	[3ddcd845704c]

2021-01-25  Kevin Jacobs  <kjacobs@mozilla.com>

	* gtests/common/testvectors/hpke-vectors.h,
	gtests/pk11_gtest/pk11_hpke_unittest.cc, lib/pk11wrap/pk11hpke.c,
	lib/pk11wrap/pk11hpke.h, lib/pk11wrap/pk11pub.h:
	Bug 1678398 - Update HPKE to draft-07. r=mt

	This patch updates HPKE to draft-07. A few other minor changes are
	included:
	- Refactor HPKE gtests for increased parameterized testing.
	- Replace memcpy calls with PORT_Memcpy
	- Serialization tweaks to make way for context Export/Import (D99277).

	This should not be landed without an ECH update, as fixed ECH test
	vectors will otherwise fail to decrypt.

	[e0bf8cadadc7]

	* automation/abi-check/expected-report-libnss3.so.txt,
	gtests/pk11_gtest/pk11_hpke_unittest.cc, lib/nss/nss.def,
	lib/pk11wrap/pk11hpke.c, lib/pk11wrap/pk11pub.h:
	Bug 1678398 - Add Export/Import functions for HPKE context. r=mt

	This patch adds and exports two new HPKE functions:
	`PK11_HPKE_ExportContext` and `PK11_HPKE_ImportContext`, which are
	used to export a serialized HPKE context, then later reimport that
	context and resume Open and Export operations. Only receiver
	contexts are currently supported for export (see the rationale in
	pk11pub.h).

	One other change introduced here is that `PK11_HPKE_GetEncapPubKey`
	now works as expected on the receiver side.

	If the `wrapKey` argument is provided to the Export/Import
	functions, then the symmetric keys are wrapped with AES Key Wrap
	with Padding (SP800-38F, 6.3) prior to serialization.

	[8bcd12ab3b34]

	* automation/abi-check/expected-report-libssl3.so.txt,
	gtests/ssl_gtest/libssl_internals.c,
	gtests/ssl_gtest/libssl_internals.h,
	gtests/ssl_gtest/ssl_extension_unittest.cc,
	gtests/ssl_gtest/tls_ech_unittest.cc, lib/ssl/ssl3con.c,
	lib/ssl/ssl3ext.c, lib/ssl/ssl3ext.h, lib/ssl/sslexp.h,
	lib/ssl/sslimpl.h, lib/ssl/sslsecur.c, lib/ssl/sslsock.c,
	lib/ssl/sslt.h, lib/ssl/tls13con.c, lib/ssl/tls13con.h,
	lib/ssl/tls13ech.c, lib/ssl/tls13ech.h, lib/ssl/tls13exthandle.c,
	lib/ssl/tls13exthandle.h, lib/ssl/tls13hashstate.c,
	lib/ssl/tls13hashstate.h:
	Bug 1681585 - Update ECH to Draft-09. r=mt

	This patch updates ECH implementation to draft-09. Changes of note
	are:

	- Acceptance signal derivation is now based on the handshake secret.
	- `config_id` hint changes from 32B to 8B, trial decryption added on
	the server.
	- Duplicate code in HRR cookie handling has been consolidated into
	`tls13_HandleHrrCookie`.
	- `ech_is_inner` extension is added, which causes a server to indicate
	ECH acceptance.
	- Per the above, support signaling ECH acceptance when acting as a
	backend server in split-mode (i.e. when there is no other local
	Encrypted Client Hello state).

	[ed07a2e2a124]

2021-01-24  Kevin Jacobs  <kjacobs@mozilla.com>

	* cmd/selfserv/selfserv.c:
	Bug 1681585 - Add ECH support to selfserv. r=mt

	Usage example: mkdir dbdir && cd dbdir certutil -N -d . certutil -S
	-s "CN=ech-public.com" -n ech-public.com -x -t "C,C,C" -m 1234 -d .
	certutil -S -s "CN=ech-private-backend.com" -n ech-private-
	backend.com -x -t "C,C,C" -m 2345 -d . ../dist/Debug/bin/selfserv -a
	ech-public.com -a ech-private-backend.com -n ech-public.com -n ech-
	private-backend.com -p 8443 -d dbdir/ -X publicname:ech-public.com
	(Copy echconfig from selfserv output and paste into the below
	command) ../dist/Debug/bin/tstclnt -D -p 8443 -v -A
	tests/ssl/sslreq.dat -h ech-private-backend.com -o -N <echconfig> -v

	[92dcda94c1d4]

Differential Revision: https://phabricator.services.mozilla.com/D102982
2021-01-26 15:30:01 +00:00
Mihai Alexandru Michis 51b7d9634a Backed out 3 changesets (bug 1684040) for causing bustages in DNSPacket.cpp
CLOSED TREE

Backed out changeset 3c771d45563a (bug 1684040)
Backed out changeset 76e79151d53c (bug 1684040)
Backed out changeset 7a993eb7bfde (bug 1684040)
2021-01-26 16:15:12 +02:00
Kershaw Chang 33da037c55 Bug 1684040 - P3: Encrypt and decrypt DNS packet r=necko-reviewers,kjacobs,valentin
Differential Revision: https://phabricator.services.mozilla.com/D101684
2021-01-26 12:43:03 +00:00
ffxbld 86ef761b94 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D102914
2021-01-25 14:47:36 +00:00
Kevin Jacobs 9ff5a5feb0 Bug 1684061 - land NSS NSS_3_61_RTM UPGRADE_NSS_RELEASE, r=bbeurdouche
2021-01-22  Kevin Jacobs  <kjacobs@mozilla.com>

	* lib/nss/nss.h, lib/softoken/softkver.h, lib/util/nssutil.h:
	Set version numbers to 3.61 final
	[b09bdf93e079] [NSS_3_61_RTM] <NSS_3_61_BRANCH>

2021-01-19  Kevin Jacobs  <kjacobs@mozilla.com>

	* .hgtags:
	Added tag NSS_3_61_BETA1 for changeset 68ae9b456b1b
	[3c88f7111594]

Differential Revision: https://phabricator.services.mozilla.com/D102781
2021-01-22 17:36:32 +00:00
ffxbld 67f0360f38 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=jcristau
Differential Revision: https://phabricator.services.mozilla.com/D102602
2021-01-21 15:43:18 +00:00
Dana Keeler 5b70006bba Bug 1686833 - avoid CERTCertificate in nsNSSCertificate::GetDbKey r=bbeurdouche
This patch changes nsNSSCertificate::GetDbKey to use mozilla::pkix::BackCert
instead of requiring a decoded CERTCertificate.

Differential Revision: https://phabricator.services.mozilla.com/D101836
2021-01-20 19:26:20 +00:00
Kevin Jacobs 7a93d152d6 Bug 1684061 - land NSS NSS_3_61_BETA1 UPGRADE_NSS_RELEASE, r=bbeurdouche
2021-01-13  Kevin Jacobs  <kjacobs@mozilla.com>

	* automation/taskcluster/graph/src/try_syntax.js:
	Bug 1686557 - Support aarch64-make target in nss-try. r=bbeurdouche

	[68ae9b456b1b] [NSS_3_61_BETA1]

Differential Revision: https://phabricator.services.mozilla.com/D102421
2021-01-20 17:17:56 +00:00
Butkovits Atila 04e8f8d535 Backed out changeset e20e32462008 (bug 1678384) for causing build bustages complaining about generate_certdata-testlib. CLOSED TREE 2021-01-20 18:51:35 +02:00
Benjamin Beurdouche 3073a91c90 Bug 1678384 - Changes to security/moz.build to allow building nssckbi-testlib in m-c. r=kjacobs
Differential Revision: https://phabricator.services.mozilla.com/D97630
2021-01-20 15:24:43 +00:00
Moritz Birghan 48257a0b1c Bug 1672120 - Access of TransportSecurityInfo fields should hold mutex r=keeler,necko-reviewers,valentin
Differential Revision: https://phabricator.services.mozilla.com/D97632
2021-01-19 20:57:16 +00:00
Sebastian Hengst dd7521e748 Bug 1687458 - document actions needed when canary certificate expiration check test_cert_expiration_canary.js fails. r=keeler DONTBUILD
Differential Revision: https://phabricator.services.mozilla.com/D102294
2021-01-19 22:13:59 +00:00
Geoff Lankow 610cbaea58 Bug 1667294 - Skip parts of SandboxBroker::LaunchApp when launching a Thunderbird process. r=tkikuchi
Thunderbird does not yet have the same blocklist initialization as Firefox, so we skip calling InitDllBlocklistOOP to avoid a MOZ_RELEASE_ASSERT.

Differential Revision: https://phabricator.services.mozilla.com/D99173
2021-01-19 22:33:02 +00:00
Dana Keeler b20d3edb85 Bug 1682989 - remove CertBlocklist implementation and MOZ_NEW_CERT_STORAGE build variable r=rmf
Differential Revision: https://phabricator.services.mozilla.com/D100034
2021-01-19 22:11:25 +00:00
Dana Keeler 3e98e56e75 Bug 1686779 - remove isSelfSigned from nsIX509Cert r=rmf
Before this patch, nsIX509Cert.isSelfSigned was only used by LocalCertService
to verify that the certificate it uses is self-signed. This shouldn't have been
necessary, because the certificate isn't a trust anchor and an override has to
be added for it anyway. Additionally, the certificate in question is already
guaranteed to be self-signed because it was either just generated that way or
it was retrieved from the database (the code for which checks that it's
self-signed).

Differential Revision: https://phabricator.services.mozilla.com/D101810
2021-01-19 17:01:57 +00:00
ffxbld beab1a7d51 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=jcristau
Differential Revision: https://phabricator.services.mozilla.com/D102198
2021-01-18 14:44:53 +00:00
Sebastian Hengst e8f8962b8c Bug 1686615 - update hardcode certificate data in test browser_certificateManager.js after certificate got updated. a=test-failure CLOSED TREE 2021-01-14 21:49:32 +01:00
Dana Keeler 103f64a076 Bug 1685552 - move certificate subject alternative name processing for error pages from backend to frontend r=bbeurdouche,johannh,baku
This removes nsIX509Cert.subjectAltNames and reduces potential attack surface
by avoiding parsing subject alternative names in C/C++. It also reduces PSM
reliance on NSS types.

Differential Revision: https://phabricator.services.mozilla.com/D101418
2021-01-14 09:58:03 +00:00
Aki Sasaki 66d1eb342b Bug 1686615 - regenerate all .pem.certspec files into their .pems r=kjacobs
per https://bugzilla.mozilla.org/show_bug.cgi?id=1525191#c6 .

Depends on D101697

Differential Revision: https://phabricator.services.mozilla.com/D101698
2021-01-14 17:34:54 +00:00
Sebastian Hengst 88f92fccf4 Bug 1686615 - reenable certificate expiration canary check. r=kjacobs
Differential Revision: https://phabricator.services.mozilla.com/D101724
2021-01-14 17:48:18 +00:00
Kevin Jacobs 4d02d441fc Bug 1684061 - land NSS a8de35c990e3 UPGRADE_NSS_RELEASE, r=bbeurdouche
2021-01-13  Kevin Jacobs  <kjacobs@mozilla.com>

	* gtests/softoken_gtest/manifest.mn:
	Bug 1684300 - Define USE_STATIC_LIBS=1 for softoken_gtest make
	builds. r=bbeurdouche

	[a8de35c990e3] [tip]

	* gtests/softoken_gtest/manifest.mn,
	gtests/softoken_gtest/softoken_gtest.cc,
	gtests/softoken_gtest/softoken_gtest.gyp, lib/softoken/sftkdb.c,
	tests/gtests/gtests.sh:
	Bug 1684300 - Disable legacy storage when compiled with
	NSS_DISABLE_DBM. r=mt

	[d4991bb56852]

Differential Revision: https://phabricator.services.mozilla.com/D101703
2021-01-14 15:16:11 +00:00