Граф коммитов

13469 Коммитов

Автор SHA1 Сообщение Дата
Tom Ritter 9800e813cf Bug 1462100 Add the 'cast to void*' MinGW sandbox patch to the chromium patchlist r=bobowen
MozReview-Commit-ID: 457xxFsnjTL

--HG--
extra : rebase_source : c1cb170c13cc408a4c1562e5bfd001bb9597a54c
2018-05-17 10:10:50 -05:00
Tom Ritter e8c4e33bea Bug 1462100 Cast to void* to avoid conversion errors on MinGW, which does not do the automatic conversion like msvc r=bobowen
MozReview-Commit-ID: 8fO9Nu9gaxh

--HG--
extra : rebase_source : 896c58b8050304c6a47dcbd9f7744923a721fa69
2018-05-16 14:18:20 -05:00
David Keeler d8f748b996 bug 401240 - part 2/2 - reimplement PKCS#12 import/export without goto r=fkiefer
MozReview-Commit-ID: JUMmTPrEYND

--HG--
rename : security/manager/ssl/tests/unit/test_certDB_import_with_master_password.js => security/manager/ssl/tests/unit/test_certDB_export_pkcs12.js
rename : security/manager/ssl/tests/unit/test_certDB_import_with_master_password.js => security/manager/ssl/tests/unit/test_certDB_export_pkcs12_with_master_password.js
extra : rebase_source : 3bf01e722f496b4dba634ed5d0345ce1fe0ceea7
2018-05-11 11:37:50 -07:00
David Keeler 18117a994a bug 401240 - part 1/2 - run ./mach clang-format on nsPKCS12Blob r=fkiefer
MozReview-Commit-ID: 81m6dxhg8Pv

--HG--
extra : rebase_source : c9d3bed637e163cc6347f6626067aaf9b773db8c
2018-05-11 11:09:00 -07:00
Tom Ritter af3c5e06a6 Bug 1460882 Disable SANDBOX_EXPORTS for the MinGW Build r=bobowen
MozReview-Commit-ID: 2muTxIYUx6F

--HG--
extra : rebase_source : c61e7de55319fd5eb156dd3c46ed4a8efe6dc42b
2018-05-11 08:16:13 -05:00
Haik Aftandilian 5e0cbf519a Bug 1460917 - Fonts not displaying with FontExplorer X fonts in Firefox 60 r=handyman
Add back font whitelist rules removed by the fix for bug 1393259
to workaround font sandbox extensions not being issued automatically
on OS X 10.11 and earlier.

MozReview-Commit-ID: 2hT0BzN3Ggq

--HG--
extra : rebase_source : 4fe9ce43eb7efe0c6a91c908c149126da6eb708e
2018-05-14 16:04:55 -07:00
J.C. Jones 0843035f6b Bug 1460617 - land NSS 6e4b0141df2f UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : c82ceabece6bd1c9b0d079a0a69eedeba4214c5e
2018-05-14 14:47:52 -07:00
Nika Layzell 2d188849ae Bug 1455217 - Part 3: Use the new xpidl Promise type instead of nsISupports, r=bz 2018-05-14 17:55:54 -04:00
J.C. Jones db950df22f Bug 1461373 - Set BRNameMatchingPolicy to "Enforce" for Nightly r=keeler
Summary:
Change the security.pki.name_matching_mode pref to 3 for Enforce on Nightly.

BR_9_2_1_SUBJECT_ALT_NAMES show that ~99.98% of encountered certificates have
an acceptable SAN, so our compatibility risk is about 0.02%.

BR_9_2_2_SUBJECT_COMMON_NAME also shows, 99.89% of certificate common names are
present in a subject alternative name extension, giving a worst-case of 0.11%
risk, though BR_9_2_1_SUBJECT_ALT_NAMES is more what we're affecting here.

Test Plan: none

Reviewers: keeler

Tags: #secure-revision

Bug #: 1461373

Differential Revision: https://phabricator.services.mozilla.com/D1277

--HG--
extra : transplant_source : %BF%7D%DEi%C7%9BhE%D0%C2d%9D0%AC%F8%9EM%E0%60U
2018-05-14 09:55:15 -07:00
Kris Maglione 250e7028e3 Bug 1385057: Remove most code for handling unpacked side-loaded extensions. r=aswan,keeler
MozReview-Commit-ID: H4cSRBws4Ml

--HG--
extra : rebase_source : ddddef92344b6414ae4e5635b9841fcc274dfca9
2018-05-09 16:04:04 -07:00
Margareta Eliza Balazs 4f9a2ba08e Merge inbound to mozilla-central. a=merge 2018-05-11 12:36:02 +03:00
J.C. Jones 08d83d7258 Bug 1441914 - Fix Windows build on a CLOSED TREE r=me
Don't use MOZ_MAKE_ENUM_CLASS_BITWISE_OPERATORS; it's unneeded here right now,
and occludes "PSM::Result" on Windows.

--HG--
extra : transplant_source : %B9%24%7FR%A8%1B%B0%3B%D44%ED%C5%3F%CD%1E%96%1F%22m%A3
2018-05-10 17:15:22 -07:00
J.C. Jones 4139925b80 Bug 1441914 - Make security.pki.distrust_ca_policy a bitmask r=fkiefer r=keeler
Per Bug 1437754 comment 10, the pref security.pki.distrust_ca_policy makes more
sense as a bitmask than a state. To permit future nuance, let's go ahead and do
that before people start implementing atop Bug 1456112.

This does permit both 0b10 and 0b11 to enable the functionality for Firefox 63.

--HG--
extra : transplant_source : %84%AF%89%E0%89dT%01%10%84%A0%3B%A5%28%2A%D3%E1%B0%0D%E7
2018-05-07 15:46:22 -07:00
David Keeler 6499399d3c bug 1427248 - avoid changing certificate trust in nsNSSComponent initialization r=fkiefer,jcj
If a user has set a master password on their NSS DB(s), when we try to change
the trust of a certificate, we may have to authenticate to the DB. This involves
bringing up a dialog box, executing javascript, spinning the event loop, etc.
In some cases (particularly when antivirus software has injected code into
Firefox), this can cause the nsNSSComponent to be initialized if it hasn't
already been. So, it's a really, really bad idea to attempt to change the trust
of a certificate while we're initializing nsNSSComponent, because this results
in a recursive component dependency and everything breaks. To get around this,
if we need to load 3rd party roots (e.g. enterprise roots or the family safety
root), we defer any trust changes to a later event loop tick. In theory this
could cause verification failures early in startup. We'll have to see if this
is an issue in practice.

MozReview-Commit-ID: FvjHP5dTmpP

--HG--
extra : rebase_source : 73d39788ce39adcbe01c89867061f64d05a3876b
2018-05-07 17:05:30 -07:00
Coroiu Cristina 683720f5ee Backed out changeset 0693ec09dd68 (bug 1427248) for bustage at build/src/security/manager/ssl/nsNSSComponent.cpp on a CLOSED TREE 2018-05-10 23:32:46 +03:00
David Keeler 65635d2855 bug 1427248 - avoid changing certificate trust in nsNSSComponent initialization r=fkiefer,jcj
If a user has set a master password on their NSS DB(s), when we try to change
the trust of a certificate, we may have to authenticate to the DB. This involves
bringing up a dialog box, executing javascript, spinning the event loop, etc.
In some cases (particularly when antivirus software has injected code into
Firefox), this can cause the nsNSSComponent to be initialized if it hasn't
already been. So, it's a really, really bad idea to attempt to change the trust
of a certificate while we're initializing nsNSSComponent, because this results
in a recursive component dependency and everything breaks. To get around this,
if we need to load 3rd party roots (e.g. enterprise roots or the family safety
root), we defer any trust changes to a later event loop tick. In theory this
could cause verification failures early in startup. We'll have to see if this
is an issue in practice.

MozReview-Commit-ID: FvjHP5dTmpP

--HG--
extra : rebase_source : ad0fb83a0de3632e3a967e91aec3d8070b22dedc
2018-05-07 17:05:30 -07:00
ffxbld 7c7bbfe6e0 No bug, Automated HSTS preload list update from task XSqPd8faStCdsylVmzvQ6w
Summary:
No bug, Automated HPKP preload list update from task XSqPd8faStCdsylVmzvQ6w

No bug, Automated blocklist update from task XSqPd8faStCdsylVmzvQ6w

Reviewers: sfraser, aki

Reviewed By: sfraser

Differential Revision: https://phabricator.services.mozilla.com/D1256

--HG--
extra : rebase_source : 855e19990c75e2613bd311976297fb6513e02b94
2018-05-10 12:14:28 +01:00
Csoregi Natalia f034c0ab5d Merge mozilla-central to inbound. a=merge CLOSED TREE 2018-05-10 12:52:31 +03:00
David Keeler 3b971d708e bug 1460312 - cancel the timeout timer in OCSP request implementation r=jcj
Bug 1456489 cleaned up our OCSP request implementation a bit. One simplification
it made was to not cancel the timeout timer. It turns out that if we don't, the
OCSPRequest that constitutes the timeout callback's closure might not be valid
if the request has completed (because the timer doesn't own a strong reference
to it). The fix is simple: cancel the timer when the request completes. Note
that we don't have to do the reverse because necko has a strong reference to the
request.

MozReview-Commit-ID: 2WHFLAcGBAw

--HG--
extra : rebase_source : c4216f6792c1d62cbd046b1b3802226c51fbe8af
2018-05-09 10:06:49 -07:00
David Keeler e218ab3e3b bug 1460350 - re-land bug 1415991 (remove support for verifying signed unpacked add-ons) r=kmag
(Backed out changeset 6bbf8dc0b86e (which was a backout of changeset 0a5795108e0a))

MozReview-Commit-ID: EZFn7dLBcdh

--HG--
extra : rebase_source : 8fac1e33a7f108a248ecde35779b2c63ce7d9172
2018-05-09 10:19:37 -07:00
Kris Maglione 01c298aca6 Bug 1460092: Add ESLint rule to enforce use of ChromeUtils.generateQI. r=Gijs
Also fixes existing code which fails the rule.

MozReview-Commit-ID: CkLFgsspGMU

--HG--
extra : rebase_source : 86a43837659aa2ad83a87eab53b7aa8d39ccf55b
2018-05-08 18:36:22 -07:00
David Keeler 6ea4fb08d4 bug 1456489 - prevent making OCSP requests on the main thread r=fkiefer,jcj
OCSP requests cannot be performed on the main thread. If we were to wait for a
response from the network, we would be blocking the main thread for an
unnaceptably long time. If we were to spin the event loop while waiting (which
is what we do currently), other parts of the code that assume this will never
happen (which is essentially all of them) can break.

As of bug 867473, no certificate verification happens on the main thread, so no
OCSP requests happen on the main thread. Given this, we can go ahead and
prohibit such requests.

Incidentally, this gives us an opportunity to improve the current OCSP
implementation, which has a few drawbacks (the largest of which is that it's
unclear that its ownership model is implemented correctly).

This also removes OCSP GET support. Due to recent OCSP server implementations
(namely, the ability to cache OCSP POST request responses), OCSP GET is not a
compelling technology to pursue. Furthermore, continued support presents a
maintenance burden.

MozReview-Commit-ID: 4ACDY09nCBA

--HG--
extra : rebase_source : 072564adf1836720e147b8250afca7cebe4dbf62
2018-04-23 18:09:35 +02:00
David Keeler 6da3ace3da bug 686149 - improve PKCS7 certificate export to not use legacy path building r=fkiefer
MozReview-Commit-ID: 2U4J8uUlvaN

--HG--
extra : rebase_source : c416a552e31a6ef38a5d394374e212f00210b334
2018-05-02 10:22:58 -07:00
arthur.iakab f2042a4c1f Merge inbound to mozilla-central a=merge 2018-05-08 15:42:06 +03:00
J.C. Jones 8d99d56270 Bug 1456112 - Add a pref to implement the last Symantec Distrust step r=keeler
This adds another preference (DistrustSymantecRootsRegardlessOfDate == 2) that
stops permitting certificates issued after 1 June 2016, and updates the test to
check it.

--HG--
extra : transplant_source : %F1%DE%16m%F2%DD%A8Ei%EF%B4%CAo%BF%8D%A6%A6%5E%D4%89
2018-05-04 09:34:45 -07:00
J.C. Jones 0fe289986b Bug 1445731 - land NSS NSS_3_37_RTM UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : 0c5dbfbfab874158345a4fe2237dc898655f0052
2018-05-04 10:42:48 -07:00
David Keeler 999c7366ef bug 1346297 - remove expired family safety telemetry probe r=jcj
MozReview-Commit-ID: BCc5Fa9jWJ2

--HG--
extra : rebase_source : fa965818e96fae6f2c23d33c9bcf6cb224b7935b
extra : amend_source : a1c08417b0a5f3b8de4c5b2025c559111e6597c2
2018-05-03 12:44:14 -07:00
Ciure Andrei 82f7c496dc Merge inbound to mozilla-central. a=merge 2018-05-04 00:52:04 +03:00
ffxbld ab372e51b4 No bug, Automated HSTS preload list update from task AUKIqPPXTDSaxMvWC7BXWg
Summary: No bug, Automated HPKP preload list update from task AUKIqPPXTDSaxMvWC7BXWg

Reviewers: sfraser

Reviewed By: sfraser

Differential Revision: https://phabricator.services.mozilla.com/D1117

--HG--
extra : rebase_source : d68fc2b597321f42c66b798db4f8f9cf0b209a73
2018-05-03 12:44:37 +01:00
David Keeler 066f38fa62 bug 1458074 - un-do the firefox-appdir addition in PSM's xpcshell.ini r=kmag
Bug 1372694 added a firefox-appdir line to PSM's xpcshell.ini. It turns out this
breaks running these tests locally because utilities like BadCertServer can't be
found. I looks like the change isn't necessary, so the simplest thing to do
would be to just remove the addition.

MozReview-Commit-ID: 8fg8ujPWxRe

--HG--
extra : rebase_source : ffef9b067dacb94c4bd554f97556ab95f58efd2b
2018-04-30 15:21:41 -07:00
ffxbld b9d16384c0 No bug, Automated HSTS preload list update from task QWd7FyT5RE-MJF4dSdL4TQ
Summary: No bug, Automated HPKP preload list update from task QWd7FyT5RE-MJF4dSdL4TQ

Reviewers: sfraser

Reviewed By: sfraser

Differential Revision: https://phabricator.services.mozilla.com/D1063

--HG--
extra : rebase_source : 7d37ffc7fcbca533ae8cf1b532671b78407ac8cd
2018-04-30 12:45:23 +01:00
Kris Maglione a259026c9d Bug 1456035: Part 4 - Convert callers of XPCOMUtils.generateQI to ChromeUtils.generateQI. r=mccr8
This also removes any redundant Ci.nsISupports elements in the interface
lists.

This was done using the following script:

acecb401b7/processors/chromeutils-generateQI.jsm

MozReview-Commit-ID: AIx10P8GpZY

--HG--
extra : rebase_source : a29c07530586dc18ba040f19215475ac20fcfb3b
2018-04-22 20:55:06 -07:00
Haik Aftandilian 7fb2183e0a Bug 1458553 - Return of Google Maps all black map with updated Nvidia web driver on Mac r=Alex_Gaynor
Update Mac sandbox rules to allow executable mappings from /Library/GPUBundles which is
used by the Nvidia downloadable "Web" driver.

MozReview-Commit-ID: L2nTP4YWdJJ

--HG--
extra : rebase_source : d8eefdd5a180db5d3ea8207d923e021420f2318e
2018-05-02 09:26:55 -07:00
ffxbld 1a695c2e33 No bug, Automated HSTS preload list update from task GjhOFReSQGqVESpdTdZ3FA
Summary: No bug, Automated HPKP preload list update from task GjhOFReSQGqVESpdTdZ3FA

Reviewers: sfraser

Reviewed By: sfraser

Tags: #secure-revision

Differential Revision: https://phabricator.services.mozilla.com/D1045

--HG--
extra : rebase_source : 53c75df4ac650d24bb7f4da8e7d3eab675dcac3b
2018-04-26 16:19:47 +01:00
J.C. Jones 61f85fbe96 Bug 1445731 - land NSS NSS_3_37_BETA2 UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : b68bb60ebd5ac7037d71c8db6acec29802220a5c
2018-04-26 15:32:24 +02:00
Brindusan Cristian 59f801793b Merge inbound to mozilla-central. a=merge 2018-04-25 00:50:59 +03:00
Bob Owen f299b6bfc7 Bug 1444699: Remove dynamic load and call for GetUserDefaultLocaleName. r=handyman
This was only required because it is not available on Windows XP, which is no
longer supported. Patch already landed upstream in chromium.
2018-04-24 09:21:51 +01:00
Tim Nguyen 92c9a958e1 Bug 1372694 - Stop making the default theme a heavyweight theme. r=kmag,aswan
MozReview-Commit-ID: 30wMauuc9oo

--HG--
rename : browser/base/content/default-theme-icon.svg => toolkit/mozapps/extensions/content/default-theme-icon.svg
extra : rebase_source : 5e4cf784135f4a8e40a2ed8357ba651e7fce9728
2018-04-01 13:53:31 +02:00
jld@mozilla.com c7c75836c0 Backed out 2 changesets (bug 1439057, bug 1447867)
Backed out changeset baeab3bff807 (bug 1439057)
Backed out changeset 1a024d5ca77b (bug 1447867)

--HG--
extra : rebase_source : d39e4657b4117706a53bc42b7817424cf43f9148
2018-04-23 07:59:02 -06:00
Margareta Eliza Balazs fa0ffa186e Merge mozilla-central to autoland. a=merge CLOSED TREE
--HG--
rename : toolkit/mozapps/extensions/internal/XPIProviderUtils.js => toolkit/mozapps/extensions/internal/XPIDatabase.jsm
2018-04-24 14:51:28 +03:00
Sylvestre Ledru aefcd1c84b Bug 1448934 - Fix some spelling mistakes in locales/en-US r=flod
MozReview-Commit-ID: vGVudVgB31

--HG--
extra : rebase_source : cdc39375a3485a3133878c4dbbffe60c0b26e917
2018-04-24 10:26:35 +02:00
ffxbld 23863f75f8 No bug, Automated HSTS preload list update from task NB7sJcsHTtqWs431n9VnuQ
Summary:
No bug, Automated HPKP preload list update from task NB7sJcsHTtqWs431n9VnuQ

No bug, Automated blocklist update from task NB7sJcsHTtqWs431n9VnuQ

Reviewers: sfraser

Reviewed By: sfraser

Differential Revision: https://phabricator.services.mozilla.com/D1012

--HG--
extra : rebase_source : d69fb8de90258fb3030bfcd323e1564247558972
2018-04-23 11:54:49 +01:00
J.C. Jones 6fad8e3ff1 Bug 1441338 - Change pgo certificates to use certspec/keyspec files r=keeler r=franziskus
(This also fixes Bug 879740 and Bug 1204543.)

build/pgo/certs contains an NSS database set that has a bunch of hand-generated
certificates, and many of these hand-generated certificates are specifically
depended upon for a variety of unit tests. This patch changes all of these to
use the "pycert.py" and "pykey.py" utilities that produce deterministic keys
and certificates.

The naming convention here is new, and defined in the README. It is based on
the mochitest runtest.py naming convention that imports .ca and .client
PEM-encoded certificates.

Unfortunately, the updates to build/pgo/genpgocert.py to generate these files
depends on OpenSSL in order to produce PKCS12 archives for pk11tool to import
into NSS. This could be done with pure-NSS tooling, but it'd require some new
command line functionality, which is out-of-scope for this change.

Note that build/pgo/genpgocert.py no longer takes arguments when run. It's not
run automatically anywhere that I can see, but could (reasonably) be, now.

Differential Revision: https://phabricator.services.mozilla.com/D971

--HG--
extra : amend_source : bc389b9b0a807a4889feb14db439daa28635dfe9
2018-04-23 11:14:17 +02:00
Jed Davis c5a7acdf32 Bug 1439057 - Tighten /dev/shm access in Linux content sandbox policy. r=froydnj,gcp
This patch uses the shared memory name prefixes introduced in bug 1447867
to prevent access to /dev/shm files of other applications or other
processes within the same browser instance.

When a shared memory implementation that doesn't use shm_open is available
(specifically, the memfd_create support to be added in bug 1440203),
/dev/shm access is completely denied.

MozReview-Commit-ID: L2ylG5KrXTU

--HG--
extra : rebase_source : ca1deece6117e843d691a13fff05bd0f97ec0408
2018-04-12 23:48:16 -06:00
Cosmin Sabou 4595d43d3a Merge inbound to mozilla-central. a=merge
--HG--
rename : browser/modules/offlineAppCache.jsm => toolkit/modules/offlineAppCache.jsm
2018-04-20 01:29:10 +03:00
David Keeler 2c25bac533 bug 867473 - (4/4) remove nsIX509Cert.issuer and getChain r=jcj
These functions cause main-thread certificate verifications, which is bad for
performance. In general, nsIX509CertDB.asyncVerifyCertAtTime should be used
instead.

MozReview-Commit-ID: 9nkUDmyFY0k

--HG--
extra : rebase_source : d3e8a02e2d21e5507e71681b88f0360edf64b790
2018-04-17 13:07:52 -07:00
David Keeler df11944f15 bug 867473 - (3/4) replace use of nsIX509Cert.getChain() with an asynchronous API r=fkiefer,jcj
MozReview-Commit-ID: 8Ag6BrlyASU

--HG--
extra : rebase_source : 0c50d55c90301b19139d6f4a50694f1458d752f4
2018-04-17 12:41:23 -07:00
David Keeler 4ad6f791bc bug 867473 - (2/4) move certificate chain utility functions to a shared location r=fkiefer,jcj
MozReview-Commit-ID: JxlN95YLwRq

--HG--
extra : rebase_source : b4a5cacdc336cb8cfa0bad5a2a705667928e5167
2018-04-17 12:37:15 -07:00
David Keeler 98a4d728f8 bug 867473 - (1/4) refactor certificate chain utility functions in certViewer.js r=fkiefer,jcj
MozReview-Commit-ID: EvDtrr4t1ZO

--HG--
extra : rebase_source : a0787be343b55466135c02d944f3c199310b8d51
2018-04-17 12:33:04 -07:00
Nika Layzell 5e2e5fc993 Bug 1444991 - Part 5: Make some XPCOM methods more strongly typed, r=bz
This patch goes through and changes a bunch of places in our tree which mention
this bug to use the new feature, making the methods more strongly typed.

There are probably more places in tree which could be changed, but I didn't try
to find them.
2018-04-17 19:21:05 -04:00