Граф коммитов

13272 Коммитов

Автор SHA1 Сообщение Дата
Sebastian Hengst 769222fadf merge mozilla-inbound to mozilla-central. a=merge
--HG--
rename : browser/base/content/tabbrowser.xml => browser/base/content/tabbrowser.js
2018-02-28 12:54:12 +02:00
Sebastian Hengst 1761ef65c7 merge mozilla-central to mozilla-inbound. CLOSED TREE 2018-02-28 20:19:28 +02:00
Sebastian Hengst 1ded4e973b merge mozilla-central to mozilla-inbound 2018-02-28 12:58:05 +02:00
J.C. Jones c1babbf4e1 Bug 1437754 - Add a pref and disable the Symantec distrust algorithm r=keeler
This adds the pref "security.pki.distrust_ca_policy" which, if set to 1,
enforces the graduated distrust from Bug 1409257, and if set to 0 (as it is in
this patch) disables that distrust.

This pref is intended to outlast the Symantec distrust, and instead be able to
extend to enable/disable future root policy actions. It would need its own
tests for that, in the future.

MozReview-Commit-ID: BAZfkapysfX

--HG--
extra : rebase_source : 02b00aa486e9f8efb81b32d38d80db5cae86bc6e
2018-02-27 16:04:51 -07:00
Kai Engert 16cfaba763 Bug 1432177, uplift NSS_3_36_BETA3, r=me
UPGRADE_NSS_RELEASE
2018-02-28 11:13:28 +01:00
Honza Bambas 281502cac6 Bug 1363284 - HTTP/2 anonymous/onymous session (connection) coalescing, r=mayhemer
--HG--
extra : rebase_source : 66192a32668de8a9cd99722d1e0860cce2f84030
2018-02-15 09:10:00 +02:00
J.C. Jones 4bc9fe0d27 Bug 1439378 - Re-enable the imminent distrust browser-console test r=fkiefer,keeler
This patch does a few things:
1) It removes the symantecRoot and symantec_affected certs from build/pgo/certs'
   DB.
2) It upgrades that DB from the old format to SQLite (and this 8/3 to 9/4).
3) It adds a new cert "imminently_distrusted" to that DB for the bc test.
4) It changes the Subject of the immient distrust test to only have the CN
   field: this is because certutil reorders C to come after CN, and just like
   with the real Symantec certs, I had put C first. So rather than deal with
   importing the end entity for the pgo tests, I decided to just make things
   simple and change the tested subject.
5) Finally, it re-enables the test that was disabled in Bug 1434300.

MozReview-Commit-ID: Bt2RKyInJje

--HG--
rename : build/pgo/certs/cert8.db => build/pgo/certs/cert9.db
rename : build/pgo/certs/key3.db => build/pgo/certs/key4.db
extra : rebase_source : efceb67ae16f0af617bbd8bec201d52eee0f467d
2018-02-26 15:55:35 -07:00
Franziskus Kiefer 2842796e4c Bug 1435713 - fix linter errors, a=bustage 2018-02-28 10:28:11 +01:00
Franziskus Kiefer 49889960b6 Bug 1435713 - collect cert fingerprints for failed CS verifications, r=keeler,francois
Reviewers: keeler, francois

Reviewed By: keeler, francois

Subscribers: francois, ulfr

Bug #: 1435713

Differential Revision: https://phabricator.services.mozilla.com/D623

--HG--
extra : rebase_source : 0142e9d970eb289cf9814ae2c9bdc1f0a2a4ac46
extra : amend_source : bc4b4ca15d167ee9f0574efad7934458e2facd9b
2018-02-28 09:26:30 +01:00
Valentin Gosu ed218f0a19 Bug 1433958 - Change code that sets nsIURI.scheme to use nsIURIMutator r=mayhemer
MozReview-Commit-ID: GgyIkZSG2y3

--HG--
extra : rebase_source : 5398a29d8cb910c909ed88e1a6cbd9fd63e6b745
2018-02-26 20:43:47 +01:00
Valentin Gosu 7f3b09b694 Bug 1433958 - Change code that sets nsIURI.port to use nsIURIMutator r=mayhemer
MozReview-Commit-ID: 7Lu7JJvDUGF

--HG--
extra : rebase_source : 8d5a9bb1c4a5a525f7c5bc8d07c1e7029d2029a3
2018-02-26 20:43:46 +01:00
J.C. Jones 6d19459740 Bug 1440029 - Add a test for TrustOverrideUtils.h r=keeler
This is the test originally from Bug 1434300 that was pulled due to
Bug 1433015.

MozReview-Commit-ID: IEPCRVdS2v4

--HG--
extra : rebase_source : 843222f36b9fffe73cdf02aebb3f263897a943de
2018-02-21 16:54:52 -05:00
Tiberius Oros 22d5a6c371 Merge autoland to mozilla-central. a=merge 2018-02-27 00:18:03 +02:00
ffxbld 876968b0bb No bug, Automated HPKP preload list update from host bld-linux64-spot-030 - a=hpkp-update 2018-02-26 12:44:28 -08:00
ffxbld 92e1462566 No bug, Automated HSTS preload list update from host bld-linux64-spot-030 - a=hsts-update 2018-02-26 12:44:24 -08:00
ffxbld f3a601c889 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-02-25 11:53:31 -08:00
ffxbld a8acc056c9 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-02-25 11:53:27 -08:00
Patrick McManus 4ece6279ba Bug 1439105 - Ban H2 Client Certs Post Handshake r=bagder,keeler
MozReview-Commit-ID: Dfx5bB5NOBp

--HG--
extra : rebase_source : ec0984aec6625950b139c06a4ae3da69f49afdf3
2018-02-17 08:10:13 -05:00
ffxbld dbacae538a No bug, Automated HPKP preload list update from host bld-linux64-spot-324 - a=hpkp-update 2018-02-24 12:01:40 -08:00
ffxbld da2f635f78 No bug, Automated HSTS preload list update from host bld-linux64-spot-324 - a=hsts-update 2018-02-24 12:01:36 -08:00
Sebastian Hengst 7be9fed7d0 merge mozilla-inbound to mozilla-central. a=merge 2018-02-24 02:58:35 +02:00
Florian Quèze 682b1ec3b2 Bug 1440284 - change this.EXPORTED_SYMBOLS back to var EXPORTED_SYMBOLS in JS modules, r=mccr8. 2018-02-23 20:50:01 +01:00
ffxbld 57247f5331 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-02-23 11:48:18 -08:00
ffxbld 37e4f549d7 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-02-23 11:48:14 -08:00
ffxbld 0b6ee32aee No bug, Automated HPKP preload list update from host bld-linux64-spot-324 - a=hpkp-update 2018-02-22 11:50:18 -08:00
ffxbld b779a894df No bug, Automated HSTS preload list update from host bld-linux64-spot-324 - a=hsts-update 2018-02-22 11:50:13 -08:00
Csoregi Natalia dd63683685 Merge mozilla-central to autoland. a=merge CLOSED TREE 2018-02-21 23:52:24 +02:00
Csoregi Natalia 3011413f82 Merge inbound to mozilla-central. a=merge 2018-02-21 23:50:20 +02:00
Csoregi Natalia 4ae2fa641b Merge autoland to mozilla-central. a=merge 2018-02-21 23:49:19 +02:00
ffxbld 36baa4e37e No bug, Automated HPKP preload list update from host bld-linux64-spot-326 - a=hpkp-update 2018-02-21 11:46:16 -08:00
ffxbld 9c7bbae0ca No bug, Automated HSTS preload list update from host bld-linux64-spot-326 - a=hsts-update 2018-02-21 11:46:12 -08:00
Felipe Gomes d261cc7c57 Bug 1429148 - Policy: Don't let a Master Password to be set. r=keeler
MozReview-Commit-ID: 8Adqg0KU7cZ

--HG--
extra : rebase_source : ec20e2f117d974edaa5df844091a086d12607771
2018-02-20 20:46:11 -03:00
Felipe Gomes 254ff126ef Bug 1429148 - Add nsIPK11Token.isInternalKeyToken. r=keeler,MattN
MozReview-Commit-ID: Gdd7MxDXoTC

--HG--
extra : rebase_source : a367c07755046657d7f2133d4858ea6e6b0c219a
2018-02-20 20:43:41 -03:00
ffxbld 2284608f88 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-02-20 11:59:25 -08:00
ffxbld c098f7cf06 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-02-20 11:59:21 -08:00
David Keeler 889e55fc5b bug 1439732 - fixup for backing out bug 1415991 post bug 1421084 (so Firefox 60 only) r=jcj
MozReview-Commit-ID: 4Hn9mt1TWwN

--HG--
extra : amend_source : 4cb25adb27986ec650d85762aecb5aae0cd29502
2018-02-20 12:28:01 -08:00
David Keeler 1d724da30f Backed out changeset 0a5795108e0a
MozReview-Commit-ID: DT67yB63lSn

--HG--
extra : rebase_source : ae106a256be2361a116cd1a14adb5a6d4b49ebe3
2018-02-20 12:21:55 -08:00
Jed Davis 9bdbd2d99f Bug 1438389 - Quietly disallow chown() in sandboxed content processes. r=gcp
Also covers fchownat() and attempts to be ready for newer archs like ARM64.

Bonus fix: extend bug 1354731 (mknod) fix to cover mknodat so this part
of the policy isn't glaringly inconsistent about "at" syscalls.

Tested locally by attaching gdb and injecting syscalls.

MozReview-Commit-ID: CCOk0jZVoG4

--HG--
extra : rebase_source : 1d0cafd9d91586eaec0233ff15b3bbb1ef7485f0
2018-02-15 16:10:00 -07:00
J.C. Jones e5937633d9 Bug 1434300 - Add the DigiCert whitelisted SPKIs r=keeler
This adds the 4 digicert CAs to our whitelist as specified in Google's details
on the Chromium version of this plan [1].

[1] c022914eb2/net/data/ssl/symantec/README.md

MozReview-Commit-ID: BR7t1UheKeS

--HG--
rename : security/certverifier/TrustOverride-AppleGoogleData.inc => security/certverifier/TrustOverride-AppleGoogleDigiCertData.inc
extra : rebase_source : 406e42e805b3778ccce7ee85b18d5dea93e32b95
2018-02-21 14:08:59 -05:00
J.C. Jones 7d0730b216 Bug 1434300 - Change Symantec Distrust Algorithm's whitelist to SPKI-matching r=fkiefer,keeler
Because of the DigiCert-controlled sub-CAs and managed-CAs identified as also
needing to be whitelisted [1], and that those CAs are using an increasing number
of certificates all with different Subjects (but identical public keys) [2][3],
we will have to whitelist on SPKI rather than subject DN.

This makes the security/manager/ssl/tests/unit/test_symantec_apple_google.js
integration test different, as it now uses a real Google certificate that is
in the whitelist with only a cert verification rather than a full connection
test.

This patch does not add the DigiCert SPKIs to the list; I will do that in its
own patch.


[1] https://chromium.googlesource.com/chromium/src/+/master/net/data/ssl/symantec/README.md
[2] https://chromium-review.googlesource.com/c/chromium/src/+/916730
[3] https://crt.sh/?spkisha256=ac50b5fb738aed6cb781cc35fbfff7786f77109ada7c08867c04a573fd5cf9ee

MozReview-Commit-ID: 4qVeogDbSb

--HG--
extra : rebase_source : abbdd432b190d059a3b2ceeccf89b85a12c214dd
2018-02-21 14:08:47 -05:00
J.C. Jones aaaf57c831 Bug 1434300 - Add a utility to match certificates based on SPKI r=fkiefer,keeler
This modifies crtshToDNStruct.py to be able to produce SPKI or DN-based lists,
and adds a SPKI-search method to TrustOverrideUtils.h.

This also regenerates the TrustOverride files to use the new script.

MozReview-Commit-ID: BhMoJbYXs7Y

--HG--
rename : security/manager/tools/crtshToDNStruct/crtshToDNStruct.py => security/manager/tools/crtshToIdentifyingStruct/crtshToIdentifyingStruct.py
rename : security/manager/tools/crtshToDNStruct/requirements.txt => security/manager/tools/crtshToIdentifyingStruct/requirements.txt
extra : rebase_source : 9ae4999ceea2d4092119fe81b787c4d66a5e17b1
2018-02-21 14:08:44 -05:00
J.C. Jones 894d57b6bf Bug 1434300 - Implement the Symantec distrust plan from Bug 1409257 r=fkiefer,keeler
The algorithm from https://hg.mozilla.org/mozilla-central/rev/595e27212723
(Bug 1409259) is adapted in this patch from nsNSSCallbacks into the TrustDomain
decisions.

This patch does not change the algorithm to use SPKI matching, nor add the
additional whitelisted intermediates from DigiCert; that will be done in a
separate commit.

This patch also does not update the pre-existing browser chrome test.

MozReview-Commit-ID: 1PdCAqo71bI

--HG--
extra : rebase_source : f1c6d00e16682f9303b8b2bfdf1fe5773c515ac5
2018-02-21 14:08:18 -05:00
J.C. Jones e72f46e3ff Bug 1434300 - Update Imminent Distrust status for future Symantec sanctions r=fkiefer,keeler
This patch does a few things:

1) It adds a permament test mechanism for the "imminent distrust" trust status
in nsNSSCallbacks: a simple xpcshell test to exercise a clause in the imminent
distrust logic in nsNSSCallbacks' IsCertificateDistrustImminent method.

2) This test removes test_symantec_apple_google_unaffected.js as its
functionality is rolled into the new test_imminent_distrust.js.

3) It updates the Symantec imminent distrust warning algorithm to remove the
validity date exception; this warns of the upcoming distrust for those affected
certs in Firefox 63.

This patch does not attempt to edit the browser chrome test that checks the
console; that is a subsequent patch.

MozReview-Commit-ID: 1HyVLfmEOP7

--HG--
extra : rebase_source : 3955e3dcd9a21421105d97bd65d3965041de9b8c
2018-02-21 07:39:36 -05:00
Jonathan Kingston 8afc412494 Bug 1435733 - Upgrade mixed display content pref. r=baku,ckerschb,francois,mayhemer
MozReview-Commit-ID: ETIgVF3zhRu

--HG--
extra : rebase_source : e4c59f50584158f4b31527347b10424b56692fa1
2018-02-05 15:37:27 +00:00
ffxbld 7dbd69b271 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-02-19 12:14:58 -08:00
ffxbld 4f4cdf70f5 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-02-19 12:14:54 -08:00
ffxbld 3e2e7c414f No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-02-18 11:51:04 -08:00
ffxbld 18e9f8b8e0 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-02-18 11:51:00 -08:00
Chris Peterson 0129d900f3 Bug 1436263 - Part 2: Replace `override final` virtual function specifiers with just `final`. r=froydnj
MozReview-Commit-ID: 70gt5SUu4Dv

--HG--
extra : rebase_source : 71912c6bde22aaed01e70615a4ee794a36e70d0e
extra : source : 1c22d4c65d70b797ee3e963ec426c90e1f89b5e3
2018-02-05 22:50:00 -08:00
Chris Peterson d09123f248 Bug 1436263 - Part 1: Replace `final override` virtual function specifiers with just `final`. r=froydnj
MozReview-Commit-ID: DE5HkIhsZ6D

--HG--
extra : rebase_source : 94831c1e13a840dd2ea0600f64bcf70c2bf938d9
extra : source : cf9283bf1b0bca3a6311c98e227329d451f80ecb
2018-02-05 22:46:57 -08:00
ffxbld 101516e4b4 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-02-17 11:53:22 -08:00
ffxbld b22fc381ad No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-02-17 11:53:18 -08:00
David Keeler 12125be772 bug 1437214 - if PathBuildingStep::Check fails due to a problem with the subject certificate rather than the potential issuer, set keepGoing to false r=jcj
MozReview-Commit-ID: DEr4YgXfkOL

--HG--
extra : rebase_source : daea8346adeb56cc34c0fb284dba2e571fd3621e
2018-02-09 16:35:54 -08:00
Gurzau Raul 641a1a335b Merge autoland to mozilla-central. a=merge 2018-02-17 00:07:28 +02:00
ffxbld aac4bf5025 No bug, Automated HPKP preload list update from host bld-linux64-spot-324 - a=hpkp-update 2018-02-16 12:17:39 -08:00
ffxbld 3e2d0c9e68 No bug, Automated HSTS preload list update from host bld-linux64-spot-324 - a=hsts-update 2018-02-16 12:17:35 -08:00
Narcis Beleuzu 2d9816273c Merge inbound to mozilla-central. a=merge 2018-02-16 11:49:59 +02:00
Margareta Eliza Balazs 55aa0e75d6 Merge mozilla-central to inbound. a=merge CLOSED TREE 2018-02-15 22:43:18 +02:00
ffxbld 9c28e67497 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-02-15 11:54:30 -08:00
ffxbld eb8f2dd6d1 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-02-15 11:54:26 -08:00
David Parks 9a797c5ce2 Bug 1415160: Part 2 - Add mitigations to plugin process if not running from network drive r=bobowen
Adds MITIGATION_IMAGE_LOAD_NO_REMOTE and MITIGATION_IMAGE_LOAD_NO_LOW_LABEL to the plugin process if we aren't running from a networked drive.  The same condition applies to these mitigations in the content process.

--HG--
extra : rebase_source : b61f91f3e56f6b4930a03331b7791a9173857518
2017-12-21 12:36:02 -08:00
David Parks 90d62139c0 Bug 1415160: Part 1 - Enable new NPAPI Windows Process Mitigations; r=bobowen
Enables new process mitigations that have been included from Chromium upstream.

--HG--
extra : rebase_source : 8997bef9c6a6c660b39e68ebfabf90f4de162bca
2017-12-20 22:58:26 -08:00
Dorel Luca 90035255ae Merge autoland to mozilla-central a=merge 2018-02-15 00:19:43 +02:00
ffxbld b704aa3943 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-02-14 11:41:55 -08:00
ffxbld c8cb4d8575 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-02-14 11:41:51 -08:00
ffxbld 149e4575b0 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-02-13 11:40:34 -08:00
ffxbld 1bcdadf7b5 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-02-13 11:40:30 -08:00
Haik Aftandilian c90be35636 Bug 1436566 - [Mac] Land disabled-by-default sandboxing for the Flash NPAPI plugin process. r=Alex_Gaynor,jimm
MozReview-Commit-ID: Es0GbMLKvH5

--HG--
extra : rebase_source : 991f20ac25735508d790947991f59214fb06e54f
2018-02-12 15:46:31 -08:00
Ciure Andrei 72080bd73c Merge inbound to mozilla-central. a=merge 2018-02-13 00:08:37 +02:00
Ciure Andrei 6c55aa90ec Merge autoland to mozilla-central. a=merge 2018-02-13 00:06:52 +02:00
ffxbld 9eab54622b No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-02-12 11:53:23 -08:00
ffxbld 91e80a354d No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-02-12 11:53:20 -08:00
Markus Stange 62e953a6b6 Bug 785440 - Disable warning C4324 when building security/certverifier. r=keeler
This warning is triggered by the use of alignas() in js/public/RootingAPI.h.
Now that GeckoProfiler.h includes RootingAPI.h, this warning is encountered
when building security/certverifier because GeckoProfiler.h is already being
included transitively, through this inclusion path:
CertVerifier.cpp -> CertVerifier.h -> Telemetry.h -> StartupTimeline.h -> GeckoProfiler.h

However, this explanation is not entirely satisfactory, because there seems to
be an existing inclusion path for RootingAPI.h already:
CertVerifier.cpp -> CertVerifier.h -> BasePrincipal.h -> OriginAttributes.h
 -> ChromeUtils.h -> ChromeUtilsBinding.h -> RootingAPI.h

So I'm not quite sure why this problem is only starting to happen now.

MozReview-Commit-ID: AFuXpTjdPsi

--HG--
extra : rebase_source : 60f74c8655d15fbc6acbf0ce8a2f208e198e231e
2018-02-11 00:32:14 -05:00
Tom Ritter aa82f54ab6 Bug 1435296 Address test failures caused by bumping timer precision to 2 ms r=baku
There are a few different reasons why tests needed updating (not an exhaustive list):

- Tests assume that successive operations take place at different times.
- Tests assume that an operation took a minimum amount of time.
- Tests hardcodes a specific delay.

In most cases we hardcode the preference off. In some cases this is the best approach,
in others, we would like to improve. The bug for tracking those improvements is Bug 1429648

An improvement that is present in some tests is to hardcode a specific precision reduction
that is acceptable based on the confides of the test. (Obviously this needs to be a fix for
the test framework and not a requirement on the feature being tested.)

In a few places, the test itself can be fixed, for example to no longer require the end
time of an operation to be strictly greater than the start time, and allows it to be equal
to it.

MozReview-Commit-ID: J59c7xQtZZJ

--HG--
extra : rebase_source : df8a03e76eaf9cdc9524dbb3eb9035af237e534b
2018-02-12 11:39:41 -06:00
ffxbld 929f38c465 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-02-11 11:38:54 -08:00
ffxbld 89d2f51207 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-02-11 11:38:50 -08:00
ffxbld d8618c2516 No bug, Automated HPKP preload list update from host bld-linux64-spot-305 - a=hpkp-update 2018-02-10 12:36:17 -08:00
ffxbld 667ffc2f8f No bug, Automated HSTS preload list update from host bld-linux64-spot-305 - a=hsts-update 2018-02-10 12:36:13 -08:00
Bogdan Tara 5bbbbe17bc Merge inbound to mozilla-central. a=merge 2018-02-10 11:57:47 +02:00
Dorel Luca 5642ca2d02 Backed out changeset 06f87ee5bbbb (bug 1231203) for xpcshell and TV failures on security/manager/ssl/tests/unit/test_ocsp_private_caching.js on a CLOSED TREE 2018-02-10 05:34:40 +02:00
David Keeler 37cd996306 bug 1231203 - ensure OCSP responses to requests from private contexts aren't cached on disk r=jcj
MozReview-Commit-ID: 374f7hERLee

--HG--
extra : rebase_source : b424ee96d7f48e4f9d0b8fce91a675ae4477c43d
2018-02-08 17:16:03 -08:00
Sebastian Hengst d1700a0b7a merge mozilla-central to autoland. CLOSED TREE 2018-02-10 00:34:30 +02:00
Coroiu Cristina e2b150dd90 Merge autoland to mozilla-central. a=merge 2018-02-09 23:57:50 +02:00
ffxbld 967bc4dd14 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-02-09 12:01:52 -08:00
ffxbld a0bae7c069 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-02-09 12:01:49 -08:00
Jed Davis f57faf8137 Bug 1436882 - Fix termination signal when clone()ing child processes. r=gcp
This fixes a mistake in bug 1401062: the termination signal was omitted,
so it's 0, and if it isn't exactly SIGCHLD, then a tracer/debugger will
receive PTRACE_EVENT_CLONE rather than PTRACE_EVENT_FORK.  This causes
GDB to see the child process as a thread instead of a separate process,
and it becomes very confused after the process calls execve().

MozReview-Commit-ID: Baf2RFHVWRU

--HG--
extra : rebase_source : 50839967fc766bb9db123fe1af99a88495f8421b
2018-02-08 17:30:03 -07:00
J.C. Jones 3d8ea4a710 Bug 1434936 - Rework ChainHasValidPins to use nsNSSCertList r=keeler r=fkiefer
This commit reworks PublicKeyPinningService::ChainHasValidPins and
PublicKeyPinningService::EvalChain to use nsNSSCertList directly.  It also
updates nsSiteSecurityService::ProcessPKPHeader. This will be made more
efficient in Bug 1406854, where the call to VerifySSLServerCert gets replaced
with one to GetSucceededCertChain. (Such a change is premeature now because
before Bug 731478 lands this would lead to a session resumption regression
causing pins to not be set properly, which is triggered repeatedly in the
xpcshell tests.)

MozReview-Commit-ID: 1l186n1lXLH

--HG--
extra : rebase_source : 88e40bbf41b324ece762abfa84a758380102e199
extra : histedit_source : addcddf253c2901a25b29f65046908f52df61345
2018-01-31 18:50:29 -07:00
J.C. Jones 69d7ddbfe8 Bug 1434936 - Use nsNSSCertList in NSSCertDBTrustDomain::IsChainValid r=keeler r=fkiefer
This change is to use the higher-level structure nsNSSCertList when checking
IsChainValid so that we can use the more powerful (and tested) methods of that
object instead of the ad-hoc iterators.

This will also permit the Symantec Distrust code in Bug 1434300 to use these
methods, which keeps the code the same from the earlier Bug 1409259.

MozReview-Commit-ID: B5KmDa1JLE

--HG--
extra : rebase_source : 397d3ef7189eb6f81a1ceaf920464d9e842a8981
extra : histedit_source : 26b22257cb5fcc3389630dd0a1aba24095c46158
2018-01-31 16:02:00 -07:00
J.C. Jones 6395c26d4a Bug 1434936 - Add method nsNSSCertList::GetRootCertificate r=keeler r=fkiefer
This adds another utility method to nsNSSCertList to perform CERT_LIST_TAIL on
the underlying certificate list and return the last entry -- e.g., the root.
This is a convenience method to let other parts of the certificate verifier
continue to work with the higher-level nsNSSCertificate objects instead of
having to convert them.

MozReview-Commit-ID: EEi9L5Iepc6

--HG--
extra : rebase_source : 2836767a7186f65debf338f8d1f2a981636ed29b
extra : histedit_source : 5b87ec6c522ac1b84d91052e21184f3c03d9ea52
2018-01-31 17:14:40 -07:00
Brendan Dahl a1b881280b Bug 1434016 - Inline and remove the various security manager overlays. r=keeler
This is part of the work to remove XUL overlays. All of these overlays are
used only once and do not need to be in their own overlay files.

MozReview-Commit-ID: Ecwq2UN52o9

--HG--
extra : rebase_source : 5a9692c7d9965940847ae1d488d1b94a2abf66c7
2018-01-29 14:56:53 -08:00
Honza Bambas e68b22643e Bug 1152332 - Let connection proxy filters return the result asynchronously - update/introduce tests, r=michal
--HG--
rename : netwerk/test/unit/test_protocolproxyservice.js => netwerk/test/unit/test_protocolproxyservice-async-filters.js
2018-02-08 05:49:00 +02:00
Jed Davis 927e70c7a5 Bug 1425274 - Filter socketpair() in content sandbox on 32-bit x86 with new-enough kernels. r=gcp
This replaces the globals for whether socket calls (and ipc(2) calls, but
we never used that) have real arguments with a parameter, which in hindsight
should have been done in bug 1273852, which is when we started handling
both socketcall(2) and separate socket calls in the same policy.  This
allows handling the two cases differently.

MozReview-Commit-ID: 1pfckmCpJlW

--HG--
extra : rebase_source : 4b8459f01e8748fea95cbcb6eeb689f01417ca5b
2018-01-29 17:36:06 -07:00
Jed Davis 4be220d5f3 Bug 1376910 - Remove SysV IPC access from Linux content sandbox when possible. r=gcp
There are a few things that use SysV IPC, which we discovered the last
time we tried to do this, which need to be accomodated:

1. The ALSA dmix plugin; if the build has ALSA support (off by default)
and if audio remoting is disabled, SysV IPC is allowed.

2. ATI/AMD's old proprietary graphics driver (fglrx), which is obsolete
and doesn't support newer hardware, but still has users; if it's
detected, SysV IPC is allowed.

3. Graphics libraries trying to use the MIT-SHM extension; this is
already turned off for other reasons (see bug 1271100), but that shim
seems to not load early enough in some cases, so it's copied into
libmozsandbox, which is preloaded before anything else in LD_PRELOAD.

Also, msgget is now blocked in all cases; the only case it was known
to be used involved ESET antivirus, which is now handled specially
(bug 1362601).  In any case, the seccomp-bpf policy has never allowed
actually *using* message queues, so creating them is not very useful.

MozReview-Commit-ID: 5bOOQcXFd9U

--HG--
extra : rebase_source : ea79c0a7e31f58f056be15b551c57dde974dfae2
2018-01-26 19:43:10 -07:00
ffxbld e3330cdba4 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-02-07 21:47:26 -08:00
ffxbld 27f33391a6 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-02-07 21:47:22 -08:00
Andrew McCreight 5dec0e0beb Bug 1432992, part 1 - Remove definitions of Ci, Cr, Cc, and Cu. r=florian
This patch was autogenerated by my decomponents.py

It covers almost every file with the extension js, jsm, html, py,
xhtml, or xul.

It removes blank lines after removed lines, when the removed lines are
preceded by either blank lines or the start of a new block. The "start
of a new block" is defined fairly hackily: either the line starts with
//, ends with */, ends with {, <![CDATA[, """ or '''. The first two
cover comments, the third one covers JS, the fourth covers JS embedded
in XUL, and the final two cover JS embedded in Python. This also
applies if the removed line was the first line of the file.

It covers the pattern matching cases like "var {classes: Cc,
interfaces: Ci, utils: Cu, results: Cr} = Components;". It'll remove
the entire thing if they are all either Ci, Cr, Cc or Cu, or it will
remove the appropriate ones and leave the residue behind. If there's
only one behind, then it will turn it into a normal, non-pattern
matching variable definition. (For instance, "const { classes: Cc,
Constructor: CC, interfaces: Ci, utils: Cu } = Components" becomes
"const CC = Components.Constructor".)

MozReview-Commit-ID: DeSHcClQ7cG

--HG--
extra : rebase_source : d9c41878036c1ef7766ef5e91a7005025bc1d72b
2018-02-06 09:36:57 -08:00
Gurzau Raul 476c3b3a55 Merge inbound to mozilla-central. a=merge 2018-02-06 23:53:56 +02:00
ffxbld a806ff2842 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-02-06 11:29:26 -08:00
ffxbld 09d6ee7e84 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-02-06 11:29:22 -08:00
Narcis Beleuzu 84cea84b12 Merge inbound to mozilla-central. a=merge 2018-02-06 11:54:42 +02:00