Граф коммитов

6108 Коммитов

Автор SHA1 Сообщение Дата
ffxbld 9511e1aa4b No bug, mozilla-central repo-update. r=mtabara
No bug, Automated HSTS preload list update from task PFJDsn1_RJyPxtwQXtin8A

No bug, Automated HPKP preload list update from task PFJDsn1_RJyPxtwQXtin8A

No bug, Automated blocklist update from task PFJDsn1_RJyPxtwQXtin8A

No bug, Automated remote settings update from task PFJDsn1_RJyPxtwQXtin8A

Differential Revision: https://phabricator.services.mozilla.com/D1580
2018-06-07 14:03:58 -04:00
David Keeler d4901f4908 bug 1466942 - avoid l10n string bundles in nsNSSComponent initialization r=fkiefer
Before this patch, nsNSSComponent initialization would call PK11_ConfigurePKCS11
with some localized strings, which contributed to startup time. Also,
PK11_UnconfigurePKCS11 was never called, so the memory allocated to these
strings would stick around forever. This patch addresses both of these problems
by not calling PK11_ConfigurePKCS11. This means that some properties of NSS'
internal "PKCS#11 slots/tokens" have to be localized when displaying them to the
user.

MozReview-Commit-ID: BbAgbgpFfFG

--HG--
extra : rebase_source : b633da8fea683675d0c0514a378954332afeb024
2018-06-04 17:07:06 -07:00
Narcis Beleuzu cf464eabfe Merge inbound to mozilla-central. a=merge 2018-06-06 20:00:09 +03:00
Sylvestre Ledru a3ce8a59cd Bug 1464869 - Fix flake8/pep8 issue by hand in security/ r=fkiefer
MozReview-Commit-ID: ExDsMJ9KzJQ

--HG--
extra : rebase_source : e17c44e94c371d168f3c34ecbd640fb87cd2e863
2018-05-27 10:36:45 +02:00
Sylvestre Ledru 9fa6cfa8d4 Bug 1464869 - Run autopep8 on security/ r=fkiefer
MozReview-Commit-ID: K3aWVqsO0O8

--HG--
extra : rebase_source : 6bcf97b8b4a6e70113f36d8097f26816ce4b0acf
2018-05-26 06:47:27 -07:00
Narcis Beleuzu cce21bfe40 Merge mozilla-central to inbound. a=merge CLOSED TREE 2018-06-06 12:52:15 +03:00
Boris Zbarsky 5945884066 Bug 1466727 part 6. Stop using nsITreeColumn in layout. r=mossop 2018-06-05 23:01:37 -04:00
Boris Zbarsky 3473c823b2 Bug 1466727 part 2. Remove use of nsITreeColumn in xpidl interfaces. r=mossop
There is one actual behavior change here, in the webidl version of
TreeBoxObject::GetCellAt.  I believe this change fixes a leak of the
nsTreeColumn, but could use careful review.

I tried to avoid changes not needed to get this compiling.  There will be a lot
more cleanup in the next few changesets.
2018-06-05 23:01:36 -04:00
arthur.iakab fd0ee7c9b8 Merge inbound to mozilla-central a=merge 2018-06-06 00:58:30 +03:00
Boris Zbarsky d20d5e61f5 Bug 1466673 part 4. Stop using nsITreeColumns in various other C++ code. r=mossop 2018-06-05 13:30:17 -04:00
Miko Mynttinen 4c85ef17cc Bug 1465060 - Part 1: Fix warnings for std::move() use r=froydnj
MozReview-Commit-ID: HpdFXqQdIOO

--HG--
extra : rebase_source : 1e7eea4f2d4ec16ec0c559a8afb26976ddbf4d07
2018-06-01 17:59:07 +02:00
arthur.iakab 7e765f798b Backed out 2 changesets (bug 1465060) for build bustages on security/sandbox/linux/reporter/SandboxReporter.cpp
Backed out changeset 7c8905b6b226 (bug 1465060)
Backed out changeset 10446073eca8 (bug 1465060)
2018-06-03 19:25:41 +03:00
Miko Mynttinen 8d9dc85cd4 Bug 1465060 - Part 1: Fix warnings for std::move() use r=froydnj
MozReview-Commit-ID: HpdFXqQdIOO

--HG--
extra : rebase_source : 619d0e0ff63a2453c80f0c4d9beb906d43fa9b01
2018-06-01 17:59:07 +02:00
Andreea Pavel 4ced6e8b2d Merge mozilla-central to autoland. a=merge 2018-06-03 07:27:01 +03:00
ffxbld ee72038b8e No bug, Automated HSTS preload list update from task BqRcopwHQbGAhBJA_2Vuzw
Summary:
No bug, Automated HPKP preload list update from task BqRcopwHQbGAhBJA_2Vuzw

No bug, Automated blocklist update from task BqRcopwHQbGAhBJA_2Vuzw

No bug, Automated remote settings update from task BqRcopwHQbGAhBJA_2Vuzw

Reviewers: mtabara, jlund

Reviewed By: mtabara

Differential Revision: https://phabricator.services.mozilla.com/D1473

--HG--
extra : rebase_source : 8326a0602e40d57f8fb3da5dd047a5b3840bc77f
2018-06-01 15:56:55 +01:00
Emilio Cobos Álvarez fffb25b74f Bug 1465585: Switch from mozilla::Move to std::move. r=froydnj
This was done automatically replacing:

  s/mozilla::Move/std::move/
  s/ Move(/ std::move(/
  s/(Move(/(std::move(/

Removing the 'using mozilla::Move;' lines.

And then with a few manual fixups, see the bug for the split series..

MozReview-Commit-ID: Jxze3adipUh
2018-06-01 10:45:27 +02:00
David Keeler 1fa719d5ca bug 1461803 - minor cleanup in PSM: (re)move nsNSSErrors to NSSErrorsService r=jcj
Also removes displayUnknownCertErrorAlert, which was declared but never used.
Also removes some unnecessary ns(I)CertOverrideService OID stuff.

MozReview-Commit-ID: 4o7c1TkKeKJ

--HG--
extra : rebase_source : a8069b76fc847e6b4d158e4b30a75bde3e290ed9
2018-06-01 16:23:17 -07:00
David Keeler 23798b7e5f bug 1465976 - remove all find*ByName APIs from PSM PKCS#11 module/slot/token interfaces r=fkiefer,jcj
Before this patch, we exposed a few interfaces that revolved around mapping a
name to a specific PKCS#11 module, slot, or token. These APIs were all either
problematic and/or unnecessary. In theory there could be two tokens in different
modules with the same name, so nsIPK11TokenDB.findTokenByName wasn't guaranteed
to return what the consumer expected it to. In general, these APIs were used by
front-end code to go from a handle on the specific object in question to a
string identifier and then back to a handle on the object. This was unnecessary
- we can just retain the original handle.

MozReview-Commit-ID: IbqLbV4wceA

--HG--
extra : rebase_source : 05d39afd6bed0aa5e7694e1c79baf836edc03214
2018-05-31 14:46:06 -07:00
Andreea Pavel 38bcf897f1 Merge mozilla-inbound to mozilla-central. a=merge 2018-05-31 13:04:21 +03:00
arthur.iakab f1046ac67f Merge mozilla-central to inbound 2018-05-31 01:08:35 +03:00
Andrea Marchesini 1273dc5391 Bug 1446933 - Remove 'using namespace mozilla::net' from BackgroundUtils.h, r=qdot 2018-05-30 21:21:17 +02:00
David Keeler b0ca052e73 bug 1465258 - remove load group workaround in new OCSP code r=jcj
The patch for bug 1456489 included a workaround for the issue that origin
attributes weren't honored on channels that didn't have a load group set (bug
1456742). Now that that's fixed, we don't need the workaround.

MozReview-Commit-ID: I4ExIqt6dYo

--HG--
extra : rebase_source : d323c0860989985b72933dcffd62743b9d73644d
2018-05-29 16:03:37 -07:00
David Keeler 6031c1d1be bug 1464505 - remove some unused localization helpers from nsNSSComponent r=fkiefer
nsNSSComponent::PIPBundleFormatStringFromName and ::GetNSSBundleString are now
unused. They can be removed (which means that nsNSSComponent::mNSSErrorsBundle
can be removed as well).

MozReview-Commit-ID: GAaGawSDL2n

--HG--
extra : rebase_source : 3f683a902e292c6b0cf736773e71fb893074c32b
2018-05-25 13:02:02 -07:00
David Keeler 4483c4670c bug 1464510 - test_ssl_status.js needs to be run sequentially (it uses hardcoded ports) r=mgoodwin
MozReview-Commit-ID: 7MeWq9ZCRd9

--HG--
extra : rebase_source : 421aa6246d71b3ea24f835769c8af61c7658fd02
2018-05-25 13:54:43 -07:00
David Keeler 571854a7c1 bug 1464520 - hard-code the builtin roots module name to avoid a dependency on l10n in nsNSSComponent r=fkiefer,jcj
nsNSSComponent startup and shutdown would be simpler if there were no direct
dependencies on localized strings. This patch removes a dependency on the
localized name of the builtin roots module by hard-coding the name internally
and then mapping it to/from the localized version as appropriate.

MozReview-Commit-ID: 30kbpWFYbzm

--HG--
extra : rebase_source : 3d384af5a9fa45d5ac1f78e1fcb0dd9e4b94267d
2018-05-25 11:22:48 -07:00
David Keeler d0f63cd6ba bug 1463901 - re-arrange some nsNSSComponent initialization/shutdown operations to avoid hanging r=jcj
Before this patch, if nsNSSComponent initialization failed after allocating the
XPCOM object for the component but before dispatching the load loadable roots
task, BlockUntilLoadableRootsLoaded would block indefinitely in ShutdownNSS
(called from ~nsNSSComponent).

This patch re-arranges some things so that nsNSSComponent cleanup won't block on
the load loadable roots task if it never fired. It also splits the cleanup into
idempotent operations and operations that can only be run once.

Unfortunately if nsNSSComponent initialization fails, Firefox is likely to exit
or fail promptly anyway (since it is essential to so many other components).
However, quitting outright is probably a better experience than hanging
indefinitely.

MozReview-Commit-ID: RWmBUV2pEU

--HG--
extra : rebase_source : e2d06178ecc8ca8681eef18cb3af0a9ac8f83d1c
2018-05-23 15:39:38 -07:00
David Keeler ca855468dd bug 1461037 - lossily convert invalid UTF8 in certificates for display purposes r=jcj
In debug builds, we assert if any UTF8-to-UTF16 conversion fails. If we have
invalid UTF8 in a certificate, we don't want to assert. So, we now lossily
convert invalid UTF8 in certificates for any display purposes.
This also handles fields that are supposed to be ASCII in a similar way.

MozReview-Commit-ID: 6TdVPDTmNlh

--HG--
extra : rebase_source : 17000bd0671551bbdae534a4eaf4946c1b0beb83
2018-05-15 16:41:46 -07:00
Csoregi Natalia 2f779be8d9 Merge mozilla-central to autoland. a=merge CLOSED TREE 2018-06-02 01:03:45 +03:00
David Keeler 0dec465e26 bug 1465933 - remove GetPIPNSSBundleString from nsINSSComponent r=fkiefer
At this point, all uses of GetPIPNSSBundleString *should* be on the main thread,
so we can just remove the nsINSSComponent version and rely on the
nsNSSCertHelper instance.

MozReview-Commit-ID: Lt7AgokGKRH

--HG--
extra : rebase_source : 95d3cf6e011468e2aa9df9bb69372ac4d3430286
2018-05-31 12:26:04 -07:00
David Keeler d8f748b996 bug 401240 - part 2/2 - reimplement PKCS#12 import/export without goto r=fkiefer
MozReview-Commit-ID: JUMmTPrEYND

--HG--
rename : security/manager/ssl/tests/unit/test_certDB_import_with_master_password.js => security/manager/ssl/tests/unit/test_certDB_export_pkcs12.js
rename : security/manager/ssl/tests/unit/test_certDB_import_with_master_password.js => security/manager/ssl/tests/unit/test_certDB_export_pkcs12_with_master_password.js
extra : rebase_source : 3bf01e722f496b4dba634ed5d0345ce1fe0ceea7
2018-05-11 11:37:50 -07:00
David Keeler 18117a994a bug 401240 - part 1/2 - run ./mach clang-format on nsPKCS12Blob r=fkiefer
MozReview-Commit-ID: 81m6dxhg8Pv

--HG--
extra : rebase_source : c9d3bed637e163cc6347f6626067aaf9b773db8c
2018-05-11 11:09:00 -07:00
Nika Layzell 2d188849ae Bug 1455217 - Part 3: Use the new xpidl Promise type instead of nsISupports, r=bz 2018-05-14 17:55:54 -04:00
J.C. Jones db950df22f Bug 1461373 - Set BRNameMatchingPolicy to "Enforce" for Nightly r=keeler
Summary:
Change the security.pki.name_matching_mode pref to 3 for Enforce on Nightly.

BR_9_2_1_SUBJECT_ALT_NAMES show that ~99.98% of encountered certificates have
an acceptable SAN, so our compatibility risk is about 0.02%.

BR_9_2_2_SUBJECT_COMMON_NAME also shows, 99.89% of certificate common names are
present in a subject alternative name extension, giving a worst-case of 0.11%
risk, though BR_9_2_1_SUBJECT_ALT_NAMES is more what we're affecting here.

Test Plan: none

Reviewers: keeler

Tags: #secure-revision

Bug #: 1461373

Differential Revision: https://phabricator.services.mozilla.com/D1277

--HG--
extra : transplant_source : %BF%7D%DEi%C7%9BhE%D0%C2d%9D0%AC%F8%9EM%E0%60U
2018-05-14 09:55:15 -07:00
Kris Maglione 250e7028e3 Bug 1385057: Remove most code for handling unpacked side-loaded extensions. r=aswan,keeler
MozReview-Commit-ID: H4cSRBws4Ml

--HG--
extra : rebase_source : ddddef92344b6414ae4e5635b9841fcc274dfca9
2018-05-09 16:04:04 -07:00
Margareta Eliza Balazs 4f9a2ba08e Merge inbound to mozilla-central. a=merge 2018-05-11 12:36:02 +03:00
J.C. Jones 4139925b80 Bug 1441914 - Make security.pki.distrust_ca_policy a bitmask r=fkiefer r=keeler
Per Bug 1437754 comment 10, the pref security.pki.distrust_ca_policy makes more
sense as a bitmask than a state. To permit future nuance, let's go ahead and do
that before people start implementing atop Bug 1456112.

This does permit both 0b10 and 0b11 to enable the functionality for Firefox 63.

--HG--
extra : transplant_source : %84%AF%89%E0%89dT%01%10%84%A0%3B%A5%28%2A%D3%E1%B0%0D%E7
2018-05-07 15:46:22 -07:00
David Keeler 6499399d3c bug 1427248 - avoid changing certificate trust in nsNSSComponent initialization r=fkiefer,jcj
If a user has set a master password on their NSS DB(s), when we try to change
the trust of a certificate, we may have to authenticate to the DB. This involves
bringing up a dialog box, executing javascript, spinning the event loop, etc.
In some cases (particularly when antivirus software has injected code into
Firefox), this can cause the nsNSSComponent to be initialized if it hasn't
already been. So, it's a really, really bad idea to attempt to change the trust
of a certificate while we're initializing nsNSSComponent, because this results
in a recursive component dependency and everything breaks. To get around this,
if we need to load 3rd party roots (e.g. enterprise roots or the family safety
root), we defer any trust changes to a later event loop tick. In theory this
could cause verification failures early in startup. We'll have to see if this
is an issue in practice.

MozReview-Commit-ID: FvjHP5dTmpP

--HG--
extra : rebase_source : 73d39788ce39adcbe01c89867061f64d05a3876b
2018-05-07 17:05:30 -07:00
Coroiu Cristina 683720f5ee Backed out changeset 0693ec09dd68 (bug 1427248) for bustage at build/src/security/manager/ssl/nsNSSComponent.cpp on a CLOSED TREE 2018-05-10 23:32:46 +03:00
David Keeler 65635d2855 bug 1427248 - avoid changing certificate trust in nsNSSComponent initialization r=fkiefer,jcj
If a user has set a master password on their NSS DB(s), when we try to change
the trust of a certificate, we may have to authenticate to the DB. This involves
bringing up a dialog box, executing javascript, spinning the event loop, etc.
In some cases (particularly when antivirus software has injected code into
Firefox), this can cause the nsNSSComponent to be initialized if it hasn't
already been. So, it's a really, really bad idea to attempt to change the trust
of a certificate while we're initializing nsNSSComponent, because this results
in a recursive component dependency and everything breaks. To get around this,
if we need to load 3rd party roots (e.g. enterprise roots or the family safety
root), we defer any trust changes to a later event loop tick. In theory this
could cause verification failures early in startup. We'll have to see if this
is an issue in practice.

MozReview-Commit-ID: FvjHP5dTmpP

--HG--
extra : rebase_source : ad0fb83a0de3632e3a967e91aec3d8070b22dedc
2018-05-07 17:05:30 -07:00
ffxbld 7c7bbfe6e0 No bug, Automated HSTS preload list update from task XSqPd8faStCdsylVmzvQ6w
Summary:
No bug, Automated HPKP preload list update from task XSqPd8faStCdsylVmzvQ6w

No bug, Automated blocklist update from task XSqPd8faStCdsylVmzvQ6w

Reviewers: sfraser, aki

Reviewed By: sfraser

Differential Revision: https://phabricator.services.mozilla.com/D1256

--HG--
extra : rebase_source : 855e19990c75e2613bd311976297fb6513e02b94
2018-05-10 12:14:28 +01:00
Csoregi Natalia f034c0ab5d Merge mozilla-central to inbound. a=merge CLOSED TREE 2018-05-10 12:52:31 +03:00
David Keeler 3b971d708e bug 1460312 - cancel the timeout timer in OCSP request implementation r=jcj
Bug 1456489 cleaned up our OCSP request implementation a bit. One simplification
it made was to not cancel the timeout timer. It turns out that if we don't, the
OCSPRequest that constitutes the timeout callback's closure might not be valid
if the request has completed (because the timer doesn't own a strong reference
to it). The fix is simple: cancel the timer when the request completes. Note
that we don't have to do the reverse because necko has a strong reference to the
request.

MozReview-Commit-ID: 2WHFLAcGBAw

--HG--
extra : rebase_source : c4216f6792c1d62cbd046b1b3802226c51fbe8af
2018-05-09 10:06:49 -07:00
David Keeler e218ab3e3b bug 1460350 - re-land bug 1415991 (remove support for verifying signed unpacked add-ons) r=kmag
(Backed out changeset 6bbf8dc0b86e (which was a backout of changeset 0a5795108e0a))

MozReview-Commit-ID: EZFn7dLBcdh

--HG--
extra : rebase_source : 8fac1e33a7f108a248ecde35779b2c63ce7d9172
2018-05-09 10:19:37 -07:00
Kris Maglione 01c298aca6 Bug 1460092: Add ESLint rule to enforce use of ChromeUtils.generateQI. r=Gijs
Also fixes existing code which fails the rule.

MozReview-Commit-ID: CkLFgsspGMU

--HG--
extra : rebase_source : 86a43837659aa2ad83a87eab53b7aa8d39ccf55b
2018-05-08 18:36:22 -07:00
David Keeler 6ea4fb08d4 bug 1456489 - prevent making OCSP requests on the main thread r=fkiefer,jcj
OCSP requests cannot be performed on the main thread. If we were to wait for a
response from the network, we would be blocking the main thread for an
unnaceptably long time. If we were to spin the event loop while waiting (which
is what we do currently), other parts of the code that assume this will never
happen (which is essentially all of them) can break.

As of bug 867473, no certificate verification happens on the main thread, so no
OCSP requests happen on the main thread. Given this, we can go ahead and
prohibit such requests.

Incidentally, this gives us an opportunity to improve the current OCSP
implementation, which has a few drawbacks (the largest of which is that it's
unclear that its ownership model is implemented correctly).

This also removes OCSP GET support. Due to recent OCSP server implementations
(namely, the ability to cache OCSP POST request responses), OCSP GET is not a
compelling technology to pursue. Furthermore, continued support presents a
maintenance burden.

MozReview-Commit-ID: 4ACDY09nCBA

--HG--
extra : rebase_source : 072564adf1836720e147b8250afca7cebe4dbf62
2018-04-23 18:09:35 +02:00
David Keeler 6da3ace3da bug 686149 - improve PKCS7 certificate export to not use legacy path building r=fkiefer
MozReview-Commit-ID: 2U4J8uUlvaN

--HG--
extra : rebase_source : c416a552e31a6ef38a5d394374e212f00210b334
2018-05-02 10:22:58 -07:00
arthur.iakab f2042a4c1f Merge inbound to mozilla-central a=merge 2018-05-08 15:42:06 +03:00
J.C. Jones 8d99d56270 Bug 1456112 - Add a pref to implement the last Symantec Distrust step r=keeler
This adds another preference (DistrustSymantecRootsRegardlessOfDate == 2) that
stops permitting certificates issued after 1 June 2016, and updates the test to
check it.

--HG--
extra : transplant_source : %F1%DE%16m%F2%DD%A8Ei%EF%B4%CAo%BF%8D%A6%A6%5E%D4%89
2018-05-04 09:34:45 -07:00
David Keeler 999c7366ef bug 1346297 - remove expired family safety telemetry probe r=jcj
MozReview-Commit-ID: BCc5Fa9jWJ2

--HG--
extra : rebase_source : fa965818e96fae6f2c23d33c9bcf6cb224b7935b
extra : amend_source : a1c08417b0a5f3b8de4c5b2025c559111e6597c2
2018-05-03 12:44:14 -07:00
ffxbld ab372e51b4 No bug, Automated HSTS preload list update from task AUKIqPPXTDSaxMvWC7BXWg
Summary: No bug, Automated HPKP preload list update from task AUKIqPPXTDSaxMvWC7BXWg

Reviewers: sfraser

Reviewed By: sfraser

Differential Revision: https://phabricator.services.mozilla.com/D1117

--HG--
extra : rebase_source : d68fc2b597321f42c66b798db4f8f9cf0b209a73
2018-05-03 12:44:37 +01:00