Changes

Jump to: navigation, search

Windows Service Silent Update

486 bytes removed, 17:14, 6 January 2012
Spoofing the wrong session ID
To ensure we execute our own binary, we will verify the signature of updater.exe to make sure it is signed by us.
Currently we do not sign Nightly builds (I don't think Aurora either), we would like to have this fixed so that the udpate process gets more testing before this hits mozilla-central.
 
== Spoofing the wrong session ID ==
 
All commands will be executed in the context of session 0. Only the post update process and callback will be executed with the user session ID. These commands will not be executed by the service though so there is no chance of spoofing the session ID via work item file.
 
The session ID is not included in the work item files because a limited user account could launch a valid Firefox.exe into an admin session with the URL of a dangerous page.
== Applying updates faster ==
Confirm
394
edits

Navigation menu