Security/Reviews/Android Service Installer: Difference between revisions

From MozillaWiki
Jump to navigation Jump to search
(Created page with "{{SecReviewInfo |SecReview name=Android Service Based Installer }} {{SecReview}} {{SecReviewActionStatus |SecReview action item status=None }}")
 
No edit summary
 
(One intermediate revision by the same user not shown)
Line 1: Line 1:
{{SecReviewInfo
{{SecReviewInfo
|SecReview name=Android Service Based Installer
|SecReview name=Android Service Based Installer
|SecReview target=<bugzilla>
{
"id":"786380"
}
</bugzilla>
}}
{{SecReview
|SecReview feature goal=*New updater for Android based Firefox
*The old updater was hooked into  the normal native update system - some C++ and JS components (all the  same infrastructure, but custom code to apply the update) - big drawback  - we couldn't ever check or apply an update without the app running -  This isn't great if nightly isn't your default browser (you might not  run it much).
**we couldn't download in the backround with the old updater
*What changes between nightly / aurora and beta / release? We still send update pings to get ADUs - mozupdater = 0 in config files.
*If mozupdater is disabled, the new updater won't be running either - so there are changes that could plausibly affect beta / release but it's unlikely.
*Releng
*SSL cert checking  - relies on underlying android features. No authenticity check on the package - we're relying on a hash and a valid SSL cert to make sure everything else is OK.
|SecReview threats considered=*We've had issues reported for the su issue on rooted phones... No longer a problem - all removed now.
|SecReview threat brainstorming=*Can we think about scenarios where people aren't using Play and aren't getting updates?
**Can we capture this information?
**Do we want to solve this problem? (maybe we can't get this information)
* How about package signing?
}}
}}
{{SecReview}}
{{SecReviewActionStatus
{{SecReviewActionStatus
|SecReview action item status=None
|SecReview action item status=In Progress
|SecReview action items=* snorp::Check to see if the app store is installed in the device - warn the user if they don't have the ability to get updates::
<bugzilla>
{
"id":"794963"
</bugzilla>
}}
}}

Latest revision as of 15:40, 27 September 2012

Please use "Edit with form" above to edit this page.

Item Reviewed

Android Service Based Installer
Target
   
     Full Query    
   
ID Summary Priority Status
786380 Write new Android service-based updater -- VERIFIED

1 Total; 0 Open (0%); 0 Resolved (0%); 1 Verified (100%);

{{#set:SecReview name=Android Service Based Installer

|SecReview target=

Full Query
ID Summary Priority Status
786380 Write new Android service-based updater -- VERIFIED

1 Total; 0 Open (0%); 0 Resolved (0%); 1 Verified (100%);

}}

Introduce the Feature

Goal of Feature, what is trying to be achieved (problem solved, use cases, etc)

  • New updater for Android based Firefox
  • The old updater was hooked into the normal native update system - some C++ and JS components (all the same infrastructure, but custom code to apply the update) - big drawback - we couldn't ever check or apply an update without the app running - This isn't great if nightly isn't your default browser (you might not run it much).
    • we couldn't download in the backround with the old updater
  • What changes between nightly / aurora and beta / release? We still send update pings to get ADUs - mozupdater = 0 in config files.
  • If mozupdater is disabled, the new updater won't be running either - so there are changes that could plausibly affect beta / release but it's unlikely.
  • Releng
  • SSL cert checking - relies on underlying android features. No authenticity check on the package - we're relying on a hash and a valid SSL cert to make sure everything else is OK.

What solutions/approaches were considered other than the proposed solution?

`

Why was this solution chosen?

`

Any security threats already considered in the design and why?

  • We've had issues reported for the su issue on rooted phones... No longer a problem - all removed now.

Threat Brainstorming

  • Can we think about scenarios where people aren't using Play and aren't getting updates?
    • Can we capture this information?
    • Do we want to solve this problem? (maybe we can't get this information)
  • How about package signing?

{{#set: SecReview feature goal=*New updater for Android based Firefox

  • The old updater was hooked into the normal native update system - some C++ and JS components (all the same infrastructure, but custom code to apply the update) - big drawback - we couldn't ever check or apply an update without the app running - This isn't great if nightly isn't your default browser (you might not run it much).
    • we couldn't download in the backround with the old updater
  • What changes between nightly / aurora and beta / release? We still send update pings to get ADUs - mozupdater = 0 in config files.
  • If mozupdater is disabled, the new updater won't be running either - so there are changes that could plausibly affect beta / release but it's unlikely.
  • Releng
  • SSL cert checking - relies on underlying android features. No authenticity check on the package - we're relying on a hash and a valid SSL cert to make sure everything else is OK.

|SecReview alt solutions=' |SecReview solution chosen=' |SecReview threats considered=*We've had issues reported for the su issue on rooted phones... No longer a problem - all removed now. |SecReview threat brainstorming=*Can we think about scenarios where people aren't using Play and aren't getting updates?

    • Can we capture this information?
    • Do we want to solve this problem? (maybe we can't get this information)
  • How about package signing?

}}

Action Items

Action Item Status In Progress
Release Target `
Action Items
* snorp::Check to see if the app store is installed in the device - warn the user if they don't have the ability to get updates::

Bugzilla query error

Query options must be valid JSON.1

{{#set:|SecReview action item status=In Progress

|Feature version=` |SecReview action items=* snorp::Check to see if the app store is installed in the device - warn the user if they don't have the ability to get updates::

Bugzilla query error

Query options must be valid JSON.1

}}