Security/Sandbox/2017-07-20

From MozillaWiki
Jump to navigation Jump to search
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.

« previous week | index | next week »

haik

  • bug 1380690 - [Mac] Automatically determine the repo dir so that MOZ_DEVELOPER_REPO_DIR isn't needed
    • Posted for review, :gps recommending a different approach, under discussion
    • Issues with env vars with marionette tests, web-platform-tests
  • bug 1376496 - Follow-up fixes to moz-extension remoting support in 1334550
    • Posted for review
  • bug 1380141 - Running Talos locally on OS X results in crashed tabs
    • Landed
  • bug 1380132 - SSL info in url bar totally broken on mac nightlies due to sandboxing changes
    • Landed
  • bug 1379906 - Assertion and crash during startup when running Marionette tests
    • Landed

Alex_Gaynor

bobowen

  • bug 1366694 - Enable Windows level 3 content process sandbox by default on Nightly - thanks to aklotz's fix.
    • On inbound
  • bug 1378377 - file:// URI sub-resources within CAPS whitelisted http pages will fail to load with read sandboxing
    • Landed
  • bug 1379951 - a11y crashes [@ GetProxiedAccessibleInSubtree ]
    • original problem seemed to be fixed, but there's another crash - I think it might be an existing issue, perhaps retriggered by level 3.
  • bug 1352192 - Crash in mozilla::SandboxBroker::SetSecurityLevelForContentProcess with "SetIntegrityLevel should never fail, what happened?"
    • Resurfaced due to sandbox lib change - updater issue with mismatching EXE/DLL versions still outstanding.
  • bug 1314801 - Enable PROCESS_MITIGATION_IMAGE_LOAD_POLICY - depends on
    • bug 1380609 - Make Win10 SDK (minimum v10.0.10586.0) required for building Firefox
    • bug 1356493 - Cannot build Nightly with Windows 10 SDK (10.0.15063.0) due to "ERROR: Cannot find mt"
      • Landed
    • bug 1364137 - Windows SDK directory not detected properly on 64-bit python
      • Patch up for review

jld

  • Reviewed bug 1308400 (Linux broker, deny read, symlinks, etc.)
    • But on bug 1380690 I just suggested that if we didn't have the test symlinks we maybe could rip it all out and do something simpler….
  • Requested uplift in bug 1372428
  • Reviewed MOZ_WIDGET_GONK removals in bug 1382099; filed or update followup bugs
    • bug 1316153 is IPC but vaguely related, because we might wind up passing sandbox settings in that enum…
    • Considering removing the ifdef ANDROID stuff, too.... (need to file bug if we don't have one)
  • Filed bug 1381653 to get full rejected syscall telemetry in a usable form
  • Landed bug 1376653 - musl libc stuff
  • Investigated “chaos mode” interactions in bug 1378944 - not sure what we should do
  • (Not sandboxing: finished revising DTLS testing patch; awaiting re-review)
  • Landed bug 1376910 - SysV IPC removal
  • Triaged SIGSYS crashes & filed some bugs; don't understand how most of these things can even get to bind()…
    • Considered remoting the proxy service, but it's annoying.
    • There's a bunch that look like pre-1372428 Nightly + new plugin; sigh.

handyman

  • bug 1382251 - Brokering https in NPAPI process
    • Writing a "mostly automatic" brokering API to simply as we'll be brokering many calls (vs Chromium)
    • Limiting to SChannel usage (vs all networking)
    • Remaining concern: InitializeSecurityContext
    • Need to figure out NPAPI failure cleanup (avoid leaving objects in brokering proc)
    • Currently still using main actor but this will change

Round Table

  • Requirement to use MOZ_DEVELOPER_REPO_DIR for Linux builds.
  • GConf?
    • Officially EoL
    • Hasn't been updated since 2013
    • Do we still need to support it? (For WebRTC proxy lookup, or in general)
      • We're not testing it on CI, so de facto it's not Tier 1
    • Telemetry would be nice, but we may already have broken it (for WebRTC proxy lookup) in 56.
  • dev-platform follow up email announcing Windows l3 landed \o/