On Saturday 05 April 2014 22:09:02 Alex Jordan wrote:
> On Apr 5, 2014 6:12 PM, "Kradorex Xeron" <[email protected]> wrote:
> > At this point, add-ons are no longer sufficient to protect users, this
> 
> needs to
> 
> > be a forced element into the core of browsers. Plugins will never have the
> > level of hook access that that is needed and there will always be holes as
> > these add-ons over-ride specific activities, they do not set the default
> > actions by the core Javascript engine and not everything is hookable.
> 
> This rings false to me. I cannot see anything here that isn't covered by
> addons like NoScript and RequestPolicy. For any other browser, this might
> be true, but in my experience Firefox's extension system is extremely
> robust.

However, these do not set the default of a normal installation nor are they 
available by default, a user explicitly has to install these add-ons to obtain 
functionality that should be available as a core part of a browser.

Consider what would happen if you needed an "Add-on" to your operating system 
to set filesystem permissions or to limit what users could do on that computer 
system. Most people wouldn't be able to secure their data and prevent the 
other users on that computer from accessing their data without installing 
anything. How does this relate? Easy: browsers are practically becoming an 
operating environment of their own with the level of code now running in their 
contexts and there is no way without blocking the whole browser to "firewall" 
specific aspects of it correctly as everything runs under the browser process. 

Most add-ons work by intercepting the various hook points, they do not 
fundamentally change how the browser is to work nor expressly disable aspects 
of the Javascript engine nor control how the engine may respond to calls that 
the extensions don't (or can't) hook, they simply get the call before it 
reaches the undesired point of the engine which still leaves potential attack 
surfaces to be quite large.

One SIGNIFICANT example of this is how Javascript can leverage a Flash plugin 
to enumerate the fonts that computer system has installed. Many extensions 
cannot fix this as it  and it requires relying upon Flash's mms.cfg to set 
'DisableDeviceFontEnumeration'. The browser should be able to effectively 
disable that type of communication.

Security on browsers shouldn't be an item of "extensibility", if APIs exist 
it's just a matter of providing a configuration interface as a core asset, even 
if tucked away on the "Advanced" tab sheet of the preferences. If it requires 
separate code of an extension to do the processing and logic of basic resource 
access security (think: ACLs), then the browser itself is insecure.

The moment security becomes a matter of extensions and so forth is the moment 
security is largely forgotten by most people or it is unknown that specific 
asset can be restricted. Most users I talk to don't even know Firefox can have 
extensions installed to secure it, most think the extensions are just toolbars 
or buttons for "techy" types and that there's no extensions that would be 
pertinent to them.

Security is a layered element, if the browser itself lacks security internally 
and permits a javascript engine to run without basic accountability without 
extensions, then the browser itself is insecure.

Operating systems these days all have their own firewalls INTEGRATED due to the 
fact it was deemed needed. Prior to that operating systems needed permissions, 
so they were implemented. Now it is deemed needed to integrate security into 
the core of browsers because they too are an operating environment now where 
the browser executable is the kernel and the executable code originates from 
the Internet.

Thanks,
-- 
Kradorex Xeron <[email protected]>
Founder, Executive Director
Digibase Operations, Research and Development

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to