I am appalled and dismayed by what has happened to Firefox in the past years. It has gone from being the obviously best browser to being unpleasant -- and now, sufddenly, even dangerous -- to use.
We use Firefox for two main reasons, it's Open Source, which give me more confidence that it can be trusted, and it has the NoScript Add-on, which adds security to browsing sessions. What just happened with NoScript is, in my judgment, a security *emergency*, not a mere security bug. Security bugs in a new version of software can often be avoided by reverting to the previous version. That does not seem to apply here, as it is not a bug in a new version of Firefox, but a bug in the Mozilla infrastructure. On Saturday May 4, it was stated that Mozilla is working on a fix. However, my running instance of NoScript was disabled on Sunday May 5. This indicates that Mozilla does not view this as an emergency, but as an annoyance. It is hard to think of any analogs to this situation: it's on the order of a Windows Update that cripples the OS. Granted, Mozilla then published a workaround that suggested setting "xpinstall.signatures.required" to "false" in "about:config", but that hardly compensates for the fact that suddenly and without warning *all* Javascript is enabled in active browsing sessions, putting private information at risk. (And users of the Firefox derivative TOR might possibly even have their lives endangered.) Also, in my opinion, the requirement that Add-ons be signed by Mozilla is a violation of the intent of Open Source software if not of the details of the MPL (and other Open Source licenses). Because it disallows arbitrary Add-ons, it removes final control of Firefox from the hands of the user and places it in the hands of Mozilla. It also makes Firefox unsuitable for organizations which wish to develop proprietary Add-ons which they either do not want revealed to Mozilla or perhaps even are legally forbidden to reveal them. (And the idea that nightly builds or local builds could be used is usually impractical or even legally forbidden for such organizations.) A much better approach would be something along the lines of the way Firefox handles normal HTTPS certificate problems, such as expired, or no chain of trust. Running or installing an Add-on which is not, or no longer, "properly" signed should give rise to a stern warning, and then allow the user to proceed to use the Add-on temporarily or even add a permanent exception. And, since some organizations might not want users to run unsigned Add-ons, there should be a "policy" mechanism to prevent that. In conjunction with this, there should be a way to allow local signing of Add-ons private to the organization. (The Firefox or OS certificate mechanism must already handle this sort of thing.) P.S. The details reported in the article at https://www.zdnet.com/article/mozilla-announces-ban-on-firefox-extensions-containing-obfuscated-code/ suggest that Mozilla's latest policies are moving further away from allowing the user or organization to control their own browser -- all in the name of "security" of course. ---------------- On Sat, 4 May 2019 09:29:22 +0200 Sylvestre Ledru <[email protected]> wrote: > Hello, > > Le 04/05/2019 à 03:15, Stephen Carville (Mozilla List) a écrit : > > What the heck just happened? I was informed in the middle of a > > session that that No Script and Blur are no longer compatible with > > Firefox. Now all my add-ons except Web Developer are disabled. > > This is probably this issue > https://bugzilla.mozilla.org/show_bug.cgi?id=1548973 and we are > working on a fix. > > Sylvestre _______________________________________________ Enterprise mailing list [email protected] https://mail.mozilla.org/listinfo/enterprise To unsubscribe from this list, please visit https://mail.mozilla.org/listinfo/enterprise or send an email to [email protected] with a subject of "unsubscribe"

