Re: Firefox addon signing

2015-08-30 Thread Seth Johnson
There can be alternative authorities, and you could opt to choose them
nstead.  It's really a question of having the option of not relying on
Mozilla's decisions.  It's not a choice of either each individual's
own keys or the original authority who's the one true authority.
Self-signing means choosing who to trust.

The alternative authorities become explicit targets from the
perspective of Mozilla, of course.  So political commitment is
entailed.

It should be noted that this distinction is important: the legal
tradition does NOT hold that the only valid authority regarding what
you can do with a work is the author.  There's lots you can do that
the author doesn't authorize; and authors only have specific statutory
exclusive rights.

Among other things, this reflects a respect for the fact that
information as such is not subject to copyright; just the originality
of a work is.  However, we are at a phase where an attempt to
institute enforcement of the maximalist intepretation of copyright is
imminent.


Seth


On Wed, Aug 26, 2015 at 8:21 PM, Solomon Peachy pi...@shaftnet.org wrote:
 On Wed, Aug 26, 2015 at 05:53:36PM +0200, drago01 wrote:
 A better solution would be to add a mechanism that allows you to use
 your own signing keys.
 That way you have both 1) install self built extensions and 2) the
 added security.

 ..and (3) a way for malware to install its own key, rendering (2) moot.

  - Solomon
 --
 Solomon Peachy pizza at shaftnet dot org
 Delray Beach, FL  ^^ (email/xmpp) ^^
 Quidquid latine dictum sit, altum viditur.

 --
 devel mailing list
 devel@lists.fedoraproject.org
 https://admin.fedoraproject.org/mailman/listinfo/devel
 Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Firefox addon signing

2015-08-29 Thread Dominik 'Rathann' Mierzejewski
On Friday, 28 August 2015 at 11:24, Martin Stransky wrote:
 On 08/28/2015 11:00 AM, Alexander Ploumistos wrote:
 On Fri, Aug 28, 2015 at 10:18 AM, Martin Stransky stran...@redhat.com 
 wrote:
 Can we ship addons which are already signed by Mozilla? Or does Fedora
 packager modify them somehow?
 
 It seems that even when the source is an xpi file, rpm treats it like
 any other source package and its contents can be patched. I don't know
 how that works, because signed addons contain a manifest file with md5
 and sha1 checksums for all included files and I would expect that
 modifications to any of them would cause the addon to get disabled.
 Obviously we need input from a packager involved with the process.
 Asking legal couldn't hurt either.
 
 Thanks for the info. Actually is there any reason why Fedora packager would
 need to modify the original extension?

Yes. Bundled JavaScript libraries are one example. Fedora-specific
preferences would be another.

Regards,
Dominik
-- 
Fedora http://fedoraproject.org/wiki/User:Rathann
RPMFusion http://rpmfusion.org
Faith manages.
-- Delenn to Lennier in Babylon 5:Confessions and Lamentations
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Firefox addon signing

2015-08-28 Thread Martin Stransky

On 08/27/2015 04:40 PM, Alexander Ploumistos wrote:

Aren't the addons that we ship in fedora a bunch of text files zipped
in an xpi archive? It is kind of awkward to send them back and forth,
but if there are no other binaries, does it go against a particular
policy?

Or we could decide that we trust Mozilla's code review process and
drop packaging addons altogether, as was suggested. At least the users
will receive updates faster.


Can we ship addons which are already signed by Mozilla? Or does Fedora 
packager modify them somehow?


ma.
--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Firefox addon signing

2015-08-28 Thread Björn Persson
Dennis Gilmore wrote:
 It sounds like the path mozilla is taking will likely prevent us
 shipping addons in Fedora.  That of course is their right to pursue
 that.

As far as I can find out there are no plans to enforce this centralized
signing in Seamonkey, and I suppose the Icecat folks are free to choose
whether to do it or not.

I wonder if there will be any packagers interested in maintaining
extensions for Seamonkey and Icecat if packaged extensions will no
longer work in Firefox.

Björn Persson


pgpdW7GNLX3ay.pgp
Description: OpenPGP digital signatur
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Firefox addon signing

2015-08-28 Thread Alexander Ploumistos
On Fri, Aug 28, 2015 at 12:24 PM, Martin Stransky stran...@redhat.com wrote:
 Thanks for the info. Actually is there any reason why Fedora packager would
 need to modify the original extension?


That depends on the extension and its particulars. For example,
adblock plus has an extortion-like scheme in place and it allows
certain ads from certain companies that have paid them good money for
their service. This patch blocks those ads as well:
http://pkgs.fedoraproject.org/cgit/mozilla-adblockplus.git/tree/disable-safeads.patch
I didn't care to check if such a modification is permitted by their TOS.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Firefox addon signing

2015-08-28 Thread Martin Stransky

On 08/28/2015 11:00 AM, Alexander Ploumistos wrote:

On Fri, Aug 28, 2015 at 10:18 AM, Martin Stransky stran...@redhat.com wrote:

Can we ship addons which are already signed by Mozilla? Or does Fedora
packager modify them somehow?


It seems that even when the source is an xpi file, rpm treats it like
any other source package and its contents can be patched. I don't know
how that works, because signed addons contain a manifest file with md5
and sha1 checksums for all included files and I would expect that
modifications to any of them would cause the addon to get disabled.
Obviously we need input from a packager involved with the process.
Asking legal couldn't hurt either.


Thanks for the info. Actually is there any reason why Fedora packager 
would need to modify the original extension?


ma.


I think that these are all the addons that we ship and must be signed
(dictionaries, themes and plugins are exempt from the signing
process):
http://pkgs.fedoraproject.org/cgit/firefox-esteidpkcs11loader.git/
http://pkgs.fedoraproject.org/cgit/mozilla-adblockplus.git/
http://pkgs.fedoraproject.org/cgit/mozilla-https-everywhere.git/
http://pkgs.fedoraproject.org/cgit/mozilla-noscript.git/
http://pkgs.fedoraproject.org/cgit/mozilla-requestpolicy.git/
http://pkgs.fedoraproject.org/cgit/spice-xpi.git/



--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Firefox addon signing

2015-08-28 Thread Martin Stransky

On 08/28/2015 11:34 AM, Alexander Ploumistos wrote:

On Fri, Aug 28, 2015 at 12:24 PM, Martin Stransky stran...@redhat.com wrote:

Thanks for the info. Actually is there any reason why Fedora packager would
need to modify the original extension?



That depends on the extension and its particulars. For example,
adblock plus has an extortion-like scheme in place and it allows
certain ads from certain companies that have paid them good money for
their service. This patch blocks those ads as well:
http://pkgs.fedoraproject.org/cgit/mozilla-adblockplus.git/tree/disable-safeads.patch
I didn't care to check if such a modification is permitted by their TOS.



Hm, is such change actually allowed by AddBlock authors? It looks a bit 
controversial to me. The extension signing may also help users to make 
sure they have the original extensions from their authors.


ma.
--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Firefox addon signing

2015-08-28 Thread Reindl Harald


Am 28.08.2015 um 13:39 schrieb Emmanuel Seyman:

* Martin Stransky [28/08/2015 12:21] :


On 08/28/2015 11:40 AM, Emmanuel Seyman wrote:

* Martin Stransky [28/08/2015 11:24] :


Thanks for the info. Actually is there any reason why Fedora packager would
need to modify the original extension?


If there is a security issue with an extension, the packager might well
want to distribute a patched version while waiting for a new release.


That's possible but the update process in Fedora is recently too slow. Even
Firefox security updates sits in testing for week.


I'm not seeing this, at least as a general rule. Most firefox updates seem
to be pushed within a day


guess you can trust the maintainer of the firefox package when he says 
it's slow :-) within a day is mostly impossible because of testing, 
karma and the timeframes for pushes


within a day is only possible if you download the build manually from koji



signature.asc
Description: OpenPGP digital signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Firefox addon signing

2015-08-28 Thread Alexander Ploumistos
On Fri, Aug 28, 2015 at 10:18 AM, Martin Stransky stran...@redhat.com wrote:
 Can we ship addons which are already signed by Mozilla? Or does Fedora
 packager modify them somehow?

It seems that even when the source is an xpi file, rpm treats it like
any other source package and its contents can be patched. I don't know
how that works, because signed addons contain a manifest file with md5
and sha1 checksums for all included files and I would expect that
modifications to any of them would cause the addon to get disabled.
Obviously we need input from a packager involved with the process.
Asking legal couldn't hurt either.

I think that these are all the addons that we ship and must be signed
(dictionaries, themes and plugins are exempt from the signing
process):
http://pkgs.fedoraproject.org/cgit/firefox-esteidpkcs11loader.git/
http://pkgs.fedoraproject.org/cgit/mozilla-adblockplus.git/
http://pkgs.fedoraproject.org/cgit/mozilla-https-everywhere.git/
http://pkgs.fedoraproject.org/cgit/mozilla-noscript.git/
http://pkgs.fedoraproject.org/cgit/mozilla-requestpolicy.git/
http://pkgs.fedoraproject.org/cgit/spice-xpi.git/
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Firefox addon signing

2015-08-28 Thread Emmanuel Seyman
* Martin Stransky [28/08/2015 12:21] :

 On 08/28/2015 11:40 AM, Emmanuel Seyman wrote:
 * Martin Stransky [28/08/2015 11:24] :
 
 Thanks for the info. Actually is there any reason why Fedora packager would
 need to modify the original extension?
 
 If there is a security issue with an extension, the packager might well
 want to distribute a patched version while waiting for a new release.
 
 That's possible but the update process in Fedora is recently too slow. Even
 Firefox security updates sits in testing for week.

I'm not seeing this, at least as a general rule. Most firefox updates seem
to be pushed within a day.

I bet that official
 update from AMO (mozilla extension site) will be way faster that Fedora
 update.

I suspect this will vary greatly depending on the maintainer and the
security issue.

Emmanuel
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Firefox addon signing

2015-08-28 Thread Björn Persson
Martin Stransky stran...@redhat.com wrote:
 On 08/28/2015 11:34 AM, Alexander Ploumistos wrote:
  adblock plus [...] allows
  certain ads from certain companies [...]
  This patch blocks those ads as well:
  http://pkgs.fedoraproject.org/cgit/mozilla-adblockplus.git/tree/disable-safeads.patch
  I didn't care to check if such a modification is permitted by their TOS.
 
 Hm, is such change actually allowed by AddBlock authors?

If it weren't allowed, then Adblock Plus would be unfree and therefore
not allowed in Fedora. On the front page at https://adblockplus.org/ it
says It's free! (GPLv3), so that would be contradictory.

Björn Persson


pgpM8ycA6Yy19.pgp
Description: OpenPGP digital signatur
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Firefox addon signing

2015-08-28 Thread Emmanuel Seyman
* Martin Stransky [28/08/2015 11:24] :

 Thanks for the info. Actually is there any reason why Fedora packager would
 need to modify the original extension?

If there is a security issue with an extension, the packager might well
want to distribute a patched version while waiting for a new release.

Emmanuel
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Firefox addon signing

2015-08-28 Thread Martin Stransky

On 08/28/2015 11:40 AM, Emmanuel Seyman wrote:

* Martin Stransky [28/08/2015 11:24] :


Thanks for the info. Actually is there any reason why Fedora packager would
need to modify the original extension?


If there is a security issue with an extension, the packager might well
want to distribute a patched version while waiting for a new release.


That's possible but the update process in Fedora is recently too slow. 
Even Firefox security updates sits in testing for week. I bet that 
official update from AMO (mozilla extension site) will be way faster 
that Fedora update.


ma.
--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Firefox addon signing

2015-08-28 Thread Dennis Gilmore
On Friday, August 28, 2015 01:43:08 PM Reindl Harald wrote:
 Am 28.08.2015 um 13:39 schrieb Emmanuel Seyman:
  * Martin Stransky [28/08/2015 12:21] :
  On 08/28/2015 11:40 AM, Emmanuel Seyman wrote:
  * Martin Stransky [28/08/2015 11:24] :
  Thanks for the info. Actually is there any reason why Fedora packager
  would
  need to modify the original extension?
  
  If there is a security issue with an extension, the packager might well
  want to distribute a patched version while waiting for a new release.
  
  That's possible but the update process in Fedora is recently too slow.
  Even
  Firefox security updates sits in testing for week.
  
  I'm not seeing this, at least as a general rule. Most firefox updates seem
  to be pushed within a day
 
 guess you can trust the maintainer of the firefox package when he says
 it's slow :-) within a day is mostly impossible because of testing,
 karma and the timeframes for pushes
 
 within a day is only possible if you download the build manually from koji
the last firefox update was on the mirrors within 5 hours of being built in 
koji

Dennis

signature.asc
Description: This is a digitally signed message part.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Firefox addon signing

2015-08-28 Thread Andrew Lutomirski
On Fri, Aug 28, 2015 at 12:18 AM, Martin Stransky stran...@redhat.com wrote:
 On 08/27/2015 04:40 PM, Alexander Ploumistos wrote:

 Aren't the addons that we ship in fedora a bunch of text files zipped
 in an xpi archive? It is kind of awkward to send them back and forth,
 but if there are no other binaries, does it go against a particular
 policy?

 Or we could decide that we trust Mozilla's code review process and
 drop packaging addons altogether, as was suggested. At least the users
 will receive updates faster.


 Can we ship addons which are already signed by Mozilla? Or does Fedora
 packager modify them somehow?


Another thought: could we ask Mozilla for permission to exempt a
specific directory (e.g. /usr/share/distro-firefox-extensions) from
signature requirements for .xpi files that are owned by root?

After all, anyone who can drop root-owned files in there can just as
easily replace the entire firefox binary.

--Andy
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Firefox addon signing

2015-08-28 Thread Ben Boeckel
On Fri, 28 Aug, 2015 at 09:34:14 GMT, Alexander Ploumistos wrote:
 On Fri, Aug 28, 2015 at 12:24 PM, Martin Stransky stran...@redhat.com wrote:
 Thanks for the info. Actually is there any reason why Fedora packager would
 need to modify the original extension?


 That depends on the extension and its particulars. For example,
 adblock plus has an extortion-like scheme in place and it allows
 certain ads from certain companies that have paid them good money for
 their service. This patch blocks those ads as well:
 http://pkgs.fedoraproject.org/cgit/mozilla-adblockplus.git/tree/disable-safeads.patch
 I didn't care to check if such a modification is permitted by their TOS.

There's Adblock Edge[1] which is a fork without such features. But it
seems they have discontinuted in favor of uBlock Origin[2] (which also
handles the Request Policy plugin; also pretty much discontinued
upstream). Having used all four, uBlock Origin is certainly the best out
of all of them.

--Ben

[1]https://addons.mozilla.org/en-US/firefox/addon/adblock-edge/
[2]https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Firefox addon signing

2015-08-27 Thread Zdenek Kabelac

Dne 27.8.2015 v 16:09 Dennis Gilmore napsal(a):

On Wednesday, August 26, 2015 03:13:08 PM Richard Z wrote:

On Wed, Aug 26, 2015 at 03:12:25PM +0300, Alexander Ploumistos wrote:

Their FAQ is constantly updated:

https://wiki.mozilla.org/Addons/Extension_Signing#FAQ

I'm not sure if there is a valid practical reason to refuse submitting the
addons that we ship to their signing service or if it is against our
policies; at least mozilla-https-everywhere has been signed.


that would work for Fedora - if it can be guaranteed that they sign new
versions quickly. Immagine if one of our plugins had a security hole and
mozilla would need days or weeks to sign it. As far as I can see Fedora
specific extensions would have to be listed which means they would go
through manual code review at mozilla.

We have no real practical way to do this other than package up the addon and
build it as a -unsigned package, then making a separate package that has the
precompiled binary and signed by mozilla and put into the add on package.

It sounds like the path mozilla is taking will likely prevent us shipping
addons in Fedora.  That of course is their right to pursue that.




I'm wondering what is good replacement option - since the amount of troubles 
with Firefox seems to be just scaling up.


The memory usage - is the story for it self - displaying a tab with just our 
bugzilla pages  eats like 6-8M of RAM  - I used to be running full OS with 
this amount of RAM - now it's not enough to render couple lines and color 
boxes and 'couple' KB of text


Keyboard and mouse has weird focus - so often I type in one windows, but 
keyboard input magically work in another window (i.e. Ctrl+T opens new tab in 
second window)


I've no chance to control what is downloaded - I could partially limit thing 
by using plugins - but they eats possibly more RAM, slows FF down (at least by 
FF reporting messages)  and will likely be sooner or later banned.


Lot's of things are hardly reportable.

Chrome is not an option for me - it eats even more RAM and slows my machine 
even more then FF.


So what are the option - if the person want to view Web with all modern 
technologies being supported ?



Zdenek

--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Firefox addon signing

2015-08-27 Thread Alexander Ploumistos
On Thu, Aug 27, 2015 at 5:09 PM, Dennis Gilmore den...@ausil.us wrote:
 We have no real practical way to do this other than package up the addon and
 build it as a -unsigned package, then making a separate package that has the
 precompiled binary and signed by mozilla and put into the add on package.

Aren't the addons that we ship in fedora a bunch of text files zipped
in an xpi archive? It is kind of awkward to send them back and forth,
but if there are no other binaries, does it go against a particular
policy?

Or we could decide that we trust Mozilla's code review process and
drop packaging addons altogether, as was suggested. At least the users
will receive updates faster.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Firefox addon signing

2015-08-27 Thread Dennis Gilmore
On Wednesday, August 26, 2015 03:13:08 PM Richard Z wrote:
 On Wed, Aug 26, 2015 at 03:12:25PM +0300, Alexander Ploumistos wrote:
  Their FAQ is constantly updated:
  
  https://wiki.mozilla.org/Addons/Extension_Signing#FAQ
  
  I'm not sure if there is a valid practical reason to refuse submitting the
  addons that we ship to their signing service or if it is against our
  policies; at least mozilla-https-everywhere has been signed.
 
 that would work for Fedora - if it can be guaranteed that they sign new
 versions quickly. Immagine if one of our plugins had a security hole and
 mozilla would need days or weeks to sign it. As far as I can see Fedora
 specific extensions would have to be listed which means they would go
 through manual code review at mozilla.
We have no real practical way to do this other than package up the addon and 
build it as a -unsigned package, then making a separate package that has the 
precompiled binary and signed by mozilla and put into the add on package.

It sounds like the path mozilla is taking will likely prevent us shipping 
addons in Fedora.  That of course is their right to pursue that.

  Mozilla states that they will be offering an unbranded binary (en_US only)
  for development and testing purposes.
 
 For me this appears the only possibility and I suspect there are more
 Fedora users like me maintaining their own Firefox extensions.
 
 So will we get a firefox-unbranded package?
 
 Richard


signature.asc
Description: This is a digitally signed message part.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Firefox addon signing

2015-08-27 Thread Stephen John Smoogen
On 27 August 2015 at 08:26, Zdenek Kabelac zkabe...@redhat.com wrote:
 Dne 27.8.2015 v 16:09 Dennis Gilmore napsal(a):

 On Wednesday, August 26, 2015 03:13:08 PM Richard Z wrote:

 On Wed, Aug 26, 2015 at 03:12:25PM +0300, Alexander Ploumistos wrote:

 Their FAQ is constantly updated:

 https://wiki.mozilla.org/Addons/Extension_Signing#FAQ

 I'm not sure if there is a valid practical reason to refuse submitting
 the
 addons that we ship to their signing service or if it is against our
 policies; at least mozilla-https-everywhere has been signed.


 that would work for Fedora - if it can be guaranteed that they sign new
 versions quickly. Immagine if one of our plugins had a security hole and
 mozilla would need days or weeks to sign it. As far as I can see Fedora
 specific extensions would have to be listed which means they would go
 through manual code review at mozilla.

 We have no real practical way to do this other than package up the addon
 and
 build it as a -unsigned package, then making a separate package that has
 the
 precompiled binary and signed by mozilla and put into the add on package.

 It sounds like the path mozilla is taking will likely prevent us shipping
 addons in Fedora.  That of course is their right to pursue that.



 I'm wondering what is good replacement option - since the amount of troubles
 with Firefox seems to be just scaling up.

 The memory usage - is the story for it self - displaying a tab with just our
 bugzilla pages  eats like 6-8M of RAM  - I used to be running full OS with
 this amount of RAM - now it's not enough to render couple lines and color
 boxes and 'couple' KB of text

 Keyboard and mouse has weird focus - so often I type in one windows, but
 keyboard input magically work in another window (i.e. Ctrl+T opens new tab
 in second window)

 I've no chance to control what is downloaded - I could partially limit thing
 by using plugins - but they eats possibly more RAM, slows FF down (at least
 by FF reporting messages)  and will likely be sooner or later banned.

 Lot's of things are hardly reportable.

 Chrome is not an option for me - it eats even more RAM and slows my machine
 even more then FF.

 So what are the option - if the person want to view Web with all modern
 technologies being supported ?



You can't have that last part with the first parts. If you require the
'modern' technologies then you have to put up with their RAM/CPU
eating glory.

Or start from scratch and see if you can build a toolkit that does it better.





-- 
Stephen J Smoogen.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Firefox addon signing

2015-08-27 Thread Reindl Harald



Am 27.08.2015 um 16:26 schrieb Zdenek Kabelac:

Chrome is not an option for me - it eats even more RAM and slows my
machine even more then FF.

So what are the option - if the person want to view Web with all modern
technologies being supported ?


simple answer: there is no option, we are in the days of bloatware and 
as long as developers are not forced to work with machoines having only 
1 GB RAM that sadly won't change back to sane development




signature.asc
Description: OpenPGP digital signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Firefox addon signing

2015-08-27 Thread Dennis Gilmore
On Thursday, August 27, 2015 05:40:18 PM Alexander Ploumistos wrote:
 On Thu, Aug 27, 2015 at 5:09 PM, Dennis Gilmore den...@ausil.us wrote:
  We have no real practical way to do this other than package up the addon
  and build it as a -unsigned package, then making a separate package that
  has the precompiled binary and signed by mozilla and put into the add on
  package.
 Aren't the addons that we ship in fedora a bunch of text files zipped
 in an xpi archive? It is kind of awkward to send them back and forth,
 but if there are no other binaries, does it go against a particular
 policy?

I have no idea what they actaully are as I have not looked, but the issues 
from the build perspective is that the builders have extremely limited network 
access, and the buildroot itself has none.  we have no way to do something at 
build time to request mozilla sign the artifacts. so being unable to sign at 
buildtime means we get a rpm with unsigned content. 

we have no way to replace the content in a rpm post build and even if we did I 
would not want to support it as it breaks things like rpm verification and 
build reproducability, though you could update the headers in the rpm so it 
validates.  we would need some kind of audit trail and check to make sure that 
the signed artifact actually matches the unsigned one and was not tampered 
with by mozilla. setting up the full audit trail would take some effort.  It 
is doable just not a simple fix.

 Or we could decide that we trust Mozilla's code review process and
 drop packaging addons altogether, as was suggested. At least the users
 will receive updates faster.

depends on what was pushed to mozilla's addons, It could be possible for 
Fedora to have newer code than whats available from mozilla and vice versa. 
there is nothing today stopping people pulling addons directly from Mozilla 
and never using the version we build

Dennis

signature.asc
Description: This is a digitally signed message part.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Firefox addon signing

2015-08-27 Thread Richard Z
On Thu, Aug 27, 2015 at 02:28:48AM +0200, Reindl Harald wrote:
 
 Am 27.08.2015 um 02:21 schrieb Solomon Peachy:
 On Wed, Aug 26, 2015 at 05:53:36PM +0200, drago01 wrote:
 A better solution would be to add a mechanism that allows you to use
 your own signing keys.
 That way you have both 1) install self built extensions and 2) the
 added security.
 
 ..and (3) a way for malware to install its own key, rendering (2) moot
 
 that would imply that malware running as root and then you have already lost
 the whole game - pretty sure nobody meant your own signing keys writeable
 by the user firefox is running

I suspect even malware with user rights will be able to effectively manipulate
the firefox binary using LD_PRELOAD or many other methods.

Having a working sandbox implementation would improve security much
better.


Richard

-- 
Name and OpenPGP keys available from pgp key servers



pgpyMRCSHlvZV.pgp
Description: PGP signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Firefox addon signing

2015-08-27 Thread Richard Z
On Wed, Feb 11, 2015 at 10:30:11PM -0600, Michael Cronenworth wrote:
 I'm sure those that need to know, know, but for those that haven't heard[1]
 Mozilla's official Firefox build will enforce addons to contain a Mozilla
 signature without any runtime option to disable the check.
 
 Initially this prevents Fedora packaged addons since they are unsigned. The
 Mozilla signing process takes time and can't be part of a package building
 process.
 
 Is Fedora going to get authorization to build Firefox with a runtime disable 
 option?

I have created 
 https://bugzilla.redhat.com/show_bug.cgi?id=1257566


Richard

-- 
Name and OpenPGP keys available from pgp key servers

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Firefox addon signing

2015-08-26 Thread drago01
On Wed, Aug 26, 2015 at 3:13 PM, Richard Z r...@linux-m68k.org wrote:
 On Wed, Aug 26, 2015 at 03:12:25PM +0300, Alexander Ploumistos wrote:
 Their FAQ is constantly updated:

 https://wiki.mozilla.org/Addons/Extension_Signing#FAQ

 I'm not sure if there is a valid practical reason to refuse submitting the
 addons that we ship to their signing service or if it is against our
 policies; at least mozilla-https-everywhere has been signed.

 that would work for Fedora - if it can be guaranteed that they sign new
 versions quickly. Immagine if one of our plugins had a security hole and
 mozilla would need days or weeks to sign it. As far as I can see Fedora
 specific extensions would have to be listed which means they would go
 through manual code review at mozilla.

 Mozilla states that they will be offering an unbranded binary (en_US only)
 for development and testing purposes.

 For me this appears the only possibility and I suspect there are more
 Fedora users like me maintaining their own Firefox extensions.

 So will we get a firefox-unbranded package?

A better solution would be to add a mechanism that allows you to use
your own signing keys.
That way you have both 1) install self built extensions and 2) the
added security.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Firefox addon signing

2015-08-26 Thread Richard Z
On Wed, Aug 26, 2015 at 05:53:36PM +0200, drago01 wrote:
 On Wed, Aug 26, 2015 at 3:13 PM, Richard Z r...@linux-m68k.org wrote:
  On Wed, Aug 26, 2015 at 03:12:25PM +0300, Alexander Ploumistos wrote:
  Their FAQ is constantly updated:
 
  https://wiki.mozilla.org/Addons/Extension_Signing#FAQ
 
  I'm not sure if there is a valid practical reason to refuse submitting the
  addons that we ship to their signing service or if it is against our
  policies; at least mozilla-https-everywhere has been signed.
 
  that would work for Fedora - if it can be guaranteed that they sign new
  versions quickly. Immagine if one of our plugins had a security hole and
  mozilla would need days or weeks to sign it. As far as I can see Fedora
  specific extensions would have to be listed which means they would go
  through manual code review at mozilla.
 
  Mozilla states that they will be offering an unbranded binary (en_US only)
  for development and testing purposes.
 
  For me this appears the only possibility and I suspect there are more
  Fedora users like me maintaining their own Firefox extensions.
 
  So will we get a firefox-unbranded package?
 
 A better solution would be to add a mechanism that allows you to use
 your own signing keys.

which would be possible only with firefox-unbranded unless some wonder
happens.

 That way you have both 1) install self built extensions and 2) the
 added security.

might be a security gain for some people but not for me.

Richard

-- 
Name and OpenPGP keys available from pgp key servers

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Firefox addon signing

2015-08-26 Thread Alexander Ploumistos
Their FAQ is constantly updated:

https://wiki.mozilla.org/Addons/Extension_Signing#FAQ

I'm not sure if there is a valid practical reason to refuse submitting the
addons that we ship to their signing service or if it is against our
policies; at least mozilla-https-everywhere has been signed.

Mozilla states that they will be offering an unbranded binary (en_US only)
for development and testing purposes.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Firefox addon signing

2015-08-26 Thread Richard Z
On Thu, Feb 12, 2015 at 07:07:34PM +0100, Reindl Harald wrote:
 
 Am 12.02.2015 um 18:53 schrieb Simo Sorce:
 Maybe it is only about preventing people from bundling the official
 Firefox version with dodgy add-ons.  Not downright malware, but things
 users may not actually want without realizing it.  The signature
 checking means that those who prepare the downloads can no longer use
 the unmodified upstream binary.  Which in turn might force them not to
 use Mozilla brands.
 
 Maybe this is a bit far-fetched, but after hours of staring at other
 people's code today, it seems pretty reasonable to me.
 
 But what do add-on developers do?  Surely there is a way to disable this
 somehow?
 
 Mozilla stated they will have to use the Developer Version (Aurora was
 the name ?) or the nightlies ...
 
 than Fedora needs to switch to the developer version if that *really* can't
 be disabled via about:config - that is a unacceptable restriction until
 hmtlvalidator, livehttpheaders and friends are available sigend via the
 mozilla page

any news on that on our side? From firefox-devel I gather that the feature
will land exactly as anounced.

There will be no configurable option for the user or sysadmin to allow loading 
of plugins not signed by mozilla - be it Fedora signed plugins or my personal
bunch of homebrown locally built plugins. 

So I think Fedora could provide 2 Firefox packages:
* firefox-official  with all restrictions
* unbranded-firefoxlike-browser which is almost identical but without said
  restrictions

Richard

-- 
Name and OpenPGP keys available from pgp key servers



pgp08yJMS7xHD.pgp
Description: PGP signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Firefox addon signing

2015-08-26 Thread Vít Ondruch
Dne 26.8.2015 v 14:12 Alexander Ploumistos napsal(a):
 Their FAQ is constantly updated:

 https://wiki.mozilla.org/Addons/Extension_Signing#FAQ

 I'm not sure if there is a valid practical reason to refuse submitting
 the addons that we ship to their signing service or if it is against
 our policies; at least mozilla-https-everywhere has been signed.

 Mozilla states that they will be offering an unbranded binary (en_US
 only) for development and testing purposes.



For example, I am using GitHub Extension Installer [1] to install
development versions of several other add-ons directly from GH. I am
afraid this won't be possible anymore.


Vít


[1] https://addons.mozilla.org/cs/firefox/addon/github-extension-installer/
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Firefox addon signing

2015-08-26 Thread Richard Z
On Wed, Aug 26, 2015 at 03:12:25PM +0300, Alexander Ploumistos wrote:
 Their FAQ is constantly updated:
 
 https://wiki.mozilla.org/Addons/Extension_Signing#FAQ
 
 I'm not sure if there is a valid practical reason to refuse submitting the
 addons that we ship to their signing service or if it is against our
 policies; at least mozilla-https-everywhere has been signed.

that would work for Fedora - if it can be guaranteed that they sign new
versions quickly. Immagine if one of our plugins had a security hole and
mozilla would need days or weeks to sign it. As far as I can see Fedora 
specific extensions would have to be listed which means they would go 
through manual code review at mozilla.

 Mozilla states that they will be offering an unbranded binary (en_US only)
 for development and testing purposes.

For me this appears the only possibility and I suspect there are more 
Fedora users like me maintaining their own Firefox extensions. 

So will we get a firefox-unbranded package?

Richard

-- 
Name and OpenPGP keys available from pgp key servers

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Firefox addon signing

2015-08-26 Thread Solomon Peachy
On Wed, Aug 26, 2015 at 05:53:36PM +0200, drago01 wrote:
 A better solution would be to add a mechanism that allows you to use
 your own signing keys.
 That way you have both 1) install self built extensions and 2) the
 added security.

..and (3) a way for malware to install its own key, rendering (2) moot.

 - Solomon
-- 
Solomon Peachy pizza at shaftnet dot org
Delray Beach, FL  ^^ (email/xmpp) ^^
Quidquid latine dictum sit, altum viditur.


pgpnQYM10XZUi.pgp
Description: PGP signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Firefox addon signing

2015-08-26 Thread Reindl Harald


Am 27.08.2015 um 02:21 schrieb Solomon Peachy:

On Wed, Aug 26, 2015 at 05:53:36PM +0200, drago01 wrote:

A better solution would be to add a mechanism that allows you to use
your own signing keys.
That way you have both 1) install self built extensions and 2) the
added security.


..and (3) a way for malware to install its own key, rendering (2) moot


that would imply that malware running as root and then you have already 
lost the whole game - pretty sure nobody meant your own signing keys 
writeable by the user firefox is running




signature.asc
Description: OpenPGP digital signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Firefox addon signing

2015-02-12 Thread Nikos Roussos
On Thu, Feb 12, 2015 at 6:30 AM, Michael Cronenworth m...@cchtml.com 
wrote:
I'm sure those that need to know, know, but for those that haven't 
heard[1]
Mozilla's official Firefox build will enforce addons to contain a 
Mozilla signature

without any runtime option to disable the check.

Initially this prevents Fedora packaged addons since they are 
unsigned. The Mozilla
signing process takes time and can't be part of a package building 
process.


Is Fedora going to get authorization to build Firefox with a runtime 
disable option?


If the only way is to completely disable this feature, I'd prefer we 
don't.

I wouldn't like for us to ship a less secure build of Firefox.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Firefox addon signing

2015-02-12 Thread drago01
On Thu, Feb 12, 2015 at 11:15 AM, Nikos Roussos
comzer...@fedoraproject.org wrote:
 On Thu, Feb 12, 2015 at 6:30 AM, Michael Cronenworth m...@cchtml.com
 wrote:

 I'm sure those that need to know, know, but for those that haven't heard[1]
 Mozilla's official Firefox build will enforce addons to contain a Mozilla
 signature without any runtime option to disable the check. Initially this
 prevents Fedora packaged addons since they are unsigned. The Mozilla signing
 process takes time and can't be part of a package building process. Is
 Fedora going to get authorization to build Firefox with a runtime disable
 option?


 If the only way is to completely disable this feature, I'd prefer we don't.
 I wouldn't like for us to ship a less secure build of Firefox.

A better way would be to add a Fedora Signature in addition to
mozilla's and use that for packaged extensions.
But that would require work on the build system (koji) side.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Firefox addon signing

2015-02-12 Thread Kevin Kofler
Nikos Roussos wrote:
 If the only way is to completely disable this feature, I'd prefer we
 don't.
 I wouldn't like for us to ship a less secure build of Firefox.

After Restricted Boot, now Restricted Browser? No thanks! This feature 
needs to be disabled no matter whether it affects our packaged plugins or 
not.

Kevin Kofler

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Firefox addon signing

2015-02-12 Thread Miloslav Trmač
 On Thu, Feb 12, 2015 at 12:47:27PM +0100, drago01 wrote:
  A better way would be to add a Fedora Signature in addition to
  mozilla's and use that for packaged extensions.
  But that would require work on the build system (koji) side.
 
 The RPMs deploying the packaged extension are already signed and those
 signatures are checked at time of package install. So it seems like
 firefox merely needs to be taught that the pre-packaged extensions
 deployed by RPM are pre-verified, so it can skip its verification
 for those, while still doing verification for stuff that is live
 downloaded

Yes, that does seem like the most practical way and reasonably secure way to 
handle this; it might make Mozilla unhappy anyway.

Firefox is really doing this to fight malware that has probably actually 
received (possibly unintended) permission from the user to install itself into 
the system, which often includes getting Administrator rights.  So, to mirror 
that Mozilla intent exactly, even RPM-deployed extensions should require a 
Mozilla signature.

OTOH, once you give malware root rights, it can in principle modify Firefox to 
skip the check, so this is only a hurdle, not a reliable feature.  Equally, 
verifying the RPM extension contents against the RPM database and checking the 
RPM signature would be useless because the malware can just add its key to the 
keys RPM uses for verification.

The Mozilla blog also mentions some “third option” for “extensions that will 
never be publicly distributed and will never leave an internal network”, 
presumably bypassing the need to have them signed by Mozilla.  Could that be 
used by Fedora?
Mirek
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Firefox addon signing

2015-02-12 Thread Daniel P. Berrange
On Thu, Feb 12, 2015 at 12:47:27PM +0100, drago01 wrote:
 On Thu, Feb 12, 2015 at 11:15 AM, Nikos Roussos
 comzer...@fedoraproject.org wrote:
  On Thu, Feb 12, 2015 at 6:30 AM, Michael Cronenworth m...@cchtml.com
  wrote:
 
  I'm sure those that need to know, know, but for those that haven't heard[1]
  Mozilla's official Firefox build will enforce addons to contain a Mozilla
  signature without any runtime option to disable the check. Initially this
  prevents Fedora packaged addons since they are unsigned. The Mozilla signing
  process takes time and can't be part of a package building process. Is
  Fedora going to get authorization to build Firefox with a runtime disable
  option?
 
 
  If the only way is to completely disable this feature, I'd prefer we don't.
  I wouldn't like for us to ship a less secure build of Firefox.
 
 A better way would be to add a Fedora Signature in addition to
 mozilla's and use that for packaged extensions.
 But that would require work on the build system (koji) side.

The RPMs deploying the packaged extension are already signed and those
signatures are checked at time of package install. So it seems like
firefox merely needs to be taught that the pre-packaged extensions
deployed by RPM are pre-verified, so it can skip its verification
for those, while still doing verification for stuff that is live
downloaded

Regards,
Daniel
-- 
|: http://berrange.com  -o-http://www.flickr.com/photos/dberrange/ :|
|: http://libvirt.org  -o- http://virt-manager.org :|
|: http://autobuild.org   -o- http://search.cpan.org/~danberr/ :|
|: http://entangle-photo.org   -o-   http://live.gnome.org/gtk-vnc :|
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Firefox addon signing

2015-02-12 Thread drago01
On Thu, Feb 12, 2015 at 1:53 PM, Daniel P. Berrange berra...@redhat.com wrote:
 On Thu, Feb 12, 2015 at 12:47:27PM +0100, drago01 wrote:
 On Thu, Feb 12, 2015 at 11:15 AM, Nikos Roussos
 comzer...@fedoraproject.org wrote:
  On Thu, Feb 12, 2015 at 6:30 AM, Michael Cronenworth m...@cchtml.com
  wrote:
 
  I'm sure those that need to know, know, but for those that haven't heard[1]
  Mozilla's official Firefox build will enforce addons to contain a Mozilla
  signature without any runtime option to disable the check. Initially this
  prevents Fedora packaged addons since they are unsigned. The Mozilla 
  signing
  process takes time and can't be part of a package building process. Is
  Fedora going to get authorization to build Firefox with a runtime disable
  option?
 
 
  If the only way is to completely disable this feature, I'd prefer we don't.
  I wouldn't like for us to ship a less secure build of Firefox.

 A better way would be to add a Fedora Signature in addition to
 mozilla's and use that for packaged extensions.
 But that would require work on the build system (koji) side.

 The RPMs deploying the packaged extension are already signed and those
 signatures are checked at time of package install. So it seems like
 firefox merely needs to be taught that the pre-packaged extensions
 deployed by RPM are pre-verified, so it can skip its verification
 for those, while still doing verification for stuff that is live
 downloaded

Oh indeed. It is probably sufficient to just check the signature of
non system wide extensions.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Firefox addon signing

2015-02-12 Thread Florian Weimer
On 02/12/2015 11:15 AM, Nikos Roussos wrote:
 On Thu, Feb 12, 2015 at 6:30 AM, Michael Cronenworth m...@cchtml.com
 wrote:
 Is Fedora going to get authorization to build Firefox with a runtime
 disable option?
 
 If the only way is to completely disable this feature, I'd prefer we don't.
 I wouldn't like for us to ship a less secure build of Firefox.

It's not the only way, you can also patch the Firefox binary on disk to
disable the check.  You can even run a copy in case you cannot modify
the original version due to file system permissions.

This is why I don't see how this can be a security improvement, at least
not on Fedora.  If it really cannot be disabled, it will also cause
problems for centrally managed Firefox deployments which need to
pre-install add-ons into user profiles.

-- 
Florian Weimer / Red Hat Product Security
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Firefox addon signing

2015-02-12 Thread Miloslav Trmač
 or simply exempt signature checking if
 the extension is on disk. They should check on download only.

That would defeat the entire purpose; malware is very commonly sideloading 
extensions.
Mirek
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Firefox addon signing

2015-02-12 Thread Florian Weimer
On 02/12/2015 04:53 PM, Simo Sorce wrote:
 On Thu, 2015-02-12 at 09:54 -0500, Miloslav Trmač wrote:
 or simply exempt signature checking if
 the extension is on disk. They should check on download only.

 That would defeat the entire purpose; malware is very commonly sideloading 
 extensions.
 
 Malware can easily binary patch firefox to ignore verification,

Windows has Authenticode, which may change the equation somewhat.

 I do not
 think trying to defeat sideloading with this kind of verification makes
 much sense.

Maybe it is only about preventing people from bundling the official
Firefox version with dodgy add-ons.  Not downright malware, but things
users may not actually want without realizing it.  The signature
checking means that those who prepare the downloads can no longer use
the unmodified upstream binary.  Which in turn might force them not to
use Mozilla brands.

Maybe this is a bit far-fetched, but after hours of staring at other
people's code today, it seems pretty reasonable to me.

But what do add-on developers do?  Surely there is a way to disable this
somehow?

-- 
Florian Weimer / Red Hat Product Security
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Firefox addon signing

2015-02-12 Thread Michael Catanzaro

On Thu, Feb 12, 2015 at 9:53 AM, Simo Sorce s...@redhat.com wrote:
Malware can easily binary patch firefox to ignore verification, I do 
not
think trying to defeat sideloading with this kind of verification 
makes

much sense.


And if you've already installed malware with on your computer, don't 
you kind of have bigger things to worry about than whether or not it 
can be loaded as a Firefox extension?
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Firefox addon signing

2015-02-12 Thread Simo Sorce
On Thu, 2015-02-12 at 09:54 -0500, Miloslav Trmač wrote:
  or simply exempt signature checking if
  the extension is on disk. They should check on download only.
 
 That would defeat the entire purpose; malware is very commonly sideloading 
 extensions.

Malware can easily binary patch firefox to ignore verification, I do not
think trying to defeat sideloading with this kind of verification makes
much sense.
Of course you may decide to exempt only extensions in non-user-writable
locations, if you are on Linux and the Firefox binary is read-only for
the user.

Simo.

-- 
Simo Sorce * Red Hat, Inc * New York

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Firefox addon signing

2015-02-12 Thread Alec Leamas

On 12/02/15 16:53, Simo Sorce wrote:


Malware can easily binary patch firefox to ignore verification, I do not
think trying to defeat sideloading with this kind of verification makes
much sense.
Of course you may decide to exempt only extensions in non-user-writable
locations, if you are on Linux and the Firefox binary is read-only for
the user.


Besides the technical issues, what does upstream permit? Since we havn't 
re-branded firefox, are we free to modify this whatever way we want? I 
can see the argument for upstream to limit such modifications without 
re-branding.


Cheers!

--alec

--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Firefox addon signing

2015-02-12 Thread Daniel P. Berrange
On Thu, Feb 12, 2015 at 09:54:16AM -0500, Miloslav Trmač wrote:
  or simply exempt signature checking if
  the extension is on disk. They should check on download only.
 
 That would defeat the entire purpose; malware is very commonly
 sideloading extensions.

If we only exempt extensions installed by RPM it is reasonable to assume
that our new package review process would have validated there is no
malware present. Our package review process is serving the same kind of
purpose as Mozilla's extension review  signing process.

Regards,
Daniel
-- 
|: http://berrange.com  -o-http://www.flickr.com/photos/dberrange/ :|
|: http://libvirt.org  -o- http://virt-manager.org :|
|: http://autobuild.org   -o- http://search.cpan.org/~danberr/ :|
|: http://entangle-photo.org   -o-   http://live.gnome.org/gtk-vnc :|
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Firefox addon signing

2015-02-11 Thread Michael Cronenworth
I'm sure those that need to know, know, but for those that haven't heard[1] 
Mozilla's official Firefox build will enforce addons to contain a Mozilla signature 
without any runtime option to disable the check.


Initially this prevents Fedora packaged addons since they are unsigned. The Mozilla 
signing process takes time and can't be part of a package building process.


Is Fedora going to get authorization to build Firefox with a runtime disable 
option?

[1] 
https://blog.mozilla.org/addons/2015/02/10/extension-signing-safer-experience/
--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct