Re: [OpenIndiana-discuss] Firefox security

2012-11-19 Thread Jonathan Adams
On 19 November 2012 00:37, bscuk2 bsc...@gmail.com wrote:
 Has anyone considered lightspark as a substitute for flash on Oi?


If we're looking at incomplete solutions, have you taken a look at:
https://github.com/mozilla/shumway

___
OpenIndiana-discuss mailing list
OpenIndiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Firefox security

2012-11-19 Thread bscuk2
The latest Firerfox releases do play HTLM 5 format videos without the 
need for flash perhaps an argument to keep updated on Firerfox.


On 19/11/2012 12:48, Jonathan Adams wrote:

we're looking at incomplete solutions, have you taken a look at:
https://github.com/mozilla/shumway


___
OpenIndiana-discuss mailing list
OpenIndiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Firefox security

2012-11-19 Thread cpforum






 Message du 19/11/12 14:25
 De : bscuk2 
 A : Discussion list for OpenIndiana 
 Copie à : 
 Objet : Re: [OpenIndiana-discuss] Firefox security
 
 The latest Firerfox releases do play HTLM 5 format videos without the 
 need for flash perhaps an argument to keep updated on Firerfox.


Yes latest Firefox releases (not 3.6.X Openindiana one) can play HTML 5 video.
In 2014 or 2016 we probably no longer need FlashPlayer. However today
a browser without Flash has a broken leg.

Oracle recently retired Flash from Solaris 10/11 but Solaris 11.1 Firefox 
release is 10.0.6esr

 

 

C.P.



 On 19/11/2012 12:48, Jonathan Adams wrote:
  we're looking at incomplete solutions, have you taken a look at:
  https://github.com/mozilla/shumway
 
 ___
 OpenIndiana-discuss mailing list
 OpenIndiana-discuss@openindiana.org
 http://openindiana.org/mailman/listinfo/openindiana-discuss

___
OpenIndiana-discuss mailing list
OpenIndiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Firefox security

2012-11-19 Thread Gary
On Mon, Nov 19, 2012 at 11:57 AM, cpforum cpfo...@orange.fr wrote:

 However today a browser without Flash has a broken leg.


I and a few hundred thousand Bloons players whole-heartedly agree. ;)
___
OpenIndiana-discuss mailing list
OpenIndiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Firefox security

2012-11-19 Thread cpforum
Latest stable  extended support release is now 10.0.11esr :


ftp://ftp.mozilla.org/pub/firefox/releases/10.0.11esr/contrib/solaris_pkgadd/
for localisation download the Linux xpi extension here  :

ftp://ftp.mozilla.org/pub/firefox/releases/10.0.11esr/linux-i686/xpi/

 

You have to activate extension language xx.xpi by using about:config

configuration url.

 

For French download Linux fr.xpi, accept the install, restart firefox

Then go to about:config menu and change general.useragent.locale

vraible from en to fr and restart firefox.

 

 

If you want latest HTML5 features choose 16.0.2

 

ftp://ftp.mozilla.org/pub/firefox/releases/16.0.2/contrib/solaris_pkgadd/

for localisation go to Linux :

ftp://ftp.mozilla.org/pub/firefox/releases/16.0.2/linux-i686/xpi/

 

If initial Mozilla planning is maintained, next 17.0.3 release should became 
the next esr.





 Message du 19/11/12 21:06
 De : Gary 
 A : Discussion list for OpenIndiana 
 Copie à : 
 Objet : Re: [OpenIndiana-discuss] Firefox security
 
 On Mon, Nov 19, 2012 at 11:57 AM, cpforum wrote:
 
  However today a browser without Flash has a broken leg.
 
 
 I and a few hundred thousand Bloons players whole-heartedly agree. ;)
 ___
 OpenIndiana-discuss mailing list
 OpenIndiana-discuss@openindiana.org
 http://openindiana.org/mailman/listinfo/openindiana-discuss

___
OpenIndiana-discuss mailing list
OpenIndiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Firefox security

2012-11-18 Thread cpforum






 Message du 17/11/12 19:39
 De : Bob Friesenhahn 
 A : Discussion list for OpenIndiana 
 Copie à : 
 Objet : Re: [OpenIndiana-discuss] Firefox security
 
 On Sat, 17 Nov 2012, Gary Driggs wrote:
 
  I see this question asked regularly... Generally speaking, the vast
  majority of browser exploits in the wild target windows browsers or
  their plugins like Java, Adobe Reader  Flash, or ActiveX. So even if
  you're using one of those plugins with a Unix browser (of those
  available), you're already protected since the exploits won't run on
  your OS if they're even triggered in the first place. In my
 
 This might be true for x86 binary code but does not seem to apply to 
 JavaScript or any other intepreter/VM embedded in the browser. Even 
 with x86 binary code, it is possible that the code may be able to 
 resolve and invoke a standard C library call (e.g. system()) in a way 
 which works on both Solaris and Linux.
 
 The Flash plugin is not maintained for Solaris

True : Last Flash is 11.2.202 r223

 or Linux any more so security exploits will continue to build up.=

Wrong : Linux Flash is frozen to 11.2  (windows and Mac are 11.5 now) but 
security update for Linux Flash 11.2 are provided and current Linux release is 
11.2.202 r 252.
Flash Solaris is frozen to r 223.

The problem with Openindiana Desktop is the time. OI Desktop  is more and more 
unsecure (no update). Firefox, Java and Thunderbird are very old releases. 
Gnome Desktop is not maintened and applications like OpenOffice, Flash, Adobe 
Reader, etc. are 2 or 3 years old with a lot of known security holes. Il you 
want a fresh Firefox (16.0.2), Thunderbird Java, etc Go to this link (French 
locale) :

http://ossi.pagesperso-orange.fr/OS/openindiana_links.html

C.P.

___
OpenIndiana-discuss mailing list
OpenIndiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Firefox security

2012-11-18 Thread Jim Klimov

On 2012-11-18 18:00, cpforum wrote:

Firefox, Java and Thunderbird are very old releases. Gnome Desktop is not 
maintened and applications like OpenOffice, Flash, Adobe Reader, etc. are 2 or 
3 years old with a lot of known security holes.


Speaking of which: some of these projects are opensource, others
are proprietary - even if distributed by authors for free.

Is there any lineup of such products as Java, Adobe Reader and
Flash, OpenOffice or its more current descendants, Mozilla stuff,
VirtualBox (GPL half, at least) - what may be redistributed how?

For example, whenever a new JDK/JRE comes out, can we publish its
files into the OI IPS repo as a new version of the appropriate
package, or the license states that the end-user must download
the software from original vendor's site (like in VBox PUEL)?

I don't think it is a fundamental problem to fire up a repository
of third-party software which would suck in and republish as IPS
the tarballs and packages made by other projects (like Mozilla,
Java, VirtualBox, etc.etc.etc.) - if we know we're not to be sued
for making such a repo. Possibly this can be done as part of the
existing SFE or SFE-encumbered repos (skipping the manual build
part by the repo maintainer)?

For projects with well standardized releases, sucking-in of the new
versions can be quite automated (similar to spec files or recipes
in the userland gate), and end-users would have a simple automated
means of receiving the new software in a timely manner...

My 2c,
//Jim


___
OpenIndiana-discuss mailing list
OpenIndiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Firefox security

2012-11-18 Thread bscuk2

Has anyone considered lightspark as a substitute for flash on Oi?

On 18/11/2012 18:19, Jim Klimov wrote:

On 2012-11-18 18:00, cpforum wrote:
Firefox, Java and Thunderbird are very old releases. Gnome Desktop is 
not maintened and applications like OpenOffice, Flash, Adobe Reader, 
etc. are 2 or 3 years old with a lot of known security holes.


Speaking of which: some of these projects are opensource, others
are proprietary - even if distributed by authors for free.

Is there any lineup of such products as Java, Adobe Reader and
Flash, OpenOffice or its more current descendants, Mozilla stuff,
VirtualBox (GPL half, at least) - what may be redistributed how?

For example, whenever a new JDK/JRE comes out, can we publish its
files into the OI IPS repo as a new version of the appropriate
package, or the license states that the end-user must download
the software from original vendor's site (like in VBox PUEL)?

I don't think it is a fundamental problem to fire up a repository
of third-party software which would suck in and republish as IPS
the tarballs and packages made by other projects (like Mozilla,
Java, VirtualBox, etc.etc.etc.) - if we know we're not to be sued
for making such a repo. Possibly this can be done as part of the
existing SFE or SFE-encumbered repos (skipping the manual build
part by the repo maintainer)?

For projects with well standardized releases, sucking-in of the new
versions can be quite automated (similar to spec files or recipes
in the userland gate), and end-users would have a simple automated
means of receiving the new software in a timely manner...

My 2c,
//Jim


___
OpenIndiana-discuss mailing list
OpenIndiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


___
OpenIndiana-discuss mailing list
OpenIndiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Firefox security

2012-11-17 Thread Gary Driggs
I see this question asked regularly... Generally speaking, the vast
majority of browser exploits in the wild target windows browsers or
their plugins like Java, Adobe Reader  Flash, or ActiveX. So even if
you're using one of those plugins with a Unix browser (of those
available), you're already protected since the exploits won't run on
your OS if they're even triggered in the first place. In my
experience, I've seen some malware for Android and OS X but there have
been maybe a handful of barely mentionable Linux malware over the
years. So your choice of OS alone has drastically limited your risk
footprint. In my mind, the most compelling reason for maintaining
current versions of Firefox on Solaris  Illumos/OI derivatives is for
feature parity.

-Gary

___
OpenIndiana-discuss mailing list
OpenIndiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Firefox security

2012-11-17 Thread Bob Friesenhahn

On Sat, 17 Nov 2012, Gary Driggs wrote:


I see this question asked regularly... Generally speaking, the vast
majority of browser exploits in the wild target windows browsers or
their plugins like Java, Adobe Reader  Flash, or ActiveX. So even if
you're using one of those plugins with a Unix browser (of those
available), you're already protected since the exploits won't run on
your OS if they're even triggered in the first place. In my


This might be true for x86 binary code but does not seem to apply to 
JavaScript or any other intepreter/VM embedded in the browser.  Even 
with x86 binary code, it is possible that the code may be able to 
resolve and invoke a standard C library call (e.g. system()) in a way 
which works on both Solaris and Linux.


The Flash plugin is not maintained for Solaris or Linux any more so 
security exploits will continue to build up.


There is little doubt that the chance of being exploited is much less 
with Solaris since the desktop user base is so small, it is not cost 
effective to target it.


Bob
--
Bob Friesenhahn
bfrie...@simple.dallas.tx.us, http://www.simplesystems.org/users/bfriesen/
GraphicsMagick Maintainer,http://www.GraphicsMagick.org/

___
OpenIndiana-discuss mailing list
OpenIndiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Firefox security

2012-11-17 Thread Gary Driggs
On Nov 17, 2012, at 10:39 AM, Bob Friesenhahn
bfrie...@simple.dallas.tx.us wrote:

 Even with x86 binary code, it is possible that the code may be able to 
 resolve and invoke a standard C library call (e.g. system()) in a way which 
 works on both Solaris and Linux.

I've not seen any code that bothers. Most JavaScript lately tends to
be for delivering a payload to v

___
OpenIndiana-discuss mailing list
OpenIndiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Firefox security

2012-11-17 Thread Gary Driggs
On Nov 17, 2012, at 10:39 AM, Bob Friesenhahn
bfrie...@simple.dallas.tx.us wrote:

 Even with x86 binary code, it is possible that the code may be able to 
 resolve and invoke a standard C library call (e.g. system()) in a way which 
 works on both Solaris and Linux.

The JavaScript I've seen most of lately is designed to iteratively
check for vulnerable plugins  deliver a payload based on what's
available. OS X  Android are the biggest unix targets to date as
their user populations are much bigger and less savvy.

-Gary

___
OpenIndiana-discuss mailing list
OpenIndiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss