On 07/01/2018 23:48, Ray_Net wrote: > Lee wrote on 07-01-18 22:44: >> summary: The vuln. mitigation is to install noscript + request policy >> continued or uMatrix + uBlock Origin or whatever other addon combo >> that allows javascript from only whitelisted sites. >> >> On 1/7/18, Ray_Net <tbrraymond.schmit...@tbrscarlet.be> wrote: >>> WaltS48 wrote on 06-01-18 18:05: >>>> On 1/6/18 2:36 AM, Ray_Net wrote: >>>>> I have read: >>>>> >>>>> "Disable Javascript until browser company comes out with patch for >>>>> vulnerable Javascript." >>>>> >>>>> So, will SM issue a patch against the Spectre exploit ? >> Mozilla needs to come up with a patch first. What they have now only >> blocks the obvious timing attack methods. >> >>>> SeaMonkey 2.49.1 is based on Firefox 52 ESR code, and Firefox 52 ESR >>>> doesn't have SharedBufferArray enabled. >>>> || >>>> ||SharedArrayBuffer| is already disabled in Firefox 52 ESR. >>>> || >>>> |REF: https://www.mozilla.org/en-US/security/advisories/mfsa2018-01/ >>>> >>> Would it mean that we are protected ? >> No. >> >> Look at the FF advisory >> The precision of performance.now() has been reduced from 5μs to >> 20μs, and the SharedArrayBuffer feature has been disabled because it >> can be used to construct a high-resolution timer. >> >> SeaMonkey doesn't implement the SharedArrayBuffer feature but I'm >> guessing it's performance.now() function still has the 5μs resolution >> and that will take a patch to fix. >> >> But changing the performance.now() resolution is not sufficient. Take a >> look at >> https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/ >> Furthermore, other timing sources and time-fuzzing techniques are >> being worked on. >> >> Which is like saying we've locked the front door so nobody can walk >> right in anymore but the ground floor windows are still wide open. >> >> Follow the "other timing sources and time-fuzzing techniques" link to >> https://gruss.cc/files/fantastictimers.pdf >> Abstract. Research showed that microarchitectural attacks like cache >> attacks can be performed through websites using JavaScript. These >> timing attacks allow an adversary to spy on users secrets such as >> their keystrokes,leveraging fine-grained timers. However, the W3C and >> browser vendors responded to this significant threat by eliminating >> fine-grained timers from JavaScript. This renders previous >> high-resolution microarchitectural attacks non-applicable. >> >> >>We demonstrate the inefficacy of this mitigation<< by finding and >> evaluating a wide range of new sources of timing information. We >> develop measurement methods that exceed the resolution of official >> timing sources by to orders of magnitude on all major browsers, and >> even more on Tor browser. Our timing measurements do not only >> re-enable previous attacks to their full extent but also allow >> implementing new attacks. We demonstrate a new DRAM-based covert >> channel between a website and an unprivileged app in a virtual machine >> without network hardware. Our results emphasize that quick-fix >> mitigations can establish a dangerous false sense of security. >> >> >> In short, performance.now() and SharedBufferArray are the easy/obvious >> ways to get a high resolution timer in javascript but they're not the >> only possible methods. >> >> So... what to do? The exploit mitigation is to install noscript + >> request policy continued or uMatrix + uBlock Origin or whatever other >> addon combo that allows javascript from only whitelisted sites. >> >> Regards, >> Lee > For "Request Policy" we have for all versions: > This add-on is not compatible with your version of SeaMonkey. > > For "NoScript Security Suite" we have: > Only with FireFox.
NoScript >10.x will only work with FF >= 57 (because that version is a webextension, not XUL add-on). With SM 2.49 (FF 52) install NoScript 5.1.8.3 https://addons.mozilla.org/firefox/downloads/file/806790/noscript_security_suite-5.1.8.3-fx+sm.xpi?src=version-history (It says "fx+sm", I think that's FF and SM) AFAICT, the latest RequestPolicy extension should work... https://addons.mozilla.org/firefox/downloads/file/223479/requestpolicy-0.5.28-sm+fx.xpi?src=version-history (In fact, there is no WebExtension version, so no FF 57 support) Regards. _______________________________________________ support-seamonkey mailing list support-seamonkey@lists.mozilla.org https://lists.mozilla.org/listinfo/support-seamonkey