On 1/7/18, Ray_Net <[email protected]> wrote:
> Lee wrote on 07-01-18 22:44:
>> summary: The vuln. mitigation is to install noscript + request policy
>> continued or uMatrix + uBlock Origin or whatever other addon combo
>> that allows javascript from only whitelisted sites.
>>
>> On 1/7/18, Ray_Net <[email protected]> wrote:
>>> WaltS48 wrote on 06-01-18 18:05:
>>>> On 1/6/18 2:36 AM, Ray_Net wrote:
>>>>> I have read:
>>>>>
>>>>> "Disable Javascript until browser company comes out with patch for
>>>>> vulnerable Javascript."
>>>>>
>>>>> So, will SM issue a patch against the Spectre exploit ?
>> Mozilla needs to come up with a patch first.  What they have now only
>> blocks the obvious timing attack methods.
>>
>>>> SeaMonkey 2.49.1 is based on Firefox 52 ESR code, and Firefox 52 ESR
>>>> doesn't have SharedBufferArray enabled.
>>>> ||
>>>> ||SharedArrayBuffer| is already disabled in Firefox 52 ESR.
>>>> ||
>>>> |REF: https://www.mozilla.org/en-US/security/advisories/mfsa2018-01/
>>>>
>>> Would it mean that we are protected ?
>> No.
>>
>> Look at the FF advisory
>>    The precision of performance.now() has been reduced from 5μs to
>> 20μs, and the SharedArrayBuffer feature has been disabled because it
>> can be used to construct a high-resolution timer.
>>
>> SeaMonkey doesn't implement the SharedArrayBuffer feature but I'm
>> guessing it's performance.now() function still has the 5μs resolution
>> and that will take a patch to fix.
>>
>> But changing the performance.now() resolution is not sufficient.  Take a
>> look at
>> https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
>>    Furthermore, other timing sources and time-fuzzing techniques are
>> being worked on.
>>
>> Which is like saying we've locked the front door so nobody can walk
>> right in anymore but the ground floor windows are still wide open.
>>
>> Follow the "other timing sources and time-fuzzing techniques" link to
>> https://gruss.cc/files/fantastictimers.pdf
>>    Abstract. Research showed that microarchitectural attacks like cache
>> attacks can be performed through websites using JavaScript. These
>> timing attacks allow an adversary to spy on users secrets such as
>> their keystrokes,leveraging fine-grained timers. However, the W3C and
>> browser vendors responded to this significant threat by eliminating
>> fine-grained timers from JavaScript. This renders previous
>> high-resolution microarchitectural attacks non-applicable.
>>
>>    >>We demonstrate the inefficacy of this mitigation<< by finding and
>> evaluating a wide range of new sources of timing information. We
>> develop measurement methods that exceed the resolution of official
>> timing sources by to orders of magnitude on all major browsers, and
>> even more on Tor browser. Our timing measurements do not only
>> re-enable previous attacks to their full extent but also allow
>> implementing new attacks. We demonstrate a new DRAM-based covert
>> channel between a website and an unprivileged app in a virtual machine
>> without network hardware. Our results emphasize that quick-fix
>> mitigations can establish a dangerous false sense of security.
>>
>>
>> In short, performance.now() and SharedBufferArray are the easy/obvious
>> ways to get a high resolution timer in javascript but they're not the
>> only possible methods.
>>
>> So... what to do?  The exploit mitigation is to install noscript +
>> request policy continued or uMatrix + uBlock Origin or whatever other
>> addon combo that allows javascript from only whitelisted sites.
>>
>> Regards,
>> Lee
> For "Request Policy" we have for all versions:
> This add-on is not compatible with your version of SeaMonkey.

"Request Policy" was the original - you want "RequestPolicy Continued"
which is easier to use:
https://addons.mozilla.org/en-US/firefox/addon/requestpolicy-continued/

which links to
https://addons.mozilla.org/firefox/downloads/file/747484/requestpolicy_continued-1.0.beta13.2-fx+sm.xpi

> For "NoScript Security Suite" we have:
> Only with FireFox.

yeah.. you need to scroll down to 'version history' & click on 'see
all versions'
It looks like 5.1.8.3 is the last one that will work w/ SM
  Works with Firefox 45.0 - 56.0, SeaMonkey 2.42 - *
https://addons.mozilla.org/firefox/downloads/file/806790/noscript_security_suite-5.1.8.3-fx+sm.xpi

Regards
Lee
_______________________________________________
support-seamonkey mailing list
[email protected]
https://lists.mozilla.org/listinfo/support-seamonkey

Reply via email to