On 1/8/18, Ray_Net <[email protected]> wrote:
> Lee wrote on 08-01-18 01:06:
>> On 1/7/18, Ray_Net <[email protected]> wrote:
>>> Lee wrote on 07-01-18 22:44:
>>>> summary: The vuln. mitigation is to install noscript + request policy
>>>> continued or uMatrix + uBlock Origin or whatever other addon combo
>>>> that allows javascript from only whitelisted sites.
>>>>
>>>> On 1/7/18, Ray_Net <[email protected]> wrote:
>>>>> WaltS48 wrote on 06-01-18 18:05:
>>>>>> On 1/6/18 2:36 AM, Ray_Net wrote:
>>>>>>> I have read:
>>>>>>>
>>>>>>> "Disable Javascript until browser company comes out with patch for
>>>>>>> vulnerable Javascript."
>>>>>>>
>>>>>>> So, will SM issue a patch against the Spectre exploit ?
>>>> Mozilla needs to come up with a patch first.  What they have now only
>>>> blocks the obvious timing attack methods.
>>>>
>>>>>> SeaMonkey 2.49.1 is based on Firefox 52 ESR code, and Firefox 52 ESR
>>>>>> doesn't have SharedBufferArray enabled.
>>>>>> ||
>>>>>> ||SharedArrayBuffer| is already disabled in Firefox 52 ESR.
>>>>>> ||
>>>>>> |REF: https://www.mozilla.org/en-US/security/advisories/mfsa2018-01/
>>>>>>
>>>>> Would it mean that we are protected ?
>>>> No.
>>>>
>>>> Look at the FF advisory
>>>>     The precision of performance.now() has been reduced from 5μs to
>>>> 20μs, and the SharedArrayBuffer feature has been disabled because it
>>>> can be used to construct a high-resolution timer.
>>>>
>>>> SeaMonkey doesn't implement the SharedArrayBuffer feature but I'm
>>>> guessing it's performance.now() function still has the 5μs resolution
>>>> and that will take a patch to fix.
>>>>
>>>> But changing the performance.now() resolution is not sufficient.  Take a
>>>> look at
>>>> https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
>>>>     Furthermore, other timing sources and time-fuzzing techniques are
>>>> being worked on.
>>>>
>>>> Which is like saying we've locked the front door so nobody can walk
>>>> right in anymore but the ground floor windows are still wide open.
>>>>
>>>> Follow the "other timing sources and time-fuzzing techniques" link to
>>>> https://gruss.cc/files/fantastictimers.pdf
>>>>     Abstract. Research showed that microarchitectural attacks like cache
>>>> attacks can be performed through websites using JavaScript. These
>>>> timing attacks allow an adversary to spy on users secrets such as
>>>> their keystrokes,leveraging fine-grained timers. However, the W3C and
>>>> browser vendors responded to this significant threat by eliminating
>>>> fine-grained timers from JavaScript. This renders previous
>>>> high-resolution microarchitectural attacks non-applicable.
>>>>
>>>>     >>We demonstrate the inefficacy of this mitigation<< by finding and
>>>> evaluating a wide range of new sources of timing information. We
>>>> develop measurement methods that exceed the resolution of official
>>>> timing sources by to orders of magnitude on all major browsers, and
>>>> even more on Tor browser. Our timing measurements do not only
>>>> re-enable previous attacks to their full extent but also allow
>>>> implementing new attacks. We demonstrate a new DRAM-based covert
>>>> channel between a website and an unprivileged app in a virtual machine
>>>> without network hardware. Our results emphasize that quick-fix
>>>> mitigations can establish a dangerous false sense of security.
>>>>
>>>>
>>>> In short, performance.now() and SharedBufferArray are the easy/obvious
>>>> ways to get a high resolution timer in javascript but they're not the
>>>> only possible methods.
>>>>
>>>> So... what to do?  The exploit mitigation is to install noscript +
>>>> request policy continued or uMatrix + uBlock Origin or whatever other
>>>> addon combo that allows javascript from only whitelisted sites.
>>>>
>>>> Regards,
>>>> Lee
>>> For "Request Policy" we have for all versions:
>>> This add-on is not compatible with your version of SeaMonkey.
>> "Request Policy" was the original - you want "RequestPolicy Continued"
>> which is easier to use:
>> https://addons.mozilla.org/en-US/firefox/addon/requestpolicy-continued/
>>
>> which links to
>> https://addons.mozilla.org/firefox/downloads/file/747484/requestpolicy_continued-1.0.beta13.2-fx+sm.xpi
>>
>>> For "NoScript Security Suite" we have:
>>> Only with FireFox.
>> yeah.. you need to scroll down to 'version history' & click on 'see
>> all versions'
>> It looks like 5.1.8.3 is the last one that will work w/ SM
>>    Works with Firefox 45.0 - 56.0, SeaMonkey 2.42 - *
>> https://addons.mozilla.org/firefox/downloads/file/806790/noscript_security_suite-5.1.8.3-fx+sm.xpi
>>
>> Regards
>> Lee
>
> Anyway, it's better that SM solve problems instead of a need to install
> a myriad of extensions.

agreed.  But I like having more control over what's allowed than the
javascript.enabled on/off switch & extensions are the only way I know
of to get that.

Regards
Lee
_______________________________________________
support-seamonkey mailing list
[email protected]
https://lists.mozilla.org/listinfo/support-seamonkey

Reply via email to