Commit Graph

11588 Commits

Author SHA1 Message Date
Cykesiopka
d1803f67e9 Bug 1358183 - Remove some unused PSM IDL constants and functions. r=keeler
MozReview-Commit-ID: C8EGosXvTQL

--HG--
extra : rebase_source : 9c141f6750d7658409fc2820f17940abe067fb4a
2017-05-04 00:06:43 +08:00
David Keeler
f821131b3b bug 1361893 - remove two unnecessary mutexes and a cast from SSLServerCertVerification.cpp r=kmckinley
gSSLVerificationPK11Mutex isn't used at all - it can be removed
gSSLVerificationTelemetryMutex is unnecessary because telemetry has its own lock:

https://dxr.mozilla.org/mozilla-central/rev/a748acbebbde373a88868dc02910fb2bc5e6a023/toolkit/components/telemetry/TelemetryHistogram.cpp#1135
https://dxr.mozilla.org/mozilla-central/rev/a748acbebbde373a88868dc02910fb2bc5e6a023/toolkit/components/telemetry/TelemetryHistogram.cpp#1984

The nsNSSSocketInfo* cast in SSLServerCertVerificationResult::Run() is
unnecessary because mInfoObject is a RefPtr<nsNSSSocketInfo>.

MozReview-Commit-ID: DG7qWGg2amQ

--HG--
extra : rebase_source : 0a475d7aba75ba4debecc7cec2ed14319082d9ab
2017-05-03 16:44:17 -07:00
Wes Kocher
323540c8ac Merge autoland to m-c a=merge
MozReview-Commit-ID: 30wEaH7LuuE
2017-05-03 13:17:05 -07:00
ffxbld
1e6ecc6322 No bug, Automated HPKP preload list update from host bld-linux64-spot-364 - a=hpkp-update 2017-05-03 08:06:32 -07:00
ffxbld
5f67a395c5 No bug, Automated HSTS preload list update from host bld-linux64-spot-364 - a=hsts-update 2017-05-03 08:06:29 -07:00
Wes Kocher
e141e24ffb Merge m-c to autoland, a=merge
MozReview-Commit-ID: 1peTFbNMVnU
2017-05-02 17:38:11 -07:00
ffxbld
abe68d5dad No bug, Automated HPKP preload list update from host bld-linux64-spot-304 - a=hpkp-update 2017-05-02 08:06:54 -07:00
ffxbld
e46e6eacbf No bug, Automated HSTS preload list update from host bld-linux64-spot-304 - a=hsts-update 2017-05-02 08:06:51 -07:00
Ting-Yu Lin
918033ba12 Bug 1321754 Part 2 - Update reftest and crashtest expectations for stylo. r=heycam
MozReview-Commit-ID: AunZ2DE209M

--HG--
extra : rebase_source : 4a091cd55581039c8d81f4db9bfbe2af8c0d0863
2017-04-28 14:53:16 +08:00
Haik Aftandilian
cbffb758e8 Bug 1360356 - [Mac] Remove "/Library/Caches/TemporaryItems" rule from level 3 Content Sandbox; r=Alex_Gaynor
Remove reading of "~/Library/Caches/TemporaryItems" from level 3 and update
sandboxing filesystem test to check ~/Library/Caches/TemporaryItems readability.

MozReview-Commit-ID: 6EMzH7brSnp

--HG--
extra : rebase_source : f97b5625da2abda73decc969fc581c2bf858183f
2017-04-28 11:48:43 -07:00
ffxbld
ae8c2e2354 No bug, Automated HPKP preload list update from host bld-linux64-spot-306 - a=hpkp-update 2017-05-01 07:56:05 -07:00
ffxbld
a2f0c5af03 No bug, Automated HSTS preload list update from host bld-linux64-spot-306 - a=hsts-update 2017-05-01 07:56:03 -07:00
ffxbld
3dc6ceb427 No bug, Automated HPKP preload list update from host bld-linux64-spot-388 - a=hpkp-update 2017-04-30 07:50:30 -07:00
ffxbld
0d823cefd8 No bug, Automated HSTS preload list update from host bld-linux64-spot-388 - a=hsts-update 2017-04-30 07:50:27 -07:00
ffxbld
38fdbbcaa4 No bug, Automated HPKP preload list update from host bld-linux64-spot-309 - a=hpkp-update 2017-04-29 07:55:26 -07:00
ffxbld
ca0521550a No bug, Automated HSTS preload list update from host bld-linux64-spot-309 - a=hsts-update 2017-04-29 07:55:24 -07:00
Wes Kocher
f831128354 Merge autoland to central, a=merge
MozReview-Commit-ID: B7tVdcR40eh
2017-04-28 15:43:18 -07:00
David Keeler
1ef3597000 bug 1360623 - add hash algorithm constants to pykey for easier consumer use r=jcj
For signing, pykey.py delegates to 3rd party libraries. One of these libraries
expects hash algorithms to be specified in the form "SHA-256" whereas the other
expects "sha256". Consumers of pykey shouldn't need to be aware of this detail.
This patch introduces constants HASH_SHA1, HASH_SHA256, etc. and changes pykey
to determine which string literals to use itself.

MozReview-Commit-ID: 27laM2uXMwJ

--HG--
extra : rebase_source : 9b74f486f7535671fd26c59e3e9cc3b4459f15e0
2017-04-28 11:06:28 -07:00
ffxbld
784ec1af14 No bug, Automated HPKP preload list update from host bld-linux64-spot-309 - a=hpkp-update 2017-04-28 07:52:40 -07:00
ffxbld
ce8bde832b No bug, Automated HSTS preload list update from host bld-linux64-spot-309 - a=hsts-update 2017-04-28 07:52:37 -07:00
David Keeler
f900f10f03 bug 1361201 - decrease OCSP soft timeout to 1 second on prerelease builds r=jcj
MozReview-Commit-ID: ENYyG8ZeXYe

--HG--
extra : rebase_source : 5c30b914a39a2dce89190c7d5db703952408aae3
2017-05-01 17:05:31 -07:00
David Keeler
3caa6189aa bug 1349312 - part 2/2: add pyct.py and generate test certificate transparency information r=Cykesiopka,jcj
MozReview-Commit-ID: 9Htv04PfRzb

This introduces pyct.py with the capability of generating Signed Certificate
Timestamps for our test certificates. Also introduces a simple testcase that
should validate correctly under current CT requirements as well as one that does
not validate due to an insufficient number of SCTs.

(Note that "validate" in this case does not refer to the overall TLS handshake
result, because CT is not currently required. It more or less refers to the
value of certificateTransparencyStatus of the SSLStatus of the connection's
securityInfo - see nsISSLStatus.idl.)

--HG--
rename : security/manager/ssl/tests/unit/bad_certs/default-ee.key => security/manager/ssl/tests/unit/test_ct/default-ee.key
rename : security/manager/ssl/tests/unit/bad_certs/default-ee.key.keyspec => security/manager/ssl/tests/unit/test_ct/default-ee.key.keyspec
rename : security/manager/ssl/tests/unit/bad_certs/default-ee.pem => security/manager/ssl/tests/unit/test_ct/default-ee.pem
rename : security/manager/ssl/tests/unit/bad_certs/default-ee.pem.certspec => security/manager/ssl/tests/unit/test_ct/default-ee.pem.certspec
rename : security/manager/ssl/tests/unit/bad_certs/test-ca.pem => security/manager/ssl/tests/unit/test_ct/test-ca.pem
rename : security/manager/ssl/tests/unit/bad_certs/test-ca.pem.certspec => security/manager/ssl/tests/unit/test_ct/test-ca.pem.certspec
extra : rebase_source : 66c5a5e16eeb47c97972248d61a4f1cbadf59a49
2017-04-17 14:55:35 -07:00
David Keeler
c138b8d0b6 bug 1349312 - part 1/2: patch CT implementation to include debug-only test logs r=Cykesiopka,jcj
MozReview-Commit-ID: Gay4bliuiDc

This modifies getCTKnownLogs.py to inject 3 debug-only Certificate Transparency
log keys and 2 organizations ("Mozilla Test Org 1" and "2") for use with
integration tests. Also updates CTKnownLogs.h as generated by the python script.

The debug logs use the "default", "secp256r1", and "alternate" keys that are
already present in our testing infrastructure (see pykey.py).

--HG--
extra : rebase_source : 3d4fc736f840cd080fab6b8c6c5b53cc9361abf2
2017-04-19 14:02:26 -07:00
David Keeler
455ab646d3 bug 1337950 - work around failing to load a FIPS PKCS#11 module DB in NSS initialization r=Cykesiopka,jcj
Firefox essentially does not support running NSS in FIPS mode any longer. This
has always been the case on Android from what I can tell and it has been the
case on OS X since at least version 34 (see bug 1047584). It became the case on
Windows as of version 53 (see bug 1295937). Unfortunately, before this patch,
if a user attempted to run an affected version of Firefox using a profile
directory containing an NSS database collection that had FIPS enabled, NSS
initialization would fail and fall back to running in no DB mode, which had the
side-effect of making any saved passwords and certificates unavailable. This
patch attempts to detect and work around this failure mode by moving the
PKCS#11 module DB (which is where the FIPS bit is set) to a backup location and
basically running with a fresh, non-FIPS module DB. This allows Firefox to
initialize NSS with the preexisting key and certificate databases available.

MozReview-Commit-ID: 1E4u1ngZyRv

--HG--
rename : security/manager/ssl/tests/unit/test_sdr_preexisting.js => security/manager/ssl/tests/unit/test_broken_fips.js
rename : security/manager/ssl/tests/unit/test_sdr_preexisting/key3.db => security/manager/ssl/tests/unit/test_broken_fips/key3.db
extra : rebase_source : 887f457e998d6e57c6536573fbe3cb10547fe154
2017-04-20 10:31:22 -07:00
Wes Kocher
be34ade6b6 Merge autoland to central, a=merge
MozReview-Commit-ID: 2pgVZdnDKno
2017-04-27 12:44:03 -07:00
ffxbld
068e6f2925 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2017-04-27 07:52:27 -07:00
ffxbld
7d28817077 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2017-04-27 07:52:24 -07:00
Jed Davis
3c4e538953 Bug 1361238 - Re-allow accept4, used by accessibility. r=gcp
MozReview-Commit-ID: 3M3T3bkx4nP

--HG--
extra : rebase_source : b67332889615ae34cc67737da361f21ae545aeb4
2017-05-01 21:51:11 -06:00
Jed Davis
7d9acbdace Bug 1358647 - Disallow bind/listen/accept for Linux content processes. r=gcp
MozReview-Commit-ID: Cz9MKxOJnsS

--HG--
extra : rebase_source : d3ab7ff9020066d5fe9ac3121c88c85b9fde6224
2017-04-25 19:29:32 -06:00
Wes Kocher
226702fd85 Merge m-c to autoland a=merge
MozReview-Commit-ID: LOGgOErcV9L
2017-04-26 17:43:38 -07:00
ffxbld
ce5ccb6a8c No bug, Automated HPKP preload list update from host bld-linux64-spot-304 - a=hpkp-update 2017-04-26 08:02:08 -07:00
ffxbld
728d6a0b30 No bug, Automated HSTS preload list update from host bld-linux64-spot-304 - a=hsts-update 2017-04-26 08:02:05 -07:00
ffxbld
876c7dd305 No bug, Automated HPKP preload list update from host bld-linux64-spot-301 - a=hpkp-update 2017-04-25 07:57:31 -07:00
ffxbld
1d0cdb27cb No bug, Automated HSTS preload list update from host bld-linux64-spot-301 - a=hsts-update 2017-04-25 07:57:28 -07:00
David Keeler
fe73f5843c bug 1356499 - put NCSCCS pins into production mode r=mgoodwin
As requested by James Burton<jb@0.me.uk> and vouched for (via email) by
Lucas Garron <lgarron@google.com>.

MozReview-Commit-ID: HD9laXzJpRg

--HG--
extra : rebase_source : 7c632c6772509a3c4c03cf971ee0f62ad5225275
2017-04-25 14:33:07 -07:00
Wes Kocher
05a47acee9 Merge m-c to inbound a=merge
MozReview-Commit-ID: 3NCtyMc525N
2017-04-24 16:14:52 -07:00
Wes Kocher
94ff05c50d Merge autoland to central, a=merge
MozReview-Commit-ID: EaYU8ma2C4H
2017-04-24 15:45:27 -07:00
ffxbld
baf47b352e No bug, Automated HPKP preload list update from host bld-linux64-spot-309 - a=hpkp-update 2017-04-24 07:53:50 -07:00
ffxbld
e2320972af No bug, Automated HSTS preload list update from host bld-linux64-spot-309 - a=hsts-update 2017-04-24 07:53:47 -07:00
ffxbld
313e5199bf No bug, Automated HPKP preload list update from host bld-linux64-spot-304 - a=hpkp-update 2017-04-23 07:58:17 -07:00
ffxbld
16b68f30f8 No bug, Automated HSTS preload list update from host bld-linux64-spot-304 - a=hsts-update 2017-04-23 07:58:14 -07:00
David Parks
532fe74f04 Bug 1347710 - Enable sandbox protections for the Windows GPU process. r=bobowen
The sandbox works with levels.  The GPU sandbox level defaults to 1 in all builds.  It is controlled by security.sandbox.gpu.level.
2017-04-24 09:46:09 -07:00
ffxbld
cfbd9ba5ea No bug, Automated HPKP preload list update from host bld-linux64-spot-305 - a=hpkp-update 2017-04-21 07:57:04 -07:00
ffxbld
7e0a6b7086 No bug, Automated HSTS preload list update from host bld-linux64-spot-305 - a=hsts-update 2017-04-21 07:57:01 -07:00
Carsten "Tomcat" Book
975e251aff merge mozilla-inbound to mozilla-central a=merge 2017-04-21 10:57:02 +02:00
Wes Kocher
4f3c2d9829 Merge m-c to autoland, a=merge
MozReview-Commit-ID: DPzfAm14Tdx
2017-04-20 15:52:28 -07:00
Nathan Froyd
35bd9439ac Bug 1357741 - make nsCertOverrideService's locking more efficient; r=keeler
nsCertOverrideService uses a ReentrantMonitor to protect its inner
state.  However, there's no way for nsCertOverrideService's methods to
be re-entered when calling outside code.  The use of ReentrantMonitor
appears to be compensating for an unclear division of locking
responsibilities, by enabling every method to simply lock the
ReentrantMonitor upon entrance without care for who might have locked it
beforehand.

Using Mutex is cheaper than ReentrantMonitor, and also forces us to
make explicit who's required to do locking, and who needs to do work
with the lock held.
2017-04-20 10:02:19 -04:00
David Keeler
af0ce9fbd6 bug 1357226 - work around a library inefficiency with EC keys when verifying ECDSA signatures r=fkiefer,jcj
Calling VFY_VerifyDigestDirect causes the provided SECKEYPublicKey to be
reimported to the softoken regardless of if it already exists on it. EC keys
must be verified upon import (to see if the point is on the curve to avoid some
small subgroup attacks), and so repeatedly doing this with a static key (say,
for example, a key corresponding to a built-in certificate transparency log) is
inefficient. This patch alters the certificate transparency implementation to
import these keys each once and then use PK11_Verify for ECDSA signature
verification, which doesn't have the same drawback.

Since this change causes CertVerifier to hold an NSS resource (via its
MultiLogCTVerifier having a list of CTLogVerifier, each of which now has a
SECKEYPublicKey), nsNSSComponent has to make sure it goes away before shutting
down NSS. This patch ensures this happens in nsNSSComponent::ShutdownNSS().

MozReview-Commit-ID: 6VSmz7S53y2

--HG--
extra : rebase_source : 4994db9de80a6c1aec3d7e322ff30d040140ce92
2017-04-11 14:11:28 -07:00
Sebastian Hengst
380838cbce merge mozilla-central to autoland. r=merge a=merge 2017-04-19 18:57:30 +02:00
ffxbld
305510c8ee No bug, Automated HPKP preload list update from host bld-linux64-spot-305 - a=hpkp-update 2017-04-19 08:02:50 -07:00