Closed
Bug 1013558
Opened 10 years ago
Closed 10 years ago
ApplicationReputation should return shouldBlock=true if the remote verdict is DANGEROUS_HOST or UNKNOWN
Categories
(Core :: DOM: Security, defect)
Tracking
()
RESOLVED
FIXED
mozilla33
People
(Reporter: mmc, Assigned: mmc)
References
(Blocks 1 open bug)
Details
Attachments
(1 file, 2 obsolete files)
232.39 KB,
patch
|
mmc
:
review+
|
Details | Diff | Splinter Review |
Currently we only return shouldBlock=true if the remote verdict is DANGEROUS, but the API has evolved since then. DANGEROUS_HOST can use the same string as DANGEROUS and should also delete the downloaded target file. UNKNOWN needs a slightly different one, e.g. "download.exe is not commonly downloaded and could be dangerous". When we're ready we should double-check what Chrome is doing in the UNKNOWN case (removing the final target or not).
Assignee | ||
Updated•10 years ago
|
Blocks: downloadprotection
Assignee | ||
Comment 1•10 years ago
|
||
Assignee | ||
Updated•10 years ago
|
Assignee: nobody → mmc
Status: NEW → ASSIGNED
Assignee | ||
Comment 2•10 years ago
|
||
Assignee | ||
Updated•10 years ago
|
Attachment #8433613 -
Attachment is obsolete: true
Assignee | ||
Comment 3•10 years ago
|
||
Comment on attachment 8433616 [details] [diff] [review] ApplicationReputation should block if verdict is DANGEROUS_HOST ( Review of attachment 8433616 [details] [diff] [review]: ----------------------------------------------------------------- The generated files are generated by downloading http://src.chromium.org/viewvc/chrome/trunk/src/chrome/common/safe_browsing/csd.proto and running the protoc (protocol compiler) on it. I stripped protocol buffers that we were not using, since this file has grown since we used it last.
Attachment #8433616 -
Flags: review?(gpascutto)
Comment 4•10 years ago
|
||
Comment on attachment 8433616 [details] [diff] [review] ApplicationReputation should block if verdict is DANGEROUS_HOST ( Review of attachment 8433616 [details] [diff] [review]: ----------------------------------------------------------------- Maybe you should put a file like this, which describes how to generate the content from the upstream: http://mxr.mozilla.org/mozilla-central/source/media/libvorbis/README_MOZILLA ::: toolkit/components/downloads/ApplicationReputation.cpp @@ +975,5 @@ > return NS_ERROR_CANNOT_CONVERT_DATA; > } > > + // There are several more verdicts, but we only respect DANGEROUS and > + // DANGEROUS_HOST for now and treat everything else as SAFE. Any follow up bugs for the remainder?
Attachment #8433616 -
Flags: review?(gpascutto) → review+
Assignee | ||
Comment 5•10 years ago
|
||
(In reply to Gian-Carlo Pascutto [:gcp] from comment #4) > Comment on attachment 8433616 [details] [diff] [review] > ApplicationReputation should block if verdict is DANGEROUS_HOST ( > > Review of attachment 8433616 [details] [diff] [review]: > ----------------------------------------------------------------- > > Maybe you should put a file like this, which describes how to generate the > content from the upstream: > http://mxr.mozilla.org/mozilla-central/source/media/libvorbis/README_MOZILLA > > ::: toolkit/components/downloads/ApplicationReputation.cpp > @@ +975,5 @@ > > return NS_ERROR_CANNOT_CONVERT_DATA; > > } > > > > + // There are several more verdicts, but we only respect DANGEROUS and > > + // DANGEROUS_HOST for now and treat everything else as SAFE. > > Any follow up bugs for the remainder? https://bugzilla.mozilla.org/show_bug.cgi?id=1019933 for UNKNOWN_HOST. Presumably by the time we implement that there will be another one :P
Assignee | ||
Comment 6•10 years ago
|
||
Assignee | ||
Updated•10 years ago
|
Attachment #8433616 -
Attachment is obsolete: true
Assignee | ||
Comment 7•10 years ago
|
||
Comment on attachment 8446824 [details] [diff] [review] ApplicationReputation should block if verdict is DANGEROUS_HOST ( I added a comment to the script that already generates this instead of adding another README.
Attachment #8446824 -
Flags: review+
Assignee | ||
Updated•10 years ago
|
Keywords: checkin-needed
Comment 8•10 years ago
|
||
https://hg.mozilla.org/integration/mozilla-inbound/rev/061a225551cb
Keywords: checkin-needed
Comment 9•10 years ago
|
||
*sigh* Thought I saw a Try push on this. Apparently not. Backed out for bustage. In the future, please provide one when requesting checkin as per the the policy announced on dev-platform awhile ago now. https://hg.mozilla.org/integration/mozilla-inbound/rev/4ef3fa0ebedf https://tbpl.mozilla.org/php/getParsedLog.php?id=42625385&tree=Mozilla-Inbound
Assignee | ||
Comment 10•10 years ago
|
||
Argh, sorry about that -- -Werror_switch is enabled on some platforms but not others :( Green try: https://tbpl.mozilla.org/?tree=Try&rev=706d56280f59 https://hg.mozilla.org/integration/mozilla-inbound/rev/6810b2fa1afe
Comment 11•10 years ago
|
||
https://hg.mozilla.org/mozilla-central/rev/6810b2fa1afe
Status: ASSIGNED → RESOLVED
Closed: 10 years ago
Resolution: --- → FIXED
Target Milestone: --- → mozilla33
You need to log in
before you can comment on or make changes to this bug.
Description
•