Closed Bug 1025606 Opened 10 years ago Closed 10 years ago

[Flame] Ensure IPv6 defaults to privacy extensions enabled

Categories

(Firefox OS Graveyard :: GonkIntegration, defect)

ARM
Gonk (Firefox OS)
defect
Not set
normal

Tracking

(Not tracked)

RESOLVED FIXED
2.1 S8 (7Nov)

People

(Reporter: gerard-majax, Assigned: gerard-majax)

References

Details

(Keywords: csectype-disclosure, sec-moderate, verifyme, Whiteboard: [systemsfe])

Attachments

(4 files, 3 obsolete files)

The current IPv6 configuration on Flame does not make use of the IPv6 privacy extensions, leading to potential leaking of personnal infos.
The fix involve just pushing the proper option to use_tempaddr: > echo 2 > /proc/sys/net/ipv6/conf/default/use_tempaddr After this, the IPv6 addr preferred is a generated one.
Attached image IPv6 Privacy preferred
Screenshot after enabling IPv6 privacy extension.
Attachment #8440376 - Attachment description: 2014-06-15-11-36-34.png → IPv6 without privacy extensions
This should be set in init.qcom.sh from device/qcom/common Viral, Vance, can you reach to CAF for this? This should help enforcing user privacy.
Flags: needinfo?(vwang)
Flags: needinfo?(vchen)
Flags: needinfo?(asa)
Attachment #8488595 - Flags: review?(vwang)
Hi Alexandre - This happens on JB or KK build? Thanks Vance
Flags: needinfo?(vchen) → needinfo?(lissyx+mozillians)
(In reply to Vance Chen [:vchen][vchen@mozilla.com] from comment #5) > Hi Alexandre - > > This happens on JB or KK build? > > Thanks > > Vance Both.
Flags: needinfo?(lissyx+mozillians) → needinfo?(vchen)
Whiteboard: [systemsfe]
Target Milestone: --- → 2.1 S5 (26sep)
I think Vance already help on this, thanks :)
Flags: needinfo?(vwang)
Comment on attachment 8488595 [details] [diff] [review] Ensure IPv6 privacy extensions are used I think we should move it to device-flame/init.target.rc to reduce the maintain effort.
Attachment #8488595 - Flags: review?(vwang)
Attachment #8488595 - Attachment is obsolete: true
Attached file JB Device PR (obsolete) —
Attachment #8493799 - Flags: review?(mwu)
Attached file KK Device PR (obsolete) —
Attachment #8493800 - Flags: review?(mwu)
Hmm. Well, at minimum we should use RFC 7217 to hide the mac address. dhcpcd 6.4 supports that. Unfortunately the shipping dhcpcd doesn't seem to be that new, and this is easier to turn on. There seems to be some complaints about the privacy extensions that aren't an issue with RFC7217. However, it sounds like iOS 7 has privacy extensions turned on, so maybe it's not a big deal.
Target Milestone: 2.1 S5 (26sep) → 2.1 S6 (10oct)
(In reply to Michael Wu [:mwu] from comment #11) > Hmm. Well, at minimum we should use RFC 7217 to hide the mac address. dhcpcd > 6.4 supports that. Unfortunately the shipping dhcpcd doesn't seem to be that > new, and this is easier to turn on. There seems to be some complaints about > the privacy extensions that aren't an issue with RFC7217. However, it sounds > like iOS 7 has privacy extensions turned on, so maybe it's not a big deal. So, r+ or r- ?
Flags: needinfo?(mwu)
Target Milestone: 2.1 S6 (10oct) → 2.1 S7 (Oct24)
(In reply to Alexandre LISSY :gerard-majax from comment #12) > (In reply to Michael Wu [:mwu] from comment #11) > > Hmm. Well, at minimum we should use RFC 7217 to hide the mac address. dhcpcd > > 6.4 supports that. Unfortunately the shipping dhcpcd doesn't seem to be that > > new, and this is easier to turn on. There seems to be some complaints about > > the privacy extensions that aren't an issue with RFC7217. However, it sounds > > like iOS 7 has privacy extensions turned on, so maybe it's not a big deal. > > So, r+ or r- ?
Flags: sec-review?(fbraun)
Freddy, can you have a look at this from a secreview perspective. Sounds like an important feature but I'm interested to know what implications there are for enabling this.
Flags: needinfo?(fbraun)
BTW, regarding the implementation, if we want to do this, we should enable it *everywhere*, through init.b2g.rc and then pushing upstream to CAF since they don't use init.b2g.rc.
Flags: needinfo?(mwu)
I am going to call this "sec moderate": Leaking "private" through your IPv6 isn't uncommon but not something we'd like to keep. I can't r+ this as asked in the quote from Alexandre, but I support the idea of enabling them across all supported platforms.
Flags: sec-review?(fbraun)
Flags: sec-review+
Flags: needinfo?(fbraun)
Attachment #8493799 - Flags: review?(mwu)
Comment on attachment 8493800 [details] [review] KK Device PR Clearing review since we'd like this to apply everywhere. I suggest patching init.b2g.rc, and then having a separate patch for the init.rc in CAF's system/core. The init.rc patch would go upstream.
Attachment #8493800 - Flags: review?(mwu)
Attached file PR for gonk-misc
Michael, this is the PR for init.b2g.rc. How are we supposed to make partner's include this?
Attachment #8493799 - Attachment is obsolete: true
Attachment #8493800 - Attachment is obsolete: true
Attachment #8506096 - Flags: review?(mwu)
Comment on attachment 8506096 [details] [review] PR for gonk-misc This will fix it for everything but CAF based devices. For CAF, make a patch against the copy of init.rc in system/core and request review from :m1 .
Attachment #8506096 - Flags: review?(mwu) → review+
Attachment #8506907 - Flags: review?(mvines)
Attachment #8506907 - Flags: review?(mvines) → review+
Thanks, how do we get this landed on CAF side now?
Flags: needinfo?(mvines)
(In reply to Alexandre LISSY :gerard-majax from comment #21) > Thanks, how do we get this landed on CAF side now? We'll track it internally for the next product release. There is no branch on CAF at this time though, so if you want this to apply to Flame now then a Mozilla fork will be needed for your usage.
Flags: needinfo?(mvines)
Target Milestone: 2.1 S7 (24Oct) → 2.1 S8 (7Nov)
(In reply to Michael Vines [:m1] [:evilmachines] from comment #23) > (In reply to Alexandre LISSY :gerard-majax from comment #21) > > Thanks, how do we get this landed on CAF side now? > > We'll track it internally for the next product release. There is no branch > on CAF at this time though, so if you want this to apply to Flame now then a > Mozilla fork will be needed for your usage. I'm not a big fan of forking if CAF will include. When is the next product release planned?
Flags: needinfo?(mvines)
Please contact your product management team.
Flags: needinfo?(mvines)
(In reply to Michael Vines [:m1] [:evilmachines] from comment #25) > Please contact your product management team. Candice, do you have any input on this?
Flags: needinfo?(cserran)
(In reply to Alexandre LISSY :gerard-majax from comment #26) > (In reply to Michael Vines [:m1] [:evilmachines] from comment #25) > > Please contact your product management team. > > Candice, do you have any input on this? Gregor to respond via email as this is partner-sensitive...
Flags: needinfo?(cserran)
To be verified once CAF has this.
Status: NEW → RESOLVED
Closed: 10 years ago
Keywords: verifyme
Resolution: --- → FIXED
Flags: needinfo?(asa)
This issue appears to be an issue Qanalyst is unable to verify. Marking QAExclude in QA Whiteboard.
QA Whiteboard: QAExclude
Flags: needinfo?(jmercado)
Flags: needinfo?(jmercado)
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Creator:
Created:
Updated:
Size: