Closed
Bug 1025606
Opened 10 years ago
Closed 10 years ago
[Flame] Ensure IPv6 defaults to privacy extensions enabled
Categories
(Firefox OS Graveyard :: GonkIntegration, defect)
Tracking
(Not tracked)
RESOLVED
FIXED
2.1 S8 (7Nov)
People
(Reporter: gerard-majax, Assigned: gerard-majax)
References
Details
(Keywords: csectype-disclosure, sec-moderate, verifyme, Whiteboard: [systemsfe])
Attachments
(4 files, 3 obsolete files)
The current IPv6 configuration on Flame does not make use of the IPv6 privacy extensions, leading to potential leaking of personnal infos.
Assignee | ||
Comment 1•10 years ago
|
||
The fix involve just pushing the proper option to use_tempaddr:
> echo 2 > /proc/sys/net/ipv6/conf/default/use_tempaddr
After this, the IPv6 addr preferred is a generated one.
Assignee | ||
Comment 2•10 years ago
|
||
Screenshot after enabling IPv6 privacy extension.
Assignee | ||
Updated•10 years ago
|
Attachment #8440376 -
Attachment description: 2014-06-15-11-36-34.png → IPv6 without privacy extensions
Assignee | ||
Comment 3•10 years ago
|
||
This should be set in init.qcom.sh from device/qcom/common
Viral, Vance, can you reach to CAF for this? This should help enforcing user privacy.
Flags: needinfo?(vwang)
Flags: needinfo?(vchen)
Flags: needinfo?(asa)
Assignee | ||
Comment 4•10 years ago
|
||
Assignee | ||
Updated•10 years ago
|
Attachment #8488595 -
Flags: review?(vwang)
Hi Alexandre -
This happens on JB or KK build?
Thanks
Vance
Flags: needinfo?(vchen) → needinfo?(lissyx+mozillians)
Assignee | ||
Comment 6•10 years ago
|
||
(In reply to Vance Chen [:vchen][vchen@mozilla.com] from comment #5)
> Hi Alexandre -
>
> This happens on JB or KK build?
>
> Thanks
>
> Vance
Both.
Flags: needinfo?(lissyx+mozillians) → needinfo?(vchen)
Updated•10 years ago
|
Whiteboard: [systemsfe]
Target Milestone: --- → 2.1 S5 (26sep)
Comment 8•10 years ago
|
||
Comment on attachment 8488595 [details] [diff] [review]
Ensure IPv6 privacy extensions are used
I think we should move it to device-flame/init.target.rc to reduce the maintain effort.
Attachment #8488595 -
Flags: review?(vwang)
Assignee | ||
Updated•10 years ago
|
Attachment #8488595 -
Attachment is obsolete: true
Assignee | ||
Comment 9•10 years ago
|
||
Attachment #8493799 -
Flags: review?(mwu)
Assignee | ||
Comment 10•10 years ago
|
||
Attachment #8493800 -
Flags: review?(mwu)
Comment 11•10 years ago
|
||
Hmm. Well, at minimum we should use RFC 7217 to hide the mac address. dhcpcd 6.4 supports that. Unfortunately the shipping dhcpcd doesn't seem to be that new, and this is easier to turn on. There seems to be some complaints about the privacy extensions that aren't an issue with RFC7217. However, it sounds like iOS 7 has privacy extensions turned on, so maybe it's not a big deal.
Updated•10 years ago
|
Target Milestone: 2.1 S5 (26sep) → 2.1 S6 (10oct)
Assignee | ||
Comment 12•10 years ago
|
||
(In reply to Michael Wu [:mwu] from comment #11)
> Hmm. Well, at minimum we should use RFC 7217 to hide the mac address. dhcpcd
> 6.4 supports that. Unfortunately the shipping dhcpcd doesn't seem to be that
> new, and this is easier to turn on. There seems to be some complaints about
> the privacy extensions that aren't an issue with RFC7217. However, it sounds
> like iOS 7 has privacy extensions turned on, so maybe it's not a big deal.
So, r+ or r- ?
Flags: needinfo?(mwu)
Updated•10 years ago
|
Target Milestone: 2.1 S6 (10oct) → 2.1 S7 (Oct24)
Comment 13•10 years ago
|
||
(In reply to Alexandre LISSY :gerard-majax from comment #12)
> (In reply to Michael Wu [:mwu] from comment #11)
> > Hmm. Well, at minimum we should use RFC 7217 to hide the mac address. dhcpcd
> > 6.4 supports that. Unfortunately the shipping dhcpcd doesn't seem to be that
> > new, and this is easier to turn on. There seems to be some complaints about
> > the privacy extensions that aren't an issue with RFC7217. However, it sounds
> > like iOS 7 has privacy extensions turned on, so maybe it's not a big deal.
>
> So, r+ or r- ?
Flags: sec-review?(fbraun)
Comment 14•10 years ago
|
||
Freddy, can you have a look at this from a secreview perspective. Sounds like an important feature but I'm interested to know what implications there are for enabling this.
Flags: needinfo?(fbraun)
Comment 15•10 years ago
|
||
BTW, regarding the implementation, if we want to do this, we should enable it *everywhere*, through init.b2g.rc and then pushing upstream to CAF since they don't use init.b2g.rc.
Flags: needinfo?(mwu)
Comment 16•10 years ago
|
||
I am going to call this "sec moderate": Leaking "private" through your IPv6 isn't uncommon but not something we'd like to keep.
I can't r+ this as asked in the quote from Alexandre, but I support the idea of enabling them across all supported platforms.
Flags: sec-review?(fbraun)
Flags: sec-review+
Flags: needinfo?(fbraun)
Keywords: csectype-disclosure,
sec-moderate
Updated•10 years ago
|
Attachment #8493799 -
Flags: review?(mwu)
Comment 17•10 years ago
|
||
Comment on attachment 8493800 [details] [review]
KK Device PR
Clearing review since we'd like this to apply everywhere. I suggest patching init.b2g.rc, and then having a separate patch for the init.rc in CAF's system/core. The init.rc patch would go upstream.
Attachment #8493800 -
Flags: review?(mwu)
Assignee | ||
Comment 18•10 years ago
|
||
Michael, this is the PR for init.b2g.rc. How are we supposed to make partner's include this?
Attachment #8493799 -
Attachment is obsolete: true
Attachment #8493800 -
Attachment is obsolete: true
Attachment #8506096 -
Flags: review?(mwu)
Comment 19•10 years ago
|
||
Comment on attachment 8506096 [details] [review]
PR for gonk-misc
This will fix it for everything but CAF based devices. For CAF, make a patch against the copy of init.rc in system/core and request review from :m1 .
Attachment #8506096 -
Flags: review?(mwu) → review+
Assignee | ||
Comment 20•10 years ago
|
||
Assignee | ||
Updated•10 years ago
|
Attachment #8506907 -
Flags: review?(mvines)
Updated•10 years ago
|
Attachment #8506907 -
Flags: review?(mvines) → review+
Assignee | ||
Comment 21•10 years ago
|
||
Thanks, how do we get this landed on CAF side now?
Flags: needinfo?(mvines)
Assignee | ||
Comment 22•10 years ago
|
||
Comment 23•10 years ago
|
||
(In reply to Alexandre LISSY :gerard-majax from comment #21)
> Thanks, how do we get this landed on CAF side now?
We'll track it internally for the next product release. There is no branch on CAF at this time though, so if you want this to apply to Flame now then a Mozilla fork will be needed for your usage.
Flags: needinfo?(mvines)
Updated•10 years ago
|
Target Milestone: 2.1 S7 (24Oct) → 2.1 S8 (7Nov)
Assignee | ||
Comment 24•10 years ago
|
||
(In reply to Michael Vines [:m1] [:evilmachines] from comment #23)
> (In reply to Alexandre LISSY :gerard-majax from comment #21)
> > Thanks, how do we get this landed on CAF side now?
>
> We'll track it internally for the next product release. There is no branch
> on CAF at this time though, so if you want this to apply to Flame now then a
> Mozilla fork will be needed for your usage.
I'm not a big fan of forking if CAF will include. When is the next product release planned?
Flags: needinfo?(mvines)
Assignee | ||
Comment 26•10 years ago
|
||
(In reply to Michael Vines [:m1] [:evilmachines] from comment #25)
> Please contact your product management team.
Candice, do you have any input on this?
Flags: needinfo?(cserran)
Comment 27•10 years ago
|
||
(In reply to Alexandre LISSY :gerard-majax from comment #26)
> (In reply to Michael Vines [:m1] [:evilmachines] from comment #25)
> > Please contact your product management team.
>
> Candice, do you have any input on this?
Gregor to respond via email as this is partner-sensitive...
Flags: needinfo?(cserran)
Assignee | ||
Comment 28•10 years ago
|
||
To be verified once CAF has this.
Flags: needinfo?(vchen)
Assignee | ||
Updated•9 years ago
|
Flags: needinfo?(asa)
Comment 29•9 years ago
|
||
This issue appears to be an issue Qanalyst is unable to verify. Marking QAExclude in QA Whiteboard.
QA Whiteboard: QAExclude
Flags: needinfo?(jmercado)
Updated•9 years ago
|
Flags: needinfo?(jmercado)
You need to log in
before you can comment on or make changes to this bug.
Description
•