129.41 KB, image/png
6.03 KB, text/plain
42.85 KB, patch
|Details | Diff | Splinter Review|
3.84 KB, patch
|Details | Diff | Splinter Review|
(Create a stream converter that) cleans up HTML documents. Removes everything from the doc that is not explicitly allowed. This helps a lot with security. Users are e.g. HTML mail or security fanatics browsing the web.
Summary: HTML santinizer → HTML sanitizer
Good news! I have a rudimentary version working. It strips all tags and attributes, which are not explicitly allowed, from the document. That way, you can have the advantages of HTML (expressive and mostly unambiguous syntax, in contrast to plaintext) without most of the disadvantages (large security and privacy problems). In fact, I think that this feature is what makes HTML mail a useable (and possibly preferable) option. THe code might also be used to an ultra-secure (and uncomfortable) browser, but I don't have this implemented yet. My current implementation is, however, relatively dumb about what can be allowed and disallowed - you can only (dis)allow certain tags and attributes, but not where they may appear. (This makes the implementation much more simple.) E.g. it is impossible to disallow a certain element being a child of another element or to disallow multiple <head> nodes. Currently, you can't even disallow text directly inside an element, e.g. the <head> node (I might fix that case, however). Disallowed tags and attributes will just not be output to the result. This is in line with the HTML convention of just ignoring unknown tags. (You should be able to remove the <applet>/</applet> tags an still get a reasonable document.) I also hooked this up with Mailnews' libmime. I added it as new option to the View|Body menu introduced in bug 30888. The current implementation takes a (Mozilla Gecko-)parsed HTML document and outputs HTML source to a string. This means that we have to parse the result again. I am aware of the performance implications and I wrote a longer explanation in the source as comments. This blocks bug 54182, because I want to make this the default in Beonex Communicator. I don't request review yet, because I want to clean up the source more and refactor it more. Maybe, I'll be done later this day.
Status: NEW → ASSIGNED
Target Milestone: --- → mozilla0.9.9
This bug exposes bug 125983.
This is a screenshot once of the message with the sender's HTML (as rendered currently by Mozilla) (left) and once ran through the sanitizer (if enabled) (right). The sanitizer pref was sat to allow tables and some presentational formatting like <b>. You could also disallow tables, in which case everything would be rendered in in a single colunm (in the order it appears in the HTML source). Note that the left original has the much-hated horizontal scrollbar, while the right sanitized version doesn't.
This is the current state of my work. It still has some rough edges (e.g. a leak), which I need to clean up. It is needed for the patch in bug 30888, however. There, you can find the rest of the fix for this bug (namely, the Mailnews part).
This is a test application for the sink. You can copy it over htmlparser/tests/outsinks/Convert.cpp. Then, invoke TestOutput with an HTML file as param. Don't forget to set LD_LIBRARY_PATH and MOZILLA_FIVE_HOME.
There's a tiny error in the diff: in mozSanitizingHTMLSerializer.cpp, line 24, there a question mark after the comment. Please remove it.
akk pointed me to the DTD classes (e.g. htmlparser/src/nsWebFormedDTD.*) and said that I might be able to use them to restrict the allowed tags/attributes more flexible and cleanly. That hint is much appreciated, but I guess it's too late for that now - I'd like to get that in for 1.0 and have no time to complete rewrite the content/ part of this bug, considering that the current solution works.
I filled in the destruction or clean up mem. I am now requesting review. akk, can you do that, please? The code is not pretty - I am not proud of the implementation. But maybe it will be rewritten later with DTDs anyways. And the code seems to do its job for now and sctaches a big itch (solution/workaround for bug 28327). To see the code in action, you need either the test app (see above) or the non-overlapping part of the oatch for bug 30888 (which contains part of this bug) (take the "everything" patch there and manually delete everything content/ from the patch before applying it, because it contains an older version of the patch here).
Attachment #70305 - Attachment is obsolete: true
Keywords: patch, review
Priority: -- → P2
Whiteboard: Done, waiting for review
Target Milestone: mozilla0.9.9 → mozilla1.0
This is needed in order to build the patch (version 2) on Mac
ben: can you confirm this is a networking bug?
In its initial constellation, it would have had a network component. This component is not yet implemented yet, though, and will be moved to a new bug. Moving to Mailnews for the lack of a better bugzilla Component. I suggest the QA is the same as bug 30888.
Component: Networking → MIME
Product: Browser → MailNews
Status: ASSIGNED → RESOLVED
Last Resolved: 17 years ago
Resolution: --- → FIXED
Fix checked into trunk. Yay, finally! Thanks to all reviewers and all others involved. This is not yet in the 1.0 branch. I still would like to check it into the branch. If not, it would not be in any Mozilla 1.0 releases, but only trunk nightlies and 1.1alpha. Please test the feature and try to circumvent it, i.e. get arbitary HTML rendered although the new options are active. If so, please file a new bug against Mailnews/MIME, owner me, and mention it here. Some documentation can be found at <http://www.beonex.com/temp/index.html>. When I have ftp access to my private server again, I will move it to <http://www.bucksch.com/1/projects/mozilla/108153>.
+qawanted - I'm probably not the best person to QA this, both for time and expertise reasons.
I have verified the mailnews portion of this bug when verifying 30888. Is there someone who can verifiy the browser portion, I don't see a preference or menu item for sanitizing browser pages as seen in comment #3's attachment.
Esther, I didn't implement the browser option (yet). It was originally an idea, but I didn't have the time/mood/use-case for it. I'll track that in another bug (I will reference it here), if I will implement it one day. So, if you verified the Mailnews part, you verified it all already ;-). The screenshot in comment 3 is Mailnews.
Your right, sorry I didn't see that. Then I'll verify this. Note, I see in bug 18427 that you make a statement that since this bug is fixed there is nothing left to do in 18427. However a bug marked a dup of 18427 (the dup is 30896) is still being worked on by sspitzer and ssu after the fixed date for this bug. These bugs are getting complex and hard to follow. Would you say that 30896 is not a dup of 18427. If so, then I will change the dup status of 30896 and then verify 18427 per testing I did for bug 30888.
Status: RESOLVED → VERIFIED
How to enable this (bug 108153's) fix, as far as I can tell (it's not in the UI, AFAIK): The code says: + aPref is a long string, which holds an exhaustive list of allowed tags + and attributes. All other tags and attributes will be removed. + + aPref has the format + "html head body ul ol li a(href,name,title) img(src,alt,title) #text" + i.e. + - tags are separated by whitespace + - the attribute list follows the tag directly in brackets + - the attributes are separated by commas. preference setting mailnews.display.html_sanitizer.allowed_tags (see URL: about:config) is html head title body p br div(lang,title) h1 h2 h3 h4 h5 h6 ul ol li(value,start,compact) dl dt dd blockquote(type,cite) pre noscript noframes strong em sub sup span(lang,title) acronym(title) abbr(title) del(title,cite,datetime) ins(title,cite,datetime) q(cite) a(href,name,title) img(alt,title,longdesc,src) base(href) area(alt) applet(alt) object(alt) var samp dfn address kbd code cite s strike tt b i table(align) caption tr(align,valign) td(rowspan,colspan,align,valign) th(rowspan,colspan,align,valign) by default. I'm deleting div(...), src from img, applet(...), and object(...). As an attempted partial workaround for bug 28327. Not sure about the safety of base and area, among other tags. Still doesn't block ReadNotify, I think. Dox such as this are needed in http://www.mozilla.org/unix/customizing.html#prefs; akkana%netscape.com, can you add some dox for this pref there? (OT: akkana, some mention of where the prefs file is for the poor M$ users and/or on URL: about:config would be great too. Yeah I know its in /unix/, but now it's referenced in the Release Notes for all platforms...)
> akkana%netscape.com, can you add some dox for this pref there? Okay, I've now read through bug 28327 (thanks for the pointer!) But I'm not sure I understand your setting. Can you explain why div has to be blocked, but span doesn't? I understand removing applet and object (Ben, I'm surprised those are normally included -- is there a reason for that?) and I thought removing img entirely was part of the whole point of sanitized html? (I can't tell, because I block images in mail anyway, so the fact that I never see them in sanitized html doesn't tell me anything.) What about area -- if img is gone, does area make any sense? I also wonder about base -- anybody know? Seems like removing it from the list should be fairly safe. Anyway, I'm quite happy to document it, but I'd appreciate it if someone who's been following the issue longer than I have would provide a sensible comment so I don't have to make one up. And we might as well get a good list to suggest, or perhaps a couple of good lists for varying levels of security. > akkana, some mention of where the prefs file is for the poor M$ user Someone who actually is a MS user should mail me that info as a contribution. Do "find files on disk" or whatever they're calling it now, and look for prefs.js, and you'll probably find it. Then write that up in a way that will make sense to a typical MS user, and mail it to me, and I'll check it in (with credit). A Linux user writing guesses at how MS users might find their prefs file is probably not the best approach to documentation. :-) (I will write up something on about:config.)
> How to enable this (bug 108153's) fix ... (it's not in the UI, AFAIK): It is. Menu|Message|Body|Simple HTML (Checked in as part of bug 30888, see comment 1.) You cannot customize (via the UI) the list of HTML tags to allow, though. > I'm deleting div(...), src from img, applet(...), and object(...). > As an attempted partial workaround for bug 28327. You don't need to do that. By default, it doesn't allow anything that causes network activity (IIRC). If you can live with (or want) the reduced HTML, this bug completely fixes bug 28327, unless I missed something. > some mention of where the prefs file is for the poor M$ user uhm, release notes? It's probably explained somewhere under www.mozilla.org's end-user doc section as well. Maybe just link it. Hey akk, nice to talk to you again, > I understand removing applet and object (Ben, I'm surprised those > are normally included -- is there a reason for that?) Unless I'm missing something, only the |alt| attribute of <object>, <applet> etc. is allowed and <param> is not allowed at all, so the tags are intentionally crippled so much that only the alternative text remains, the active content is disfunctional (at least it should be). > I thought removing img entirely was part of the whole point of > sanitized html? Not quite. The point was mainly to get rid of any privacy and security threats that HTML mail poses. External images are privacy threats, images embedded in the mail are not and thus allowed. Getting rid of the formatting annoyance of HTML was also a goal. Images are (or at least can be) important content, so I allowed them, when possible. You could argue that images might have offending content, but then again, attached images will be shown inline with plaintext as well, so we are no different here. You can remove the <img> tag from the pref, if it bothers you, but attached images will still display. <political type="offending">In short, the goal was to turn HTML back into what is was supposed to be: description of content and structure, with the presentation left to the reader. I.e. the superiour text format (if both parties' software can deal with it properly) ;-).</political> > I also wonder about base -- anybody know? Seems like removing > it from the list should be fairly safe. I don't see that it would cause any harm, and removing it may break relative links in <a href="">s. > Anyway, I'm quite happy to document it, but I'd appreciate it if someone > who's been following the issue longer than I have would provide a sensible > comment so I don't have to make one up. There is <http://www.bucksch.org/1/projects/mozilla/108153>. Not sure, if it's what you're looking for. > perhaps a couple of good lists for varying levels of security. Good idea.
I have junk mail that produces the assert: ASSERTION: all the skipped content tokens did not get handled: 'mSkippedContent.GetSize() == 0', file CNavDTD.cpp, line 979 but only if I view it as Simple HTML and not Original HTML. Would that be a bug here?
You need to log in before you can comment on or make changes to this bug.