Closed Bug 1203692 Opened 10 years ago Closed 10 years ago

Audit logs (particularly for any URLs we might leak)

Categories

(Firefox for iOS :: Browser, defect)

Other
iOS
defect
Not set
normal

Tracking

()

RESOLVED FIXED
Tracking Status
fxios 1.1+ ---

People

(Reporter: sleroux, Assigned: rnewman)

Details

Attachments

(2 files)

We need to make sure that we are not leaking any URLs or sensitive data in our app logging.
No longer blocks: pbmode
Summary: Audit logs for any URLs we might leak during private mode → Audit logs (particularly for any URLs we might leak)
On a production build we are logging full details of your Sync secrets: Oct 4 20:56:43 Stefans-iPhone-6 Client[437] <Warning>: onLogin: {"customizeSync":false,"sessionToken":"xxx","keyFetchToken":"xxx","verified":true,"unwrapBKey":"xxx","email":"sarentz+testflight@mozilla.com","uid":"xxx","verifiedCanLinkAccount":true}
Remove verbose logging from FxAContentViewController
Attachment #8669492 - Flags: review?(sleroux)
Attachment #8669492 - Flags: review?(sleroux) → review+
Merged https://github.com/mozilla/firefox-ios/pull/1119 Leaving this bug open in case we find more logging issues.
I'll finish this.
Assignee: nobody → rnewman
Status: NEW → ASSIGNED
Assignee: rnewman → sleroux
Here's what I've found that we're logging that is questionable: Recording of URLs in log files on disk for every non-private tab visit: Profile#L221 - log.debug("Recording visit for \(url) with type \(v).") Recording of URLs in log files on disk when removing/adding bookmarks: SQLiteBookmarks#L283 - log.debug("Removing bookmark \(url).") Logging of synced tab urls to disk: TabSynchronizer#L84 log.debug("\(remotes)") Creating tabs from tab records: TabSynchronizer#L41 log.debug("Sending tabs JSON \(tabsJSON.toString(true))") Logging DB secret: 2015-10-14 11:50:12.660 [Debug] [BrowserDB.swift:47] init(filename:secretKey:files:) > Creating db: /private/var/mobile/Containers/Shared/AppGroup/3EBD981A-58BA-4A0A-959B-F0B0FFFEC8FC/profile.profile/logins.db with secret = Optional("njF81qBBMRi4oCKHHD/lANF2UH2cr1mynvpu6KcwKiJxSuBbe0Kbag+GO1MD3Y1QQJqsGAMYUEAa9YWBfpFU6CFlehHBP20rYnMYXdzxpV7IQvnqQ3dvThhOMqegCDpQsVpRKEJmUl/crsguP4QhxAtqosnpu8za6xlSgcd4io0nR8x8x8MAzD47q4My6h1KJ1ObcIGQ4/llGLu5kSHg0FlM8HvIHc9fdE8vavcO9uOixRJ940Lzg0IgPRevUcUJrPHd10OFzxD6j7mag90ffj3c5ePql68g2Zc7sxrE6+HsX8mhSM5u/b+gpLo37dp2Q2HNNAP67bclJc+PVULnJw==")
I have a couple of commits coming for those.
(In reply to Stephan Leroux [:sleroux] from comment #6) > Logging DB secret: Note that we only do that for developer builds, precisely so we can debug by poking the DB.
4155dea
2015-10-14 15:38:29.987 [Debug] [SQLiteLogins.swift:217] getLoginsForProtectionSpace > Looking for login: https://bugzilla.mozilla.org
Attached file Another PR
Stealing this back for a final pass.
Assignee: sleroux → rnewman
Attachment #8673964 - Flags: review?(bnicholson)
Attachment #8673964 - Flags: review?(bnicholson) → review+
2dfaff7
Status: ASSIGNED → RESOLVED
Closed: 10 years ago
Resolution: --- → FIXED
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: