Closed
Bug 1246505
Opened 9 years ago
Closed 8 years ago
Let the Windows low integrity content sandbox ride the trains.
Categories
(Core :: Security: Process Sandboxing, enhancement)
Tracking
()
RESOLVED
FIXED
mozilla50
People
(Reporter: bobowen, Assigned: bobowen)
References
Details
(Whiteboard: sbwc1)
Attachments
(1 file, 1 obsolete file)
2.78 KB,
patch
|
jimm
:
review+
|
Details | Diff | Splinter Review |
Just need to configure to build the content sandbox in all trees and set the level pref.
Assignee | ||
Comment 1•9 years ago
|
||
Attachment #8716978 -
Flags: review?(mh+mozilla)
Comment 2•9 years ago
|
||
Comment on attachment 8716978 [details] [diff] [review]
Let the Windows low integrity content process sandbox ride the trains
Review of attachment 8716978 [details] [diff] [review]:
-----------------------------------------------------------------
On the build system side, this is fine, but it's not my call to say whether this should be riding the trains.
Attachment #8716978 -
Flags: review?(mh+mozilla) → feedback+
Assignee | ||
Comment 3•9 years ago
|
||
Comment on attachment 8716978 [details] [diff] [review]
Let the Windows low integrity content process sandbox ride the trains
Thanks glandium.
Brad - I only know of bug 1189846 now that low integrity causes.
I have a plan to fix that and hope to get it into 47, but may not.
I very much doubt I'll land it in time for uplift to 46.
Although, I'm wondering whether it's getting too late to uplift the sandboxing anyway.
Attachment #8716978 -
Flags: review?(blassey.bugs)
Updated•9 years ago
|
Attachment #8716978 -
Flags: review?(blassey.bugs) → review+
Comment 4•9 years ago
|
||
Jeff, can you comment about whether you want to uplift this to turn the sandbox on for Windows?
Flags: needinfo?(jgriffiths)
Assignee | ||
Comment 5•9 years ago
|
||
Extra context that I mentioned to Brad on IRC over the potential uplift to Aurora for this.
I'm also a bit nervous about requesting the uplift for turning on printing via the parent, just before my PTO.
This is the last patch on bug 1156742, which just flips the pref, but it's quite a big change to the way printing then works.
We'll need that and bug 1173371, before we could uplift this.
I've requested bug 1173371, but it hasn't been approved yet, although maybe it could come after, I doubt it would affect many people, particularly on Aurora.
Comment 6•9 years ago
|
||
(In reply to Bob Owen (:bobowen) from comment #5)
...
> I'm also a bit nervous about requesting the uplift for turning on printing
> via the parent, just before my PTO.
> This is the last patch on bug 1156742, which just flips the pref, but it's
> quite a big change to the way printing then works.
Thansk for the extra content. If you're not going to be around to fix followup issues, my preference is definitely to wait, for sandboxing *and* printing.
> We'll need that and bug 1173371, before we could uplift this.
>
> I've requested bug 1173371, but it hasn't been approved yet, although maybe
> it could come after, I doubt it would affect many people, particularly on
> Aurora.
Doesn't matter - if you uplift it to Aurora we have to deal with issues that arise later in Beta, and we need to make sure we track that.
Is it possible to run an experiment in beta 47 with a control group that doesn't have sandboxing enabled? If we do this early in Beta 47 we would have additional data that would inform a go/no-go.
Flags: needinfo?(jgriffiths)
Assignee | ||
Comment 7•9 years ago
|
||
(In reply to Jeff Griffiths (:canuckistani) (:⚡︎) from comment #6)
> (In reply to Bob Owen (:bobowen) from comment #5)
> If you're not going to be around to fix
> followup issues, my preference is definitely to wait, for sandboxing *and*
> printing.
Thanks Jeff, we've stopped the uplift of bug 1173371 as well.
No reason to add any extra risk, as it's not needed unless we're at low integrity.
> Is it possible to run an experiment in beta 47 with a control group that
> doesn't have sandboxing enabled? If we do this early in Beta 47 we would
> have additional data that would inform a go/no-go.
Not sure how the experiments work, but if they can run from prefs, then there is a pref to set the "sandbox level".
They don't have any intrinsic meaning. They're just being incremented as we tighten the sandboxing rules, so that people can easily test potential regressions with a weaker sandbox.
Low integrity is set for level 1 and above.
Level 0 doesn't completely turn off the sandbox, but I could easily make it so that < 0 did.
Once we decide to ship we'd want to hard code the minimum level, as we don't want changes to prefs to be allowed to weaken the sandbox.
Then the only way of allowing a lower level or turning off altogether would be via an environment variable.
Comment 8•9 years ago
|
||
(In reply to Bob Owen (:bobowen) (less responsive 11th-18th) from comment #7)
> (In reply to Jeff Griffiths (:canuckistani) (:⚡︎) from comment #6)
> > (In reply to Bob Owen (:bobowen) from comment #5)
>
> > If you're not going to be around to fix
> > followup issues, my preference is definitely to wait, for sandboxing *and*
> > printing.
>
> Thanks Jeff, we've stopped the uplift of bug 1173371 as well.
> No reason to add any extra risk, as it's not needed unless we're at low
> integrity.
>
> > Is it possible to run an experiment in beta 47 with a control group that
> > doesn't have sandboxing enabled? If we do this early in Beta 47 we would
> > have additional data that would inform a go/no-go.
>
> Not sure how the experiments work, but if they can run from prefs, then
> there is a pref to set the "sandbox level".
Experiments are actually add-ons so they're fairly flexible. We're running an e10s experiment starting the 12th of February that enables e10s for users that have zero add-ons, do not have accessibility features enabled and are not from a specific set of right-to-left locales (for example).
> They don't have any intrinsic meaning. They're just being incremented as we
> tighten the sandboxing rules, so that people can easily test potential
> regressions with a weaker sandbox.
>
> Low integrity is set for level 1 and above.
> Level 0 doesn't completely turn off the sandbox, but I could easily make it
> so that < 0 did.
>
> Once we decide to ship we'd want to hard code the minimum level, as we don't
> want changes to prefs to be allowed to weaken the sandbox.
> Then the only way of allowing a lower level or turning off altogether would
> be via an environment variable.
This is potentially problematic for a beta experiment - what we would need to do is land the code in beta that allows a negative value to disable sandboxing, *then* once the experiment is finished after say 2 weeks we would land an additional patch to remove this possibility.
I should add - we should only do an experiment if we have a hypothesis to test. For example, if we're concerned about the stability of sandboxing we would gather telemetry crash rates and crash signatures from crashstats and evaluate if stability was reduced in the sandboxed population vs the regular population, and use this to make a go/no-go decision about delaying sandboxing. If you don't think there is a stability (or performance) issue, then there's no need to experiment.
What do you think the risks are for performance and stability with sandboxing enabled? What data are you using to support your assertion?
Flags: needinfo?(bobowen.code)
Assignee | ||
Comment 9•9 years ago
|
||
(In reply to Jeff Griffiths (:canuckistani) (:⚡︎) from comment #8)
> (In reply to Bob Owen (:bobowen) (less responsive 11th-18th) from comment #7)
> > Low integrity is set for level 1 and above.
> > Level 0 doesn't completely turn off the sandbox, but I could easily make it
> > so that < 0 did.
> >
> > Once we decide to ship we'd want to hard code the minimum level, as we don't
> > want changes to prefs to be allowed to weaken the sandbox.
> > Then the only way of allowing a lower level or turning off altogether would
> > be via an environment variable.
>
> This is potentially problematic for a beta experiment - what we would need
> to do is land the code in beta that allows a negative value to disable
> sandboxing, *then* once the experiment is finished after say 2 weeks we
> would land an additional patch to remove this possibility.
Yeah, that's what I intended. :-)
I've filed bug 1250125 for turning off the sandbox with a negative pref.
> I should add - we should only do an experiment if we have a hypothesis to
> test. For example, if we're concerned about the stability of sandboxing we
> would gather telemetry crash rates and crash signatures from crashstats and
> evaluate if stability was reduced in the sandboxed population vs the regular
> population, and use this to make a go/no-go decision about delaying
> sandboxing. If you don't think there is a stability (or performance) issue,
> then there's no need to experiment.
>
> What do you think the risks are for performance and stability with
> sandboxing enabled? What data are you using to support your assertion?
There is certainly a possibility that there could be stability or performance issues that we haven't found in Nightly.
There is no specific data gathered for sandboxing as it would more be its affect on other things.
Low integrity can affect various system calls.
At least if we get the affect of the pref changed now, we can decide later on the experiments.
Flags: needinfo?(bobowen.code)
Updated•9 years ago
|
Whiteboard: sb?
Updated•9 years ago
|
Whiteboard: sb? → sb+
Assignee | ||
Comment 10•8 years ago
|
||
This will also need to turn on printing via the parent.
Keywords: meta
Whiteboard: sb+ → sbwc1
Assignee | ||
Comment 11•8 years ago
|
||
Only change here is to also enable printing via the parent, which I changed to Nightly only after the last patch was uploaded.
MozReview-Commit-ID: Ei4BWhLcYpA
Attachment #8772480 -
Flags: review?(jmathies)
Assignee | ||
Updated•8 years ago
|
Attachment #8716978 -
Attachment is obsolete: true
Assignee | ||
Comment 12•8 years ago
|
||
Comment 13•8 years ago
|
||
Comment on attachment 8772480 [details] [diff] [review]
Let the Windows low integrity content process sandbox ride the trains
Review of attachment 8772480 [details] [diff] [review]:
-----------------------------------------------------------------
woot!
Attachment #8772480 -
Flags: review?(jmathies) → review+
Comment 14•8 years ago
|
||
Pushed by bobowencode@gmail.com:
https://hg.mozilla.org/integration/mozilla-inbound/rev/c40bfce8d35b
Let the Windows low integrity content process sandbox ride the trains. r=jimm
Comment 15•8 years ago
|
||
bugherder |
Status: ASSIGNED → RESOLVED
Closed: 8 years ago
status-firefox50:
--- → fixed
Resolution: --- → FIXED
Target Milestone: --- → mozilla50
Comment 16•8 years ago
|
||
is this a change that we should document in the release notes for firefox 50?
relnote-firefox:
--- → ?
Assignee | ||
Comment 17•8 years ago
|
||
(In reply to [:philipp] from comment #16)
> is this a change that we should document in the release notes for firefox 50?
As this is just a first step in content process sandboxing, we're deliberately not making big announcements about it.
However, I imagine it should probably go in the release notes.
Here is some text we gave to PR in case people noticed this and came asking for more information:
"Firefox on Windows is now running its content processes at low integrity as an initial sandboxing step. Windows integrity level checks limit the access that lower integrity processes have to higher integrity level resources.
What is the Windows Integrity mechanism?
https://msdn.microsoft.com/en-us/library/bb625957.aspx"
We might not want those last two lines and it'll possibly need rewording a bit, but hopefully that helps.
The idea was to keep it brief and factual, without making any wild security claims.
Comment 18•8 years ago
|
||
Looks like this wasn't added to the 50 release notes, and it's a bit late now as we're about to ship 51.
You need to log in
before you can comment on or make changes to this bug.
Description
•