Closed
Bug 1275714
Opened 9 years ago
Closed 9 years ago
[FlyWeb] Review TLS-related changes for FlyWeb landing
Categories
(Core :: Security: PSM, defect)
Core
Security: PSM
Tracking
()
RESOLVED
FIXED
mozilla49
Tracking | Status | |
---|---|---|
firefox49 | --- | fixed |
People
(Reporter: djvj, Assigned: djvj)
References
Details
(Whiteboard: [psm-assigned])
Attachments
(1 file, 1 obsolete file)
12.58 KB,
patch
|
keeler
:
review+
|
Details | Diff | Splinter Review |
These are TSL/encryption related changes in FlyWeb.
Assignee | ||
Comment 1•9 years ago
|
||
Attachment #8756532 -
Flags: review?(dkeeler)
Updated•9 years ago
|
Component: Networking → Security: PSM
![]() |
||
Comment 2•9 years ago
|
||
Comment on attachment 8756532 [details] [diff] [review]
flyweb-security.patch
Review of attachment 8756532 [details] [diff] [review]:
-----------------------------------------------------------------
Looks good. r=me with comments addressed.
::: security/manager/ssl/nsCertOverrideService.cpp
@@ +418,5 @@
> +}
> +
> +NS_IMETHODIMP
> +nsCertOverrideService::RememberTemporaryValidityOverrideUsingFingerprint(
> + const nsACString& aHostName,
nit: these should be indented just two spaces
@@ +424,5 @@
> + const nsACString& aCertFingerprint,
> + uint32_t aOverrideBits)
> +{
> + NS_ENSURE_ARG(!aCertFingerprint.IsEmpty());
> + NS_ENSURE_ARG(!aHostName.IsEmpty());
Let's just go with the more verbose version of these:
if (aCertFingerprint.IsEmpty()) {
return NS_ERROR_INVALID_ARG;
}
etc.
(If you like, they can probably be combined into one or statement.)
@@ +425,5 @@
> + uint32_t aOverrideBits)
> +{
> + NS_ENSURE_ARG(!aCertFingerprint.IsEmpty());
> + NS_ENSURE_ARG(!aHostName.IsEmpty());
> + if (aPort < -1)
nit: braces around conditionals
@@ +428,5 @@
> + NS_ENSURE_ARG(!aHostName.IsEmpty());
> + if (aPort < -1)
> + return NS_ERROR_INVALID_ARG;
> +
> + {
No need to add extra scope for the lock.
::: security/manager/ssl/nsICertOverrideService.idl
@@ +58,5 @@
> /**
> + * Certs with the given fingerprint should always be accepted for the
> + * given hostname:port, regardless of errors verifying the cert.
> + * Host:Port is a primary key, only one entry per host:port can exist.
> + * The implementation will decide which fingerprint alg is used.
We should specify that we're using SHA-256 (so that the caller knows what algorithm to use).
@@ +63,5 @@
> + *
> + * @param aHostName The host (punycode) this mapping belongs to
> + * @param aPort The port this mapping belongs to, if it is -1 then it
> + * is internaly treated as 443
> + * @param aCertFingerprint The cert fingerprint that should be accepted
It's probably best to specify that this is of the form 'AA:BB:...' (i.e. colon-separated upper-case hex bytes)
Attachment #8756532 -
Flags: review?(dkeeler) → review+
![]() |
||
Updated•9 years ago
|
Assignee: nobody → kvijayan
Whiteboard: [psm-assigned]
Assignee | ||
Comment 3•9 years ago
|
||
Pushed by kvijayan@mozilla.com:
https://hg.mozilla.org/integration/mozilla-inbound/rev/724b6e4ac4e4
Changes in preparation for FlyWeb landing. Add ability to pin using a cert fingerprint, in addition to using a cert. r=dkeeler
Comment 5•9 years ago
|
||
bugherder |
Status: NEW → RESOLVED
Closed: 9 years ago
status-firefox49:
--- → fixed
Resolution: --- → FIXED
Target Milestone: --- → mozilla49
Assignee | ||
Comment 6•9 years ago
|
||
Attachment #8759830 -
Flags: review?(dkeeler)
Assignee | ||
Comment 7•9 years ago
|
||
Comment on attachment 8759830 [details] [diff] [review]
cert-test.patch
Review of attachment 8759830 [details] [diff] [review]:
-----------------------------------------------------------------
Never mind. This was already reviewed and is in m-c in a different location.
Attachment #8759830 -
Flags: review?(dkeeler)
Attachment #8759830 -
Attachment is obsolete: true
You need to log in
before you can comment on or make changes to this bug.
Description
•