Closed
Bug 1445663
Opened 7 years ago
Closed 7 years ago
Hosts listed in extensions.webextensions.restrictedDomains are not properly configured
Categories
(Infrastructure & Operations Graveyard :: WebOps: Other, task)
Infrastructure & Operations Graveyard
WebOps: Other
Tracking
(Not tracked)
RESOLVED
INVALID
People
(Reporter: jan, Unassigned)
References
Details
(Keywords: nightly-community, Whiteboard: [kanban:https://webops.kanbanize.com/ctrl_board/2/6373])
extensions.webextensions.restrictedDomains has been recently introduced and led to a regression: bug 1445650
This is a check of all domains listed in extensions.webextensions.restrictedDomains:
> accounts-static.cdn.mozilla.net
https://observatory.mozilla.org/analyze/accounts-static.cdn.mozilla.net
* missing: CSP, HSTS, http to https redirection, Referer-Policy, X-Content-Type-Options, X-Frame-Options, X-XSS-Protection
https://www.hardenize.com/report/accounts-static.cdn.mozilla.net/1521039512
* missing IPv6, CAA, (smtp: NULL MX)
* PFS AEAD is not always preferred
https://www.ssllabs.com/ssltest/analyze.html?d=accounts%2dstatic.cdn.mozilla.net&s=52.84.237.182&hideResults=on&latest
* unusal/bad ECDH curve list (and missing X25519)
* is TLS 1.0 really needed? https://www.ssllabs.com/ssltest/viewClient.html?name=Firefox&version=31.3.0%20ESR&platform=Win%207&key=84 supports TLS 1.2
> accounts.firefox.com
https://observatory.mozilla.org/analyze/accounts.firefox.com
* good
https://www.hardenize.com/report/accounts.firefox.com/1521039884
* missing: IPv6, DNSSEC, CAA, (smtp: IPv6, DMARC, DANE)
* PFS AEAD is not always preferred
* DHE 1024 bit
https://www.ssllabs.com/ssltest/analyze.html?d=accounts.firefox.com&s=34.218.160.67&hideResults=on&latest
* missing X25519
* is TLS 1.0 really needed? https://www.ssllabs.com/ssltest/viewClient.html?name=Firefox&version=31.3.0%20ESR&platform=Win%207&key=84 supports TLS 1.2
> addons.cdn.mozilla.net
https://observatory.mozilla.org/analyze/addons.cdn.mozilla.net
* missing: CSP, HSTS, http to https redirection, X-Content-Type-Options, X-Frame-Options, X-XSS-Protection
https://www.hardenize.com/report/addons.cdn.mozilla.net/1521040085
* missing: IPv6, CAA, (smtp: NULL MX)
* PFS AEAD is not always preferred
https://www.ssllabs.com/ssltest/analyze.html?d=addons.cdn.mozilla.net
* unusal/bad ECDH curve list (and missing X25519)
* missing http/2
* is TLS 1.0 really needed? https://www.ssllabs.com/ssltest/viewClient.html?name=Firefox&version=31.3.0%20ESR&platform=Win%207&key=84 supports TLS 1.2
> addons.mozilla.org
https://observatory.mozilla.org/analyze/addons.mozilla.org
* good
https://www.hardenize.com/report/addons.mozilla.org/1521040413
* missing IPv6, CAA, HSTS Preloading (smtp: IPv6, PFS AEAD, SPF, DMARC, DANE, correct PTR)
* PFS AEAD is not always preferred
* GOOGLE ANALYTICS. Mozilla is often criticized for that on german IT news forums, please remove it: You may use a self-hosted Piwik.
https://www.ssllabs.com/ssltest/analyze.html?d=addons.mozilla.org&s=52.38.152.86&hideResults=on&latest
* missing X25519, http/2
* is TLS 1.0 really needed? https://www.ssllabs.com/ssltest/viewClient.html?name=Firefox&version=31.3.0%20ESR&platform=Win%207&key=84 supports TLS 1.2
> api.accounts.firefox.com
https://observatory.mozilla.org/analyze/api.accounts.firefox.com
* missing: CSP
https://www.hardenize.com/report/api.accounts.firefox.com/1521040793
* missing: IPv6, DNSSEC, CAA, (smtp: NULL MX)
* PFS AEAD is not always preferred
* DHE 1024 bit
https://www.ssllabs.com/ssltest/analyze.html?d=api.accounts.firefox.com&s=54.186.1.253&hideResults=on&latest
* missing X25519, http/2
* is TLS 1.0 really needed? https://www.ssllabs.com/ssltest/viewClient.html?name=Firefox&version=31.3.0%20ESR&platform=Win%207&key=84 supports TLS 1.2
> content.cdn.mozilla.net
* does not exist
> input.mozilla.org
https://observatory.mozilla.org/analyze/input.mozilla.org
* missing: CSP, secure cookies, HSTS, Referer-Policy, X-Content-Type-Options, X-Frame-Options, X-XSS-Protection
https://www.hardenize.com/report/input.mozilla.org/1521041068
* missing: IPv6, CAA, HSTS Preloading, (smtp: NULL MX)
* non-PFS AES128-GCM/CBC-SHA2 are preferred over PFS SHA1
https://www.ssllabs.com/ssltest/analyze.html?d=input.mozilla.org
* missing X25519
* is TLS 1.0 really needed? https://www.ssllabs.com/ssltest/viewClient.html?name=Firefox&version=31.3.0%20ESR&platform=Win%207&key=84 supports TLS 1.2
> install.mozilla.org
* does not exist
> oauth.accounts.firefox.com
https://observatory.mozilla.org/analyze/oauth.accounts.firefox.com
* missing: CSP
https://www.hardenize.com/report/oauth.accounts.firefox.com/1521041371
* missing: IPv6, DNSSEC, CAA, (smtp: NULL MX)
* PFS AEAD is not always preferred
* DHE 1024 bit
https://www.ssllabs.com/ssltest/analyze.html?d=oauth.accounts.firefox.com&s=52.10.167.63&hideResults=on&latest
* missing X25519, http/2
* is TLS 1.0 really needed? https://www.ssllabs.com/ssltest/viewClient.html?name=Firefox&version=31.3.0%20ESR&platform=Win%207&key=84 supports TLS 1.2
> profile.accounts.firefox.com
https://observatory.mozilla.org/analyze/profile.accounts.firefox.com
* missing: CSP
https://www.hardenize.com/report/profile.accounts.firefox.com/1521041517
* missing: IPv6, DNSSEC, CAA, (smtp: NULL MX)
* PFS AEAD is not always preferred
* DHE 1024 bit
https://www.ssllabs.com/ssltest/analyze.html?d=profile.accounts.firefox.com&s=35.161.236.212&hideResults=on&latest
* missing X25519, http/2
* is TLS 1.0 really needed? https://www.ssllabs.com/ssltest/viewClient.html?name=Firefox&version=31.3.0%20ESR&platform=Win%207&key=84 supports TLS 1.2
> support.mozilla.org
https://observatory.mozilla.org/analyze/support.mozilla.org
* missing: CSP
https://www.hardenize.com/report/support.mozilla.org/1521041741
* missing: IPv6, CAA, HSTS Preloading (smtp: NULL MX)
* PFS AEAD is not preferred
https://www.ssllabs.com/ssltest/analyze.html?d=support.mozilla.org&hideResults=on
* missing X25519, http/2
* is TLS 1.0 really needed? https://www.ssllabs.com/ssltest/viewClient.html?name=Firefox&version=31.3.0%20ESR&platform=Win%207&key=84 supports TLS 1.2
> sync.services.mozilla.com
* does not exist
> testpilot.firefox.com
https://observatory.mozilla.org/analyze/testpilot.firefox.com
* good
https://www.hardenize.com/report/testpilot.firefox.com/1521041980
* missing: IPv6, DNSSEC, CAA, (smtp: NULL MX), (strange: missing X-Frame-Options)
* PFS AEAD is not always preferred
* "Poorly constructed certificate chain"
* GOOGLE ANALYTICS. Mozilla is often criticized for that on german IT news forums, please remove it: You may use a self-hosted Piwik.
https://www.ssllabs.com/ssltest/analyze.html?d=testpilot.firefox.com&s=52.84.237.166&hideResults=on&latest
* missing OCSP stapling
* unusal/bad ECDH curve list (and missing X25519)
* is TLS 1.0 really needed? https://www.ssllabs.com/ssltest/viewClient.html?name=Firefox&version=31.3.0%20ESR&platform=Win%207&key=84 supports TLS 1.2
Comment 1•7 years ago
|
||
April, thoughts? I'm not sure what all extensions.webextensions.restrictedDomains is used for.
Flags: needinfo?(april)
Reporter | ||
Comment 2•7 years ago
|
||
Today I found out that addons can't read and set things on some Mozilla websites anymore. Then I got the idea to check all those hostnames and filed this ticket.
This report should be just an overview. It would be fine to close this as incomplete/duplicate.
Questions based on https://www.mozilla.org/en-US/about/manifesto/#principle-08:
Do you have a public to do list about these things? For example:
* When will you click on the button at Akamai to enable DNSSEC on firefox.com as it is already done for mozilla.org? (At which position of your to do list is it currently placed? Would it be possible to configure P-256 like Cloudflare instead of RSA?)
Do you just have the cheapest/wrong AWS package? (https://ipv6.watch/ Ctrl+F Mozilla, mozilla/tls-observatory#148, bug 1309201)
Are you planning to make a checklist that bug 1442994 (and friends) won't happen again?
Is there any publicly accessible provider comparison regarding your needs? (e.g. Google Cloud vs. AWS vs. Akamai vs. Cloudflare vs. Hetzner Cloud vs. own hardware)
My comments sound more severe than intended. I'm just interested in what's going on.^^
Comment 3•7 years ago
|
||
I wouldn't say that it's "recent". As far as I know (and I could be wrong), these sites have been forbidden from running webExtensions as long as there have been webExtensions. These sites are given special privileges inside Firefox, and allowing add-ons to run on them could allow malicious addons to do things like install new extensions, reset profiles, etc.
I believe Chrome does the same thing for their webExtensions, for example I don't think they can run inside the Chrome extension web store.
If you want extensions to run, you can either:
- Remove them from the restricted list
- Access them via an extra dot after the domain, such as https://addons.mozilla.org./
Flags: needinfo?(april)
Comment 4•7 years ago
|
||
Closing this bug because it covers multiple unrelated sites and issues.
Mozilla is always working to improve our website configurations over time to add support for IPv6, X25519, etc. and deprecate features like TLS 1.0.
If you'd like to participate in our bug bounty program for website security issues, please see here for additional information:
https://www.mozilla.org/en-US/security/web-bug-bounty/
Thanks, and we appreciate your help!
Status: NEW → RESOLVED
Closed: 7 years ago
Resolution: --- → INVALID
Updated•6 years ago
|
Product: Infrastructure & Operations → Infrastructure & Operations Graveyard
You need to log in
before you can comment on or make changes to this bug.
Description
•