Closed Bug 1457017 Opened 7 years ago Closed 7 years ago

Should network.disable.ipc.security be still set to true?

Categories

(Core :: Networking, enhancement)

enhancement
Not set
normal

Tracking

()

RESOLVED DUPLICATE of bug 1306801

People

(Reporter: pauljt, Unassigned)

References

Details

(Keywords: sec-audit)

I stumbled across the network.disable.ipc.security pref and was wondering why this was set to true in release. I noticed a comment which said that we should have changed this after 1125916 was fixed, so Im just filing this out of precaution. I suspect this check might be something related to check that network requests come from an appId which corresponds to the child process but Im really not sure. AppId was mainly (exclusively?) a b2g concept so maybe it doesn't matter that this pref is still set to true. But just wanted to be sure, hence this bug. https://searchfox.org/mozilla-central/source/devtools/client/webide/content/runtimedetails.js#133
Keywords: sec-audit
Flags: needinfo?(jmathies)
Sounds like something the netwerking team introduced that can be removed. Jason, can you help here?
Flags: needinfo?(jmathies) → needinfo?(jduell.mcbugs)
Valentin: I poked around a little at this--enabling the the pref basically toggles UsingNeckoIPCSecurity(), which we use in UDPSocketParent::Init() and a whole bunch of MissingRequiredTabChild() checks in our e10s child channels. I don't actually know if the security checks in these codepaths are still up to date, post bug 1125916. I'm guessing Valentin knows this as well as anyone in necko--feel free to ask seceng folks if needed.
Flags: needinfo?(valentin.gosu)
I believe we can dupe this to bug 1306801. I don't think there's much reason for keeping this around. We may want to keep a check similar to UsingNeckoIPCSecurity(), but given that it's currently disabled, it probably doesn't help that much.
Status: NEW → RESOLVED
Closed: 7 years ago
Flags: needinfo?(valentin.gosu)
Flags: needinfo?(jduell.mcbugs)
Resolution: --- → DUPLICATE
Group: network-core-security
You need to log in before you can comment on or make changes to this bug.