IDN spoofing with combining marks (especially i,j,l)
Categories
(Firefox :: Address Bar, defect, P3)
Tracking
()
People
(Reporter: 50189695, Assigned: valentin)
References
(Blocks 1 open bug)
Details
(Keywords: csectype-spoof, sec-low, Whiteboard: [necko-triaged])
Attachments
(2 files)
Comment 2•7 years ago
|
||
Comment 3•7 years ago
|
||
Comment 4•7 years ago
|
||
![]() |
||
Updated•7 years ago
|
Updated•5 years ago
|
Comment 5•5 years ago
|
||
The "spoofing" aspect of this is primarily a front-end display issue and punycoding the domain name is not necessarily the only option. It is one, for sure, but we could also do "phishing warning" infobars or interstitials for top-level (document) urls that meet some suspicion criteria (e.g. bug 1507582 is one option). Or wrt this bug in particular we could declare combining marks to be always suspicious and assume the number of legitimately registered domains using that feature is essentially nil. But of course in many cases the pre-composed versions of the characters are just as spoofy so that wouldn't be a complete solution.
Updated•4 years ago
|
Updated•3 years ago
|
Assignee | ||
Comment 6•3 years ago
|
||
Depends on D161782
Updated•3 years ago
|
Comment 9•3 years ago
|
||
Backed out for causing xpcshell failures on test_idn_spoof.js
Assignee | ||
Updated•3 years ago
|
Comment 10•3 years ago
|
||
Comment 11•3 years ago
|
||
bugherder |
Updated•3 years ago
|
Updated•3 years ago
|
Updated•3 years ago
|
Comment 12•3 years ago
|
||
backout |
This was reverted from Beta109 due to the ICU72 update it depends on being backed out for causing bug 1806042. For now, it remains in place for 110+, but that may need to be revisited in the future.
https://hg.mozilla.org/releases/mozilla-beta/rev/7deaef0e20e3
Updated•3 years ago
|
Comment 13•3 years ago
|
||
"depends on" bug 1790163 landing first because this patch includes changes to a test that doesn't exist until that one lands
Updated•3 years ago
|
Description
•