Closed Bug 354199 Opened 19 years ago Closed 19 years ago

firefox fetches a key from sb.google.com in local list mode

Categories

(Toolkit :: Safe Browsing, defect)

defect
Not set
normal

Tracking

()

RESOLVED FIXED

People

(Reporter: tony, Assigned: tony)

Details

(Keywords: fixed1.8.1.2, Whiteboard: [need testcase])

Attachments

(1 file)

If the user has phishing protection enabled with local list checking, it still makes a request to sb.google.com to get a key. The key is only needed when doing remote checks so we should remove this http request for local list mode.
I already know of at least one person who's seen this behavior and believes that this is being used by Google to log personal information. This is something which should get priority for getting fixed because it does raise eyebrows and concerns.
Flags: blocking1.8.1.2?
Flags: blocking-firefox3?
I've seen talk of this as well, but had it explained to me as a cookie. If it's not necessary then it should definitely go.
This doesn't provide a way to log personal information any more than the act of downloading the local list data every 30 minutes does.
While that's probably true, it's the appearance of impropriety which is the problem. People can be very sensitive about their privacy, Tony, so even the appearance that it's being violated can be a problem.
Right, but users don't know that and we have no way to tell them. The people that find this are just going to know google is storing something besides the list, and they're also probably the types to be paranoid about this sort of thing (seeing how they've tracked and detected it in the first place).
Tony: We'd like this for 2.0.0.2, so let's try to get a patch together soon.
Flags: blocking1.8.1.2? → blocking1.8.1.2+
Sure thing, should be pretty straight forward.
Status: NEW → ASSIGNED
Only set the key url when in remote check mode. This is a small patch so we can get something on Firefox 2. What I'd really like to do is refactor the crypto key manager class into an XPCOM service with it's own enableUpdate/disableUpdate method (rather than having it dependent on whether or not the key url is set). I'll make a follow up patch to do that for trunk, but it seems like unnecessary risk for branch since it doesn't provide any extra functionality.
Attachment #249495 - Flags: review?(mmchew)
Comment on attachment 249495 [details] [diff] [review] only get key in remote mode Looks fine to me. I think your future fix sounds good, rather then the URL check.
Attachment #249495 - Flags: review?(mmchew) → review+
Flags: blocking-firefox3?
Whiteboard: [needs-checkin]
on trunk Checking in globalstore.js; /cvsroot/mozilla/browser/components/safebrowsing/content/globalstore.js,v <-- globalstore.js new revision: 1.14; previous revision: 1.13 done
Comment on attachment 249495 [details] [diff] [review] only get key in remote mode I'm going to be out of town until the Jan 8th, 2007. Someone else should check in on branch if we need it before then.
Attachment #249495 - Flags: approval1.8.1.2?
Whiteboard: [needs-checkin]
Comment on attachment 249495 [details] [diff] [review] only get key in remote mode Approved for 1.8 branch, a=jay for drivers. Let's get this landed and tested asap.
Attachment #249495 - Flags: approval1.8.1.2? → approval1.8.1.2+
Fix landed on the 1.8 branch.
Keywords: fixed1.8.1.2
-->RESOLVED FIXED? and fixed1.8.1.2 ?
According to comment #8, Tony wants to do more for a *real* trunk fix
Sorry, splitting comment #8 out into a separate bug 369621.
Status: ASSIGNED → RESOLVED
Closed: 19 years ago
Resolution: --- → FIXED
hi Tony Chang, what is the best way for QA to verify your fix on the 1.8 branch? please list a few testcases so we can verify. If its not easy to verify, can you assist and please test it with your results posted? Thanks.
Whiteboard: [need testcase]
You can use ethereal or fiddler or whatever to watch for network traffic. You want to test to see if there's a request to https://sb.google.com/safebrowsing/getkey or not at browser startup. You should not see this if Firefox is in local list mode (in the security preferences tab, it's the "check using a downloaded list of suspected sites"). When switching to the "check by asking Google" option, you should see the request sent. A couple test cases: 1) start on a new profile, observe no request sent 2) switch to "check by asking Google" and observe a request being sent 1) start on a new profile, observe no request sent 2) close firefox and edit prefs.js manually. In prefs.js, set browser.safebrowsing.remoteLookups to true. 3) Start firefox using the same profile and observe the request being sent. If the user is upgrading to 2.0.0.2 and has "check by asking Google", there may or may not be a request because we only make the request once per 24 hours.
Product: Firefox → Toolkit
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: