Closed
Bug 421490
Opened 17 years ago
Closed 17 years ago
wpad may be dangerous, and it is on by default
Categories
(Core :: Security, defect, P2)
Tracking
()
RESOLVED
FIXED
mozilla1.9beta5
People
(Reporter: guninski, Assigned: ventnor.bugzilla)
References
Details
(Keywords: regression, Whiteboard: [sg:moderate])
Attachments
(1 file)
1.83 KB,
patch
|
roc
:
review+
roc
:
superreview+
|
Details | Diff | Splinter Review |
a sniffer on localhost observed that seamonkey tries to resolve |wpad.localdomain| on each page access.
so i put wpad.localdomain in /etc/hosts (emulating malicious dns server) to resolve to A.
on A port 80 i put a web server serving wpad.dat containing:
function FindProxyForURL(url, host) { return "PROXY 127.0.0.1:81"; }
all network activity goes to the specified proxy 127.0.0.1:81
malicious dns server or a *single* dns spoof leads to overriding proxy and injecting some javascript.
so i suggest turning wpad off by default.
or at least *easy* option to disable wpad.
this is exactly the opposite of Bug 310331
Comment 1•17 years ago
|
||
Looks like a very recent linux-only change:
http://bonsai.mozilla.org/cvsblame.cgi?file=/mozilla/modules/libpref/src/init/all.js&rev=3.733#766
The new value of "5" is supposed to pick up your system proxy settings and use those, back-end added in bug 66057 and UI (and pref flip) added in bug 416274. Do distros ship with WPAD as the default even if admins haven't explicitly opted in to that? That's totally not safe each time someone takes their laptop to the local wifi cafe.
Assignee: dveditz → reed
Updated•17 years ago
|
Product: Mozilla Application Suite → Core
Comment 2•17 years ago
|
||
Just because I land a patch for somebody doesn't put me in charge of fixing regressions from that patch. I'll back a patch out if need-be, but I have nothing to do with the fixing of the actual problem.
Assignee: reed → ventnor.bugzilla
Keywords: regression
QA Contact: seamonkey → toolkit
Summary: wpad may be dangerous and it is on by default → wpad may be dangerous, and it is on by default
Comment 3•17 years ago
|
||
Ventron, the all.js change should probably be reverted if a fix for this can't be found in a reasonable period of time.
Flags: blocking1.9?
Reporter | ||
Comment 4•17 years ago
|
||
(In reply to comment #1)
> Do distros ship with WPAD as the default even if admins haven't explicitly
> opted in to that? That's totally not safe each time someone takes their laptop
> to the local wifi cafe.
>
hm, i haven't turned on any proxies at all, including system wide.
i doubt there is global proxy autodiscovery on most linux distros.
will try to investigate.
Reporter | ||
Comment 5•17 years ago
|
||
i see this on both mandriva and kubuntu without any proxies that i am aware of
Reporter | ||
Updated•17 years ago
|
Whiteboard: [sg:moderate sg:investigate]
Comment 6•17 years ago
|
||
Can someone please add regression dependencies here, to keep track of what caused this? Blocking, P2, to either get what caused this backed out, or a fix for this issue.
Flags: blocking1.9? → blocking1.9+
Priority: -- → P2
Assignee | ||
Comment 7•17 years ago
|
||
Can you test to see if this works? This will only use WPAD if explicitly set in the prefs.
Updated•17 years ago
|
Assignee | ||
Comment 8•17 years ago
|
||
You're using KDE distros, which means you don't have GConf, and since you don't have a proxy configured, there shouldn't be any proxy settings in the environment variables either.
What SHOULD happen is that we fall back to DIRECT. Not sure why that isn't happening. Can anyone else running a KDE distro confirm this?
Comment on attachment 308048 [details] [diff] [review]
Possible patch
I think this is how it should work. This fixes a real regression.
Attachment #308048 -
Flags: superreview+
Attachment #308048 -
Flags: review+
Updated•17 years ago
|
Keywords: checkin-needed
Reporter | ||
Comment 10•17 years ago
|
||
i tested this on icewm having gconf, the kde was just auxiliary test
Comment 11•17 years ago
|
||
Checking in netwerk/base/src/nsProtocolProxyService.cpp;
/cvsroot/mozilla/netwerk/base/src/nsProtocolProxyService.cpp,v <-- nsProtocolProxyService.cpp
new revision: 1.75; previous revision: 1.74
done
Status: NEW → RESOLVED
Closed: 17 years ago
Keywords: checkin-needed
Resolution: --- → FIXED
Whiteboard: [sg:moderate sg:investigate] → [sg:moderate][sg:investigate]
Target Milestone: --- → mozilla1.9beta5
Updated•17 years ago
|
Flags: wanted1.8.1.x-
Whiteboard: [sg:moderate][sg:investigate] → [sg:moderate]
Reporter | ||
Comment 12•17 years ago
|
||
(In reply to comment #1)
> That's totally not safe each time someone takes their laptop
> to the local wifi cafe.
>
on second thought, if you have enabled wpad on purpose and go to a cafe with laptop your exploit scenario works by design?
You need to log in
before you can comment on or make changes to this bug.
Description
•