Closed Bug 654588 Opened 13 years ago Closed 13 years ago

remove cryptographic JIDs

Categories

(Add-on SDK Graveyard :: General, defect)

defect
Not set
normal

Tracking

(Not tracked)

RESOLVED FIXED

People

(Reporter: warner, Assigned: warner)

Details

(Whiteboard: [cherry-pick-1.0b5])

Jetpack currently creates and maintains an ECDSA keypair for each addon, and
uses the public verifying key to derive the addon's unique ID (the "JID").
There is just enough code in the SDK to create these keys and to prod the
user to copy them when it detects that they're missing. The private key is
stored in ~/.jetpack/keys/$JID along with the pubkey and some metadata.

We don't yet have a story for actually using these keys. There are some
interesting security things that can be done when each addon has a well-known
key
(https://forums.mozilla.org/addons/viewtopic.php?f=27&t=2939&sid=674a50a331b533d1403c978eee25d481
is the start of a discussion), so I planned for this early. Perhaps too
early.

There are a couple of problems with having these keys around:

 1: developers are slightly hassled by reminders to copy the private key
    around when they move the source to a new computer, or to delete the JID
    from package.json to allow a new key to be generated

 2: validating the ~/.jetpack data takes a second or two, which slows down
    the "preflight" check that runs as part of XPI generation

 3: FlightDeck will need to do whatever signing operations the SDK does. So
    developers who upload their SDK-developed XPI to continue development on
    FlightDeck will also need to upload that XPI's private key. Likewise,
    developers who start on FlightDeck and "unplug" to work locally on the
    SDK will need to download the FlightDeck-generated private key for their
    addon. (the alternative is to decouple the JID of an addon created by the
    SDK from the JID of that "same" addon in FlightDeck).

 4: asking developers to maintain private keys safely, especially the
    new developers that jetpack is courting, is perhaps too great of a burden

So, as eager as I am to have strong security properties for Jetpack, I'm
going to propose that we rip out the crypto and generate simple boring
non-cryptographic random GUIDs for each addon, and that we do this in 1.0b5
to shake out any problems that result before 1.0 . The downsides of doing
this:

 1: if/when we reintroduce signatures, then existing addons which want to
    benefit from them will either need to change their JIDs (probably
    complicating their upgrade process), or we'll have to settle on using
    less-secure non-JID-bound pubkeys (introducing the question of "which key
    should be signing this addon", weakening the design)
 2: the usual risk of code changes at the end of a dev cycle
https://github.com/warner/addon-sdk/tree/654588-nocrypto has the branch with everything cleaned out. The preflight step is still present, but if it sees a missing "id" field then it generates a random JID of the form "jid1-XYZ@jetpack", where XYZ is 14 characters of base64-2 (base64 but with A and B instead of + and /). Addons which have a jid0- id continue to use them, but the preflight check does not look for a private key, nor does the check assert anything about the id it sees.
+        print >>stderr, ("No 'id' in package.json: creating a new id for you.")
...
+        self.failUnlessEqual(out.getvalue().strip(),
+                             "No 'id' in package.json: creating a new id for you.")

Nit: (the second occurrence in each string of) id -> ID


--ECDSA code :-(


Otherwise great. r,a=myk
Landed in https://github.com/mozilla/addon-sdk/commit/f6f3a5d5741440a6052250d9f4284adde3a93c23 , should be cherry-pickable onto 1.0b5

/me raises a toast to the deleted code. Fare thee well, ECDSA!
Status: NEW → RESOLVED
Closed: 13 years ago
Resolution: --- → FIXED
Whiteboard: [cherry-pick-1.0b5]
You need to log in before you can comment on or make changes to this bug.