Open
Bug 908046
Opened 11 years ago
Updated 6 months ago
Turn off SSLKEYLOGFILE logging as default
Categories
(Core :: Security, defect)
Core
Security
Tracking
()
NEW
People
(Reporter: ddahl, Unassigned)
References
Details
Seems like this behavior: https://mxr.mozilla.org/mozilla-central/source/security/nss/lib/ssl/sslsock.c#2872
... should not be on by default in release builds?
See: https://isc.sans.edu/forums/diary/Psst+Your+Browser+Knows+All+Your+Secrets+/16415
Maybe it does not matter, just seems like something that should be deactivated by default.
Comment 1•11 years ago
|
||
(In reply to David Dahl :ddahl from comment #0)
> deactivated by default.
Currently it is not "active" by default per se. Attacker must plant a SSLKEYLOGFILE environment variable to activate logging on the target machine AND be able to read that log file. If he already gained so much access, what is to stop him from tweaking some boolean setting in about:config or even installing a special Firefox build? Those are just (minor?) extra hurdles.
See also bug 536474, bug 762763, bug 770313 and http://www.imperialviolet.org/2012/06/25/wireshark.html
Reporter | ||
Comment 2•11 years ago
|
||
(In reply to Stefan Baebler from comment #1)
> (In reply to David Dahl :ddahl from comment #0)
> > deactivated by default.
> Currently it is not "active" by default per se.
Sure, but I can imagine a rouge toolbar - that are so many many times installed without a user understanding how it got installed - sets the env var, etc... Not a high hurdle to jump.
Comment 3•11 years ago
|
||
(In reply to David Dahl :ddahl from comment #2)
> Sure, but I can imagine a rouge toolbar - that are so many many times
> installed without a user understanding how it got installed - sets the env
> var, etc... Not a high hurdle to jump.
Yes, extra hurdle (not having it included in default release builds at all) would help a bit with the defense in depth.
Whoever legitimately requires such SSL debugging functionality can install browser compiled with DEBUG and TRACE precompile directives defined, as it was prior to NSS 3.14 (https://developer.mozilla.org/en-US/docs/NSS_Key_Log_Format )
Comment 4•7 years ago
|
||
See also bug 1183318 where NSS disabled SSLKEYLOGFILE by default in optimized builds of the library.
In bug 1188657, Firefox started overriding the default so that SSLKEYLOGFILE could still be used in all Firefox builds from Mozilla.
Updated•2 years ago
|
Severity: normal → S3
Comment hidden (advocacy) |
Comment hidden (advocacy) |
Comment 7•6 months ago
|
||
superseded by bug 1188657, which originally asked for more or less what this bug did but then got reversed.
See Also: → 1188657
Comment 8•6 months ago
|
||
Filed enhancement bug 1915224 as a substitute that is more likely to be accepted.
You need to log in
before you can comment on or make changes to this bug.
Description
•