[patch] RFC: Netx plugins

Lillian Angel langel at redhat.com
Wed Feb 6 08:26:02 PST 2008


Hi,

Francis Kung wrote:
> Hi,
>
>>>> - need to pass --enable-netx-plugin to enable this (considering it 
>>>> an experimental feature); all this does is create netx.jar in 
>>>> j2sdk/jre/lib with netx code in it.  If this jar is missing, we 
>>>> fall back to using the old Sun plugin code (see the reflection bit 
>>>> in the sun.applet.PluginAppletViewer constructor).  I'm creating a 
>>>> new netx.jar, instead of using j2sdk/lib/tools.jar (like javaws 
>>>> does), so that the plugin can be distributed with a JRE rather than 
>>>> requiring the full SDK.
>>>
>>> Should --enable-netx-plugin be set by default? In my opinion, 
>>> everything is experimental. There should only be an option to 
>>> disable netx.
>> I think it should also be enabled by default. Perhaps the jar name 
>> should be something less general than netx.jar though -- perhaps 
>> netx-web-plugin.jar ?
>
> I was planning on enabling it by default once it's finished (ie can do 
> signed JAR verifying, the remaining TODO/FIXME's done), but I've no 
> major objection to enabling it right away - haven't run into any 
> problems in my testing... =)
>
> The JAR also contains the full netx code, not just applet/plugin code, 
> hence the name, but I have no particular attachment to a name.
>
>>>> - modified the default security policy to grant all permission to 
>>>> ${java.home}/lib/netx.jar  (is this safe, or is there a better way 
>>>> to accomplish this?)
>>>
>>> We should never allow a user to allow an application to grant all 
>>> permissions. 
>> Unless that application is signed and the user trusts the signer and 
>> publisher (as is the case with jnlp applications). It probably 
>> doesn't apply too well to this situation though, since I don't think 
>> we'll be signing that jar.
>>> I think we need to make these type of apps as secure as possible and 
>>> be sure we ask each time. What about having a whitelist? Also, I 
>>> don't think it would be in the best interest to have the default 
>>> security policy so lax.
>>>
>> While it's a good idea to ask each time, won't it be too much to be 
>> asking to run netx.jar, then also asking to grant full permission to 
>> the actual applet? Further yet, should we want to ask the user for 
>> permission to grant all access to ${java.home}/lib/netx.jar, would 
>> netx.jar be showing the permission dialog, and then changing the 
>> default security policy?
>
> Sorry, I didn't explain this very clearly... here I am referring to 
> the security policy set in jre/lib/security/java.policy, granting full 
> permission to the code contained in netx.jar - that is, to the Netx 
> code itself.  This is completely separate from granting permission to 
> applets.

Ah, makes more sense. Thanks.

>
>>>> This isn't complete, but it's finally in a working state and has 
>>>> been in a private repo for too long... currently a dialog is 
>>>> displayed for all applets asking if the user wants to grant it full 
>>>> permission or not.  
>>>
>>> Is the dialog displayed for each applet or just the first applet is 
>>> loaded? if "grant full permissions" is selected, are the permissions 
>>> granted for all applets or only that particular one?  I think we 
>>> should display if for each applet. (Not sure if I misunderstood the 
>>> previous point as well)
>> Yes, probably display it for each applet. The above policy is OK, but 
>> perhaps it could be improved by letting the user choose what kind of 
>> permissions to allow on startup (i.e. file read, file write, 
>> clipboard access, etc) or maybe even show dialogs on each type of 
>> access, with the option to "always allow this action" for the rest of 
>> the applet's runtime? I could imagine this would involve a bit more 
>> work though...
>
> Yes, the dialog is displayed for each applet loaded, and permissions 
> are per-applet (even refreshing a page, and thus causing an applet to 
> reload, will trigger the dialog to display again, and two applets 
> running simultaneously can have different permission levels).
>
> Whitelisting applets with a "trust this applet from now on" checkbox 
> is on the to-do.

Great.

>
> Letting the user choose specific permissions at startup actually 
> wouldn't be too difficult; see netx.jnlp.SecurityDesc and how they 
> list the permissions for j2ssPermissions and sandboxPermissions - we 
> could create a new array customPermissions and populate it at run-time 
> based on GUI input... creating the GUI would probably be the most 
> time-consuming part ;-)
>
>>>> The plan is to re-use Josh's work on Netx jar-verifying to tweak 
>>>> this dialog and only display it when needed; we can also create a 
>>>> consolidated JNLP/plugin settings GUI (cache management, trusted 
>>>> certificates, etc).
>> Yes, this might be a good idea. I've still yet to figure out how to 
>> keep track of who we're trusting in terms of code signers and 
>> certificates.
>
> I know web browsers usually have a default set of trusted root 
> certificates, used for SSL.  We could either tap into that and use 
> their list (we already have a dependency on firefox/mozilla anyways), 
> or maybe create our own list based on that...?

I think that's safe to do.

>
>>>>
>>>> Comments, or good to commit? 
>>>
>>>
>>> Hold off for now. Have you run your patch by fitzsim?
>
> Nope.  If you could ping him to take a look at this list when he's got 
> a chance, that's be great =)

Yep.


Lillian



More information about the distro-pkg-dev mailing list