[rfc][icedtea-web] Fix support for signed applets with sandbox permissions in manifest
Jiri Vanek
jvanek at redhat.com
Wed Jul 30 13:01:19 UTC 2014
...snip...
>>
>> As you mentioned - the signed, but with permissions:sandbox app can not be run with all permissions.
>> So skip all attrributes, except permissions one
>>
>> The sandbox one should be checked:
>> signed: permissions:all-permissions - all permissions
>> unsigned: permissions:all-permissions - sandbox
>> unsigned: permissions:sandbox - sandbox
>> signed: permissions:sandbox - sandbox
>> signed: permissions missing - all permissions
>> unsigned: permissions missing - sandbox
>>
>> On low permissions, no asking.
>>
>> For other then low permissions user should be asked for each except
>> signed: permissions:all-permissions
>> unsigned: permissions:sandbox
>> cases.
>>
>> But the dialogue can be done as separate changeset (with custom-permissions button:)
>>
>>
>>
>>> New tests are also on the way and with the new tests will come the fixed version of the previously
>>> sent test, which will make be a signed reproducer rather than custom.
>>>
>>
>> J.
>>
>
> Okay, I wasn't sure what you had meant. It didn't seem right to skip them all but I thought maybe
> you had something else in mind to implement to fix it. So here's another attempt.
>
> Setting deployment.manifest.attributes.check to false causes all checks to be skipped, except for
> the Permissions attribute, which is always checked regardless. Using Low Extended Applet Security
> causes the ALACA and Permissions checks to not generate dialogs and assumes that it's OK to run the
> applet(s). In the case of the Permissions attribute, it will still auto sandbox if necessary. Is
> this what you wanted?
>
> Thanks,
>
> --
> Andrew A
>
I have not applied and not tested the patch.
It looks good in design and code.
assuming the:
+ // If the attribute is not specified in the manifest, prompt the user. Oracle's spec says
that the
+ // attribute is required, but this breaks a lot of existing applets. Therefore, when on the
highest
+ // security level, we refuse to run these applets. On the standard security level, we ask.
And on the
+ // lowest security level, we simply proceed without asking.
really works, I'm ok with this to go to head . I also think it should go to 1.5 but I left final
decision to you. (ok for 1.5 from my side)
>
> pr1769-6.patch
>
>
> diff --git a/ChangeLog b/ChangeLog
> --- a/ChangeLog
> +++ b/ChangeLog
> @@ -1,3 +1,43 @@
> +2014-06-24 Andrew Azores<aazores at redhat.com>
> +
> + Fixed support for signed applets which specify the Permissions attribute
> + as "sandbox" in their manifests. These applets are now properly run
> + sandboxed automatically, rather than requiring the user to click the
> + "Sandbox" run button.
> + * netx/net/sourceforge/jnlp/runtime/JNLPClassLoader.java
> + (JNLPClassLoader): manifest attributes checking and security settings
> + moved inside initializeResources
> + (initializePermissions): renamed (initializeReadJarPermissions). Redundant
> + null-check removed
> + (initializeResources): do not set entries in jarLocationSecurityMap until
> + after prompting the user on whether to run the applet as well as
> + performing manifest attribute checks. A new Collection (validJars) is used
> + to hold available and valid JARs between discovering the JARs and applying
> + any security settings to the them
> + (initializeManifestAttributesChecker): new method
> + (getJnlpFileCodebase): new method, extracted from initializeResources
> + (SecurityDelegateImpl.setRunInSandbox): throw exception if already forced
> + to run in sandbox, rather than if already prompted
> + * netx/net/sourceforge/jnlp/runtime/ManifestAttributesChecker.java
> + (isLowSecurity): new method
> + (checkAll): Extended Applet Security on Low disables all manifest checks
> + except for Permissions
> + (checkPermissionsAttribute): do not skip checking if Extended Applet
> + Security is Low. Remove try/catch on setRunInSandbox call as this is now
> + supported.
> + (checkApplicationLibraryAllowableCodebaseAttribute): do not display dialog
> + prompts on low security, allow the applet to run without prompt
I think the tests are not included in this patch. Please adjust the changelog to current state.
> + * tests/reproducers/custom/SignedAppletManifestSpecifiesSandbox/testcases/SignedAppletManifestSpecifiesSandboxTests.java:
> + new test case
> + * tests/reproducers/custom/SignedAppletManifestSpecifiesSandbox/resources/SignedAppletManifestSpecifiesSandbox.html:
> + same
> + * tests/reproducers/custom/SignedAppletManifestSpecifiesSandbox/srcs/MANIFEST.MF:
> + same
> + * tests/reproducers/custom/SignedAppletManifestSpecifiesSandbox/srcs/Makefile:
> + same
> + * tests/reproducers/custom/SignedAppletManifestSpecifiesSandbox/srcs/SignedAppletManifestSpecifiesSandbox.java:
> + same
> +
...snip...
Thank you very much,
J.
More information about the distro-pkg-dev
mailing list