SecurityEngineering/2014/Q3Goals: Difference between revisions

From MozillaWiki
Jump to navigation Jump to search
No edit summary
Line 9: Line 9:
;Who: Tanvi, Christoph, Garrett, Sid
;Who: Tanvi, Christoph, Garrett, Sid


* {{ok|Gecko Security Hooks: Finish code and debugging for New Channel API, start getting reviews.}} See {{bug|1038756}}, {{bug|1006881}} (dri=tanvi)
* {{done|Gecko Security Hooks: Finish code and debugging for New Channel API, start getting reviews.}} See {{bug|1038756}}, {{bug|1006881}} (dri=tanvi)
* {{hold|Gecko Security Hooks: Create plan for addon compatibility - nothing to do yet}} (dri=tanvi)
* {{defer|Gecko Security Hooks: Create plan for addon compatibility - nothing to do yet}} (dri=tanvi)
* {{done|CSP: Remove old JS implementation from mozilla-central.  Target Fx34.}} See {{bug|994782}} (dri=sstamm)
* {{done|CSP: Remove old JS implementation from mozilla-central.  Target Fx34.}} See {{bug|994782}} (dri=sstamm)
* {{ok|Evangelism: Security Open Mic presentation + blog post about new CSP implementation, maybe again as brown bag.}} (dri=sstamm)
* {{done|Evangelism: Security blog post about new CSP implementation, maybe again as brown bag.}} (dri=sstamm)
* {{ok|''[stretch goal]'' CSP: Fix majority of CSP 1.1 compatibility bugs.}} See [https://etherpad.mozilla.org/CSP-1-1 planning etherpad] (dri=ckerschb)
* {{ok|''[stretch goal]'' CSP: Fix majority of CSP 1.1 compatibility bugs.}} See [https://etherpad.mozilla.org/CSP-1-1 planning etherpad] (dri=ckerschb)


Line 31: Line 31:
* {{done| Create a mechanism to provision phones with an alternate cert}} (dri=mgoodwin)
* {{done| Create a mechanism to provision phones with an alternate cert}} (dri=mgoodwin)
* {{done| Add measurement/enforcement of compliance with CABF Baseline Requirements}}. See {{bug|1050546}} (dri=keeler)
* {{done| Add measurement/enforcement of compliance with CABF Baseline Requirements}}. See {{bug|1050546}} (dri=keeler)
* {{ok| Create a tool for testing CA certificate compliance and EV-readiness}}. See {{bug|926599}} and {{bug|1029095}} (dri=keeler)
* {{done| Create a tool for testing CA certificate compliance and EV-readiness}}. See {{bug|926599}} and {{bug|1029095}} (dri=keeler)
* {{ok| Add support for key wrap/unwrap and ECC in WebCrypto}} (dri=rbarnes)
* {{ok| Add support for key wrap/unwrap and ECC in WebCrypto}} (dri=rbarnes)
* {{risk| ''[stretch goal]'' Enable revocation of intermediate CAs through block list service}} (dri=mgoodwin, keeler)
* {{risk| ''[stretch goal]'' Enable revocation of intermediate CAs through block list service}} (dri=mgoodwin, keeler)
* {{done| ''[stretch goal]'' Retire first batch of 1024-bit roots, working towards requiring 2048-bit keys for built-in root certificates}} (dri=kathleen)
* {{done| ''[stretch goal]'' Retire first batch of 1024-bit roots, working towards requiring 2048-bit keys for built-in root certificates}} (dri=kathleen)
* {{ok| ''[stretch goal]'' Get CA Program data into one database}} (dri=kathleen)
* {{ok| ''[stretch goal]'' Get CA Program data into one database}} (dri=kathleen)

Revision as of 19:44, 22 September 2014


This is a heavy-Implement quarter (as opposed to the other strategic actions in our SecurityEngineering/Strategy).

(Also linked from Platform/2014-Q3-Goals#Security_.26_Privacy_Engineering).

Content Security

Outcome
Progress towards more robust security hooks for better correctness in content security features like CSP, adblock, etc.
Who
Tanvi, Christoph, Garrett, Sid
  • [DONE] Gecko Security Hooks: Finish code and debugging for New Channel API, start getting reviews. See bug 1038756, bug 1006881 (dri=tanvi)
  • [DEFER] Gecko Security Hooks: Create plan for addon compatibility - nothing to do yet (dri=tanvi)
  • [DONE] CSP: Remove old JS implementation from mozilla-central. Target Fx34. See bug 994782 (dri=sstamm)
  • [DONE] Evangelism: Security blog post about new CSP implementation, maybe again as brown bag. (dri=sstamm)
  • [ON TRACK] [stretch goal] CSP: Fix majority of CSP 1.1 compatibility bugs. See planning etherpad (dri=ckerschb)

Tracking Protection

Outcome
Better user control (and site control) over metadata on the wire and collected by third parties.
Who
Monica, Garrett, Sid, Georgios
  • [ON TRACK] Referer: Finish implementation of <meta> referrer control with volunteer help. See bug 704320. (dri=sstamm)
  • [DONE] Land backend and bridge code for first implementation of protection in Fx 33/34 off by default. BONUS: landed frontend code too (dri=mmc)

Communications Security

Outcome
Fresher/more accurate revocation information and progress towards defeating certificate misissuance and Man-In-The-Middle attacks.
Who
Richard, Kathleen, Keeler, Camilo, Harsh, Garrett, Monica
  • [ON TRACK] SSL Error Reporting finish first implementation of ssl error reporting feature. (dri=grobinson)
  • [ON TRACK] HPKP - implement pinning http header (dri=cviecco)
  • [DONE] Update roadmap for Cert Revocation improvements (dri=rbarnes)
  • [DONE] Create a mechanism to provision phones with an alternate cert (dri=mgoodwin)
  • [DONE] Add measurement/enforcement of compliance with CABF Baseline Requirements. See bug 1050546 (dri=keeler)
  • [DONE] Create a tool for testing CA certificate compliance and EV-readiness. See bug 926599 and bug 1029095 (dri=keeler)
  • [ON TRACK] Add support for key wrap/unwrap and ECC in WebCrypto (dri=rbarnes)
  • [AT RISK] [stretch goal] Enable revocation of intermediate CAs through block list service (dri=mgoodwin, keeler)
  • [DONE] [stretch goal] Retire first batch of 1024-bit roots, working towards requiring 2048-bit keys for built-in root certificates (dri=kathleen)
  • [ON TRACK] [stretch goal] Get CA Program data into one database (dri=kathleen)