Wipe extra entries from the component policy cache only after response validation |
||||||
Issue descriptionCurrently, old entries are deleted from the component policy cache when considering a new policy fetch request _before_ it's validated. This means that if somebody replaces the valid component policy fetch responses with invalid ones (e.g. empty), then the cached policy will be lost before realizing that the new policy is invalid. The deletion should happen only after the policy signature is validated. The solution will be probably simpler after issue 650785 is fixed, as the decision to download and store all available component policies should greatly simplify the logic.
,
Dec 1 2016
,
Dec 2 2016
,
Feb 20 2017
Looks like there's not much we can do with this currently. Solution a) from comment #1 doesn't look nice to me (it makes it very simple to start spoiling the client profiles with unused data). Solution b) would be feasible only if we decide to change the policy protocol at some point. Drew, this is not going to come about in the foreseeable future, right? Do you think it's fine to live with this flaw with the component policies?
,
Feb 20 2017
I think relying on SSL to prevent MITM-ing is OK. It's not ideal that an attacker could just drop individual policy for extension blobs, but at least you can't inject policy this way, just make an extension unmanaged.
,
Feb 20 2017
RE comment #5: usually we have a second level of protection besides relying on SSL to DMServer. But I agree that the risk still looks to be relatively small here. Marking this as WontFix then. The TODO in the code is still there, and it will point to this discussion in case anyone else starts thinking on this issue.
,
May 30 2017
This bug has been closed for more than 14 weeks. Removing security view restrictions. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot |
||||||
►
Sign in to add a comment |
||||||
Comment 1 by emaxx@chromium.org
, Dec 1 2016