Security/Security Bugs/EncryptedBugmail: Difference between revisions
(A couple of clarifications and extra useful bits of data) |
|||
Line 1: | Line 1: | ||
Secure Mail will soon by turned on for bugs in the "Security-Sensitive Core Bug" group in Mozilla's [https://bugzilla.mozilla.org Bugzilla]. This bug group includes all reported client security issues that are not web related. Specifically, this is for general platform, Javascript engine, Firefox, and Thunderbird code. | Secure Mail will soon by turned on for bugs in the "Security-Sensitive Core Bug" group in Mozilla's [https://bugzilla.mozilla.org Bugzilla]. This bug group includes all reported client security issues that are not web-related. Specifically, this is for general platform, Javascript engine, Firefox, and Thunderbird code. | ||
This will change the default Bugzilla email notification for bugs in the "Security-Sensitive Core Bug" group to simply | This will change the default Bugzilla email notification for bugs in the "Security-Sensitive Core Bug" group to simply say that a bug has changed, giving no details except for a link to the bug. In order to receive the same bug details for security bugs as normal bugs, Bugzilla users will need to install a PGP-compatible public key or an S/MIME key in Bugzilla. | ||
For members of the "Security-Sensitive Core Bug" group, you will | For members of the "Security-Sensitive Core Bug" group, you will <u>not</u> be able to reset your password through email without uploading an encryption key. Password resets will only be available by contacting bugzilla-admin@mozilla.org. This is to keep password reset URLs for sensitive accounts from being sent as a cleartext. | ||
There is basic information on Secure Mail [https://bugzilla.mozilla.org/page.cgi?id=securemail/help.html available] on Bugzilla that explains some of the functionality. | There is basic information on Secure Mail [https://bugzilla.mozilla.org/page.cgi?id=securemail/help.html available] on Bugzilla that explains some of the functionality. | ||
Line 13: | Line 13: | ||
There has been concern for some time that email containing security problems that can affect hundreds of millions of people are being sent to developers and other interested parties as clear text. This means that there is a risk of interception as the email is sent across the Internet or if mail is stored offline on a local machine with the mail client. By switching to encrypted email for security bugs, we lessen the risk of accidental exposure of security issues. | There has been concern for some time that email containing security problems that can affect hundreds of millions of people are being sent to developers and other interested parties as clear text. This means that there is a risk of interception as the email is sent across the Internet or if mail is stored offline on a local machine with the mail client. By switching to encrypted email for security bugs, we lessen the risk of accidental exposure of security issues. | ||
This change does make it more difficult to read bug mail for security issues in web hosted mail services but there is always the option of not setting up secure mail for an account and simply going to Bugzilla to view changes in security bugs. | This change does make it more difficult to read bug mail for security issues in web-hosted mail services but there is always the option of not setting up secure mail for an account and simply going to Bugzilla to view changes in security bugs. | ||
This change was piloted by the former Infrasec team at Mozilla, which focused on security issues in Web sites and infrastructure, and it was found to work well. | This change was piloted by the former Infrasec team at Mozilla, which focused on security issues in Web sites and infrastructure, and it was found to work well. | ||
Line 25: | Line 25: | ||
If you do not upload an encryption key and there is an update to a bug in a secure group, you will receive a notification that the bug has changed when it is updated but no details of the change. In order to view the details, you will need to visit the provided link in the e-mail to see the bug on Bugzilla. | If you do not upload an encryption key and there is an update to a bug in a secure group, you will receive a notification that the bug has changed when it is updated but no details of the change. In order to view the details, you will need to visit the provided link in the e-mail to see the bug on Bugzilla. | ||
Additionally, without uploading a key, you will not be able to reset your Bugzilla password over e-mail since the mail cannot be encrypted. You will require the assistance of an administrator (bugzilla-admin@mozilla.org) for password resets. | Additionally, without uploading a key, you will not be able to reset your Bugzilla password over e-mail since the mail cannot be encrypted. You will require the assistance of an administrator (bugzilla-admin@mozilla.org) for password resets. (Note: you can still <i>change</i> your password; you just can't retrieve it via URL-to-email if you've forgotten it.) | ||
Here is a sample email you would receive if you have '''not''' uploaded an encryption key: | Here is a sample email you would receive if you have '''not''' uploaded an encryption key: | ||
Line 65: | Line 65: | ||
=== 6. Where can I get more information on setting this up for my mail client? === | === 6. Where can I get more information on setting this up for my mail client? === | ||
If you are using Thunderbird, | If you are using Thunderbird, S/MIME is supported out of the box. You can run [http://enigmail.mozdev.org/home/index.php.html Enigmail], a Thunderbird extension, to read GPG encrypted e-mail. Basic setup instructions are [http://enigmail.mozdev.org/documentation/basic.php.html here] for it. | ||
If you are using OS X's Mail.app, you can use [http://www.gpgtools.org/gpgmail/index.html GPGMail], a GPG compatible addon. | If you are using OS X's Mail.app, you can use [http://www.gpgtools.org/gpgmail/index.html GPGMail], a GPG-compatible addon. | ||
Ars Technica has [http://arstechnica.com/apple/guides/2011/10/secure-your-e-mail-under-mac-os-x-and-ios-5-with-smime.ars published an article] on adding S/MIME certificates to Mail.app and iOS devices (and there is another article [http://blog.riobard.com/2010/05/18/sign-encrypt-email here] as well. | Ars Technica has [http://arstechnica.com/apple/guides/2011/10/secure-your-e-mail-under-mac-os-x-and-ios-5-with-smime.ars published an article] on adding S/MIME certificates to Mail.app and iOS devices (and there is another article [http://blog.riobard.com/2010/05/18/sign-encrypt-email here] as well. | ||
LuxSci FYI has an [http://luxsci.com/blog/installing-smime-and-pgp-encryption-certificates-into-major-email-clients.html article] on configuring Outlook and other email clients to use S/MIME and GPG as well. | LuxSci FYI has an [http://luxsci.com/blog/installing-smime-and-pgp-encryption-certificates-into-major-email-clients.html article] on configuring Outlook and other email clients to use S/MIME and GPG as well. |
Revision as of 10:15, 14 March 2012
Secure Mail will soon by turned on for bugs in the "Security-Sensitive Core Bug" group in Mozilla's Bugzilla. This bug group includes all reported client security issues that are not web-related. Specifically, this is for general platform, Javascript engine, Firefox, and Thunderbird code.
This will change the default Bugzilla email notification for bugs in the "Security-Sensitive Core Bug" group to simply say that a bug has changed, giving no details except for a link to the bug. In order to receive the same bug details for security bugs as normal bugs, Bugzilla users will need to install a PGP-compatible public key or an S/MIME key in Bugzilla.
For members of the "Security-Sensitive Core Bug" group, you will not be able to reset your password through email without uploading an encryption key. Password resets will only be available by contacting bugzilla-admin@mozilla.org. This is to keep password reset URLs for sensitive accounts from being sent as a cleartext.
There is basic information on Secure Mail available on Bugzilla that explains some of the functionality.
Frequently Asked Questions (FAQ)
1. Why are we making this change?
There has been concern for some time that email containing security problems that can affect hundreds of millions of people are being sent to developers and other interested parties as clear text. This means that there is a risk of interception as the email is sent across the Internet or if mail is stored offline on a local machine with the mail client. By switching to encrypted email for security bugs, we lessen the risk of accidental exposure of security issues.
This change does make it more difficult to read bug mail for security issues in web-hosted mail services but there is always the option of not setting up secure mail for an account and simply going to Bugzilla to view changes in security bugs.
This change was piloted by the former Infrasec team at Mozilla, which focused on security issues in Web sites and infrastructure, and it was found to work well.
2. How can I upload a Public Key?
Load your Secure Mail preferences tab for Bugzilla. This tab has a textarea where you can enter your PGP/GPG public key or S/MIME certificate.
3. What if I take no action?
If you do not upload an encryption key and there is an update to a bug in a secure group, you will receive a notification that the bug has changed when it is updated but no details of the change. In order to view the details, you will need to visit the provided link in the e-mail to see the bug on Bugzilla.
Additionally, without uploading a key, you will not be able to reset your Bugzilla password over e-mail since the mail cannot be encrypted. You will require the assistance of an administrator (bugzilla-admin@mozilla.org) for password resets. (Note: you can still change your password; you just can't retrieve it via URL-to-email if you've forgotten it.)
Here is a sample email you would receive if you have not uploaded an encryption key:
Subject: [Bug 1234] (Secure bug updated) Date: Thu, 01 Mar 2012 21:21:53 +0000 From: bugzilla-daemon@mozilla.org To: you@mozilla.com This email would have contained sensitive information, and you have not set a PGP/GPG key or SMIME certificate in the "Secure Mail" section of your user preferences. In order to receive the full text of similar mails in the future, please go to: https://bugzilla.mozilla.org/userprefs.cgi?tab=securemail and provide a key or certificate. You can see this bug's current state at: https://bugzilla.mozilla.org/show_bug.cgi?id=1234
4. I don't want to see these emails anymore, how do I turn them off?
You can change your preferences for when you wish Bugzilla to send you mail in your Email Preferences tab for your Bugzilla preferences. This contains a variety of settings for when Bugzilla should send you email and for the components you are watching.
5. How do I make a PGP/GPG public key or get an S/MIME certificate?
PGP/GPG keys have the advantage of being completely free to create but the disadvantage of being somewhat cumbersome to set up and use in comparison to S/MIME.
You can read a Quickstart for GPG or the one written by the Enigmail team. (There is an older Linux-oriented article as well.)
PGP/GPG keys uploaded to Bugzilla must be ASCII-armoured (i.e. text, with the first line containing BEGIN PGP PUBLIC KEY) in order to work.
You can obtain an S/MIME certificate from a number of providers. You can get a free one from StartCom or pay Verisign for one. Once you have it, export it from your browser as a .p12 file and import it into your mail client. S/MIME Keys must be in PEM format - i.e. Base64-encoded text, with the first line containing BEGIN CERTIFICATE. In order to upload it to Bugzilla, you will need to convert the certificate to a .pem file.
If you have OpenSSL installed, one way is as follows:
openssl pkcs12 -in certificate.p12 -out certificate.pem -nodes
The resulting .pem file is plain text and you can get your key out of it to be added to Bugzilla.
6. Where can I get more information on setting this up for my mail client?
If you are using Thunderbird, S/MIME is supported out of the box. You can run Enigmail, a Thunderbird extension, to read GPG encrypted e-mail. Basic setup instructions are here for it.
If you are using OS X's Mail.app, you can use GPGMail, a GPG-compatible addon.
Ars Technica has published an article on adding S/MIME certificates to Mail.app and iOS devices (and there is another article here as well.
LuxSci FYI has an article on configuring Outlook and other email clients to use S/MIME and GPG as well.