Firefox 3.0 alpha blocks malware, secures plugin updates

Mozilla has updated the preview of Firefox 3.0 to alpha 8, unveiling for the first time to users several security features it has talked up for months.

Share

Mozilla has updated the preview of Firefox 3.0 to alpha 8, unveiling for the first time to users several security features it has talked up for months.

Among the security provisions debuting in the new alpha of "Gran Paradiso," the code name for Firefox 3.0, are built in anti malware warnings and protection against rogue extension updates, according to documentation Mozilla posted to its website.

The malware blocker, which was first mocked up in June, will block websites thought to contain malicious downloads. The feature, a companion to the phishing site alert system in the current Firefox 2.0, will use information provided by Google to flag potentially dangerous sites, warn anyone trying to reach those URLs with Firefox and automatically block access to the site.

Mozilla also pointed to a URL that demonstrates the new malware blocker for alpha 8 users.

Also taking a bow is a check meant to prevent plugins' automatic updates from sending users to malicious sites where they might be infected by attack code or drive-by downloads.

Firefox relies on small plugins called "extensions" for much of its power and flexibility. Several thousand extensions have been written, the vast bulk of them by outside developers, that do everything from boost browsing speed to block irritating Flash animations. Firefox regularly checks to see if the installed extensions are up to date, and if not, automatically pulls in the newest version and installs it.

"Firefox automatically checks for updates to add-ons using a URL specified in the add-on's install manifest," Mozilla spells out in a developer's document. "Currently there are no requirements placed on these URLs. In particular, [they are not] required to be ‘https’. This allows either the update manifest or the update package to be compromised, potentially resulting in the injection of malicious updates. A demonstration of one form of compromise is already public."

Most extensions are hosted on Mozilla's own servers but some are not, and it's those off-site extensions that Mozilla wants to lock down.

To stymie attacks through a compromised extension update, Mozilla will require updates, both the actual update package and the much smaller notification of an update, to be delivered over an SSL-secured connection. Or the update must be digitally signed.

The change doesn't affect the initial installation of an extension, something Mozilla recognised. "[This] has no impact on the security of initial add-on installs," it told developers in the online guide.

This newest preview, which can be downloaded in versions for Windows, Mac OS X and Linux from the Mozilla site, still comes with a warning to end users. "Alpha 8 is intended for web application developers and our testing community. Current users of Mozilla Firefox should not use Gran Paradiso Alpha 8," the browser's release notes.

Mozilla has not officially committed to a release date for the final version of Firefox 3.0.

Now read:

Mozilla fixes Firefox QuickTime bug

Mozilla spins off Thunderbird email client

Find your next job with computerworld UK jobs