[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #24154 [Applications/Tor Browser]: Look into fuzzing our tor-browser patches



#24154: Look into fuzzing our tor-browser patches
-------------------------------------------------+-------------------------
 Reporter:  gk                                   |          Owner:  tbb-
                                                 |  team
     Type:  task                                 |         Status:  new
 Priority:  Very High                            |      Milestone:
Component:  Applications/Tor Browser             |        Version:
 Severity:  Normal                               |     Resolution:
 Keywords:  TorBrowserTeam201711,                |  Actual Points:
  GeorgKoppen201711                              |
Parent ID:                                       |         Points:
 Reviewer:                                       |        Sponsor:
                                                 |  Sponsor4
-------------------------------------------------+-------------------------

Comment (by gk):

 To sum up on where we are with this:

 To get started with fuzzing the Firefox codebase it seems worth trying to
 get our own patches under scrutiny first. Firefox itself is regularly
 fuzzed by an own, specialized team targeting different components (like
 the JS engines).

 As we don't have any JS engine patches ourselves there is no need for
 looking for a specialized tool in that area. Instead I started to look
 into `domfuzz` (https://github.com/MozillaSecurity/domfuzz) while glancing
 over `domato` (https://github.com/google/domato) which we might deploy
 later on.

 I got `domfuzz` running locally and started fuzzing our code using ASan
 builds (see: #21998 and #24478). There are some challenges we might want
 to consider, though, to make this a smoother and more successful
 experience:

 1) We are using ESR 52 and git and the fuzzing code is expecting `mozilla-
 central` and a mercurial repo. We can work around that but might benefit
 from the idea to at least rebase our patches to `mozilla-central`
 regularly (see: https://lists.torproject.org/pipermail/tbb-
 dev/2017-November/000669.html) and use that. That might as help with the
 plan to discover issues in the Firefox codebase itself.

 2) Doing fuzzing on local computer does not scale and does not give good
 results. Thus, we need to get dedicated machines for that thinking about
 budget etc. I asked Mozilla if we could share resources somehow but they
 declined for good reasons. But they are willing to help us to duplicate
 their infrastructure or at least to get their tools running for us.

 3) There is currently no process established to get the feedback from the
 fuzzing efforts back into the development cycle (like ticket creation,
 ticket assignments and working on them).

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/24154#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs