I saw Mozilla has made a few security improvements to Firefox. It now has a Mixed Content Blocker to help prevent...
man-in-the-middle attacks. Also, following in the footsteps of Google's Chrome and Microsoft's Internet Explorer, Mozilla has added Content Security Policy 1.0 to Firefox. Can you explain the effects of these Firefox security features on Web browser security?
Ask the Expert
SearchSecurity expert Michael Cobb is standing by to answer your questions about enterprise application security and platform security. Submit them now via email. (All questions are anonymous.)
Mixed Content Blocker, which is enabled by default in Firefox 23, provides added protection for users when they access a webpage that contains content delivered via HTTPS and HTTP. While users can easily validate the source of HTTPS content, resources loaded via HTTP can't necessarily be trusted. Lazy site design can result in mixed content pages, which means the site can be subverted by hackers to launch a man-in-the-middle attack.
To mitigate this threat, Mixed Content Blocker prevents certain types of resources from appearing in an HTTPS page if they are loaded insecurely over HTTP. Content that has access to and can affect parts of the Document Object Model, such as scripts (e.g., Mixed Active Content), is blocked by default because it can be used in an attack to steal sensitive data from users. Mixed Passive Content (e.g., images, audio and video), is far less dangerous and therefore is allowed to load.
Though Mixed Content Blocker is one of the Firefox security features turned on by default, as with any security control, it is good to take the time to learn why it is important and how it protects users.
Content Security Policy (CSP) allows Web administrators to send an HTTP response header to a browser stating the locations from which additional content embedded in an HTML document can be loaded. This is an easy way for sites to protect users from cross-site scripting (XSS) and other data-injection attacks. Browsers assume all the content on a webpage is legitimately part of that page, but XSS, for example, tricks a website into delivering malicious code along with the intended content and allows hackers to abuse the assumed trust.
By whitelisting the domains in a CSP header and dictating where resources such as scripts can come from, administrators can prevent arbitrary or injected code hosted elsewhere from executing. By default, whitelisting also prevents inline scripts from executing and inline styles from being applied to the page.
Mozilla did add an implementation of CSP to Firefox 4.0 in 2011, but CSP 1.0, which is supported by Google Chrome and partially by Internet Explorer 10, is now the formal World Wide Web Consortium specification. This means that there is no longer a requirement to send multiple CSP headers with different syntaxes to different browsers. Developers who made use of Firefox's initial implementation of the feature should check out Mozilla's security blog because it offers information about the changes in the new implementation and details what needs to be done to guarantee that existing implementations will continue to work after the transition period.
Dig Deeper on Web browser security
Related Q&A from Michael Cobb
Researchers developed a tool to help prevent improper certificate pinning that causes security issues. Expert Michael Cobb reviews the issue and the ...continue reading
Google Project Zero discovered a WPAD attack that could target systems running Windows 10. Expert Michael Cobb explains how the attack works and how ...continue reading
App trackers were found in hundreds of Google Play apps. Expert Michael Cobb explains the threat they pose and how GDPR has the potential to reduce ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.