diff options
Diffstat (limited to 'security/mac')
11 files changed, 318 insertions, 0 deletions
diff --git a/security/mac/hardenedruntime/v1/developer/browser.xml b/security/mac/hardenedruntime/v1/developer/browser.xml new file mode 100644 index 0000000000..04ac41acaa --- /dev/null +++ b/security/mac/hardenedruntime/v1/developer/browser.xml @@ -0,0 +1,44 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> +<!-- + Entitlements to apply during codesigning of developer builds. These + differ from the production entitlements in that they allow debugging of + executables and allow dyld environment variables to be used. This set of + entitlements is intended to be used for signing of builds used in + automated testing or local developer builds where debugging of a signed + build might be necessary. The com.apple.security.get-task-allow + entitlement must be set to true to allow debuggers to attach to + application processes but prohibits notarization with the notary service. + dyld environment variables are used for some tests and may be useful for + developers. +--> +<plist version="1.0"> + <dict> + <!-- Firefox needs to create executable pages without MAP_JIT on x64 --> + <key>com.apple.security.cs.allow-unsigned-executable-memory</key><true/> + + <!-- Firefox needs to create executable pages with MAP_JIT on aarch64 --> + <key>com.apple.security.cs.allow-jit</key><true/> + + <!-- Allow loading third party CDM libraries --> + <key>com.apple.security.cs.disable-library-validation</key><true/> + + <!-- Allow dyld environment variables for gtests and debugging --> + <key>com.apple.security.cs.allow-dyld-environment-variables</key><true/> + + <!-- Allow debuggers to attach to running executables --> + <key>com.apple.security.get-task-allow</key><true/> + + <!-- Firefox needs to access the microphone on sites the user allows --> + <key>com.apple.security.device.audio-input</key><true/> + + <!-- Firefox needs to access the camera on sites the user allows --> + <key>com.apple.security.device.camera</key><true/> + + <!-- Firefox needs to access the location on sites the user allows --> + <key>com.apple.security.personal-information.location</key><true/> + + <!-- For SmartCardServices(7) --> + <key>com.apple.security.smartcard</key><true/> + </dict> +</plist> diff --git a/security/mac/hardenedruntime/v1/production/browser.xml b/security/mac/hardenedruntime/v1/production/browser.xml new file mode 100644 index 0000000000..860db86814 --- /dev/null +++ b/security/mac/hardenedruntime/v1/production/browser.xml @@ -0,0 +1,36 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> +<!-- + Entitlements to apply during codesigning of production builds. +--> +<plist version="1.0"> + <dict> + <!-- Firefox needs to create executable pages without MAP_JIT on x64 --> + <key>com.apple.security.cs.allow-unsigned-executable-memory</key><true/> + + <!-- Firefox needs to create executable pages with MAP_JIT on aarch64 --> + <key>com.apple.security.cs.allow-jit</key><true/> + + <!-- Allow loading third party CDM libraries --> + <key>com.apple.security.cs.disable-library-validation</key><true/> + + <!-- Firefox needs to access the microphone on sites the user allows --> + <key>com.apple.security.device.audio-input</key><true/> + + <!-- Firefox needs to access the camera on sites the user allows --> + <key>com.apple.security.device.camera</key><true/> + + <!-- Firefox needs to access the location on sites the user allows --> + <key>com.apple.security.personal-information.location</key><true/> + + <!-- For SmartCardServices(7) --> + <key>com.apple.security.smartcard</key><true/> + + <!-- Required for com.apple.developer.web-browser.public-key-credential --> + <key>com.apple.application-identifier</key> + <string>43AQ936H96.org.mozilla.*</string> + + <!-- For platform passkey (webauthn) support --> + <key>com.apple.developer.web-browser.public-key-credential</key><true/> + </dict> +</plist> diff --git a/security/mac/hardenedruntime/v2/developer/browser.xml b/security/mac/hardenedruntime/v2/developer/browser.xml new file mode 100644 index 0000000000..33f520143e --- /dev/null +++ b/security/mac/hardenedruntime/v2/developer/browser.xml @@ -0,0 +1,37 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> +<!-- + Entitlements to apply to the main browser process executable during + codesigning of developer builds. +--> +<plist version="1.0"> + <dict> + <!-- Firefox needs to create executable pages without MAP_JIT on x64 --> + <key>com.apple.security.cs.allow-unsigned-executable-memory</key><true/> + + <!-- Firefox needs to create executable pages with MAP_JIT on aarch64 --> + <key>com.apple.security.cs.allow-jit</key><true/> + + <!-- For dev builds only, allow loading third party libraries as a + workaround enabling self-signed builds to launch. --> + <key>com.apple.security.cs.disable-library-validation</key><true/> + + <!-- Allow dyld environment variables for gtests and debugging --> + <key>com.apple.security.cs.allow-dyld-environment-variables</key><true/> + + <!-- Allow debuggers to attach to running executables --> + <key>com.apple.security.get-task-allow</key><true/> + + <!-- Firefox needs to access the microphone on sites the user allows --> + <key>com.apple.security.device.audio-input</key><true/> + + <!-- Firefox needs to access the camera on sites the user allows --> + <key>com.apple.security.device.camera</key><true/> + + <!-- Firefox needs to access the location on sites the user allows --> + <key>com.apple.security.personal-information.location</key><true/> + + <!-- For SmartCardServices(7) --> + <key>com.apple.security.smartcard</key><true/> + </dict> +</plist> diff --git a/security/mac/hardenedruntime/v2/developer/media-plugin-helper.xml b/security/mac/hardenedruntime/v2/developer/media-plugin-helper.xml new file mode 100644 index 0000000000..86d376d87c --- /dev/null +++ b/security/mac/hardenedruntime/v2/developer/media-plugin-helper.xml @@ -0,0 +1,18 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> +<!-- + Entitlements to apply to the media-plugin-helper.app bundle during + codesigning of developer builds. +--> +<plist version="1.0"> + <dict> + <!-- Allow loading third party CDM libraries --> + <key>com.apple.security.cs.disable-library-validation</key><true/> + + <!-- Allow dyld environment variables for debugging --> + <key>com.apple.security.cs.allow-dyld-environment-variables</key><true/> + + <!-- Allow debuggers to attach to running executables --> + <key>com.apple.security.get-task-allow</key><true/> + </dict> +</plist> diff --git a/security/mac/hardenedruntime/v2/developer/plugin-container.xml b/security/mac/hardenedruntime/v2/developer/plugin-container.xml new file mode 100644 index 0000000000..7bed5fc2b8 --- /dev/null +++ b/security/mac/hardenedruntime/v2/developer/plugin-container.xml @@ -0,0 +1,25 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> +<!-- + Entitlements to apply to the plugin-container.app bundle during + codesigning of developer builds. +--> +<plist version="1.0"> + <dict> + <!-- Firefox needs to create executable pages without MAP_JIT on x64 --> + <key>com.apple.security.cs.allow-unsigned-executable-memory</key><true/> + + <!-- Firefox needs to create executable pages with MAP_JIT on aarch64 --> + <key>com.apple.security.cs.allow-jit</key><true/> + + <!-- Allow dyld environment variables for debugging --> + <key>com.apple.security.cs.allow-dyld-environment-variables</key><true/> + + <!-- Allow debuggers to attach to running executables --> + <key>com.apple.security.get-task-allow</key><true/> + + <!-- For dev builds only, allow loading third party libraries as a + workaround enabling self-signed builds to launch. --> + <key>com.apple.security.cs.disable-library-validation</key><true/> + </dict> +</plist> diff --git a/security/mac/hardenedruntime/v2/developer/utility.xml b/security/mac/hardenedruntime/v2/developer/utility.xml new file mode 100644 index 0000000000..3c4f73e80b --- /dev/null +++ b/security/mac/hardenedruntime/v2/developer/utility.xml @@ -0,0 +1,20 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> +<!-- + Entitlements to apply to non-browser executables such as updater, + pingsender, minidump-analyzer, and crashreporter during codesigning of + developer builds. +--> +<plist version="1.0"> + <dict> + <!-- Allow dyld environment variables for debugging --> + <key>com.apple.security.cs.allow-dyld-environment-variables</key><true/> + + <!-- Allow debuggers to attach to running executables --> + <key>com.apple.security.get-task-allow</key><true/> + + <!-- For dev builds only, allow loading third party libraries as a + workaround enabling self-signed builds to launch. --> + <key>com.apple.security.cs.disable-library-validation</key><true/> + </dict> +</plist> diff --git a/security/mac/hardenedruntime/v2/production/firefox.browser.xml b/security/mac/hardenedruntime/v2/production/firefox.browser.xml new file mode 100644 index 0000000000..3a14e8ad37 --- /dev/null +++ b/security/mac/hardenedruntime/v2/production/firefox.browser.xml @@ -0,0 +1,37 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> +<!-- + Entitlements to apply to the main browser process executable during + codesigning of production channel builds. +--> +<plist version="1.0"> + <dict> + <!-- Firefox needs to create executable pages (without MAP_JIT) --> + <key>com.apple.security.cs.allow-unsigned-executable-memory</key><true/> + + <!-- Allow loading third party libraries to support pkcs11 modules --> + <key>com.apple.security.cs.disable-library-validation</key><true/> + + <!-- Firefox needs to create executable pages with MAP_JIT on aarch64 --> + <key>com.apple.security.cs.allow-jit</key><true/> + + <!-- Firefox needs to access the microphone on sites the user allows --> + <key>com.apple.security.device.audio-input</key><true/> + + <!-- Firefox needs to access the camera on sites the user allows --> + <key>com.apple.security.device.camera</key><true/> + + <!-- Firefox needs to access the location on sites the user allows --> + <key>com.apple.security.personal-information.location</key><true/> + + <!-- For SmartCardServices(7) --> + <key>com.apple.security.smartcard</key><true/> + + <!-- Required for com.apple.developer.web-browser.public-key-credential --> + <key>com.apple.application-identifier</key> + <string>43AQ936H96.org.mozilla.firefox</string> + + <!-- For platform passkey (webauthn) support --> + <key>com.apple.developer.web-browser.public-key-credential</key><true/> + </dict> +</plist> diff --git a/security/mac/hardenedruntime/v2/production/firefoxdeveloperedition.browser.xml b/security/mac/hardenedruntime/v2/production/firefoxdeveloperedition.browser.xml new file mode 100644 index 0000000000..ef8480b081 --- /dev/null +++ b/security/mac/hardenedruntime/v2/production/firefoxdeveloperedition.browser.xml @@ -0,0 +1,37 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> +<!-- + Entitlements to apply to the main browser process executable during + codesigning of production channel builds. +--> +<plist version="1.0"> + <dict> + <!-- Firefox needs to create executable pages (without MAP_JIT) --> + <key>com.apple.security.cs.allow-unsigned-executable-memory</key><true/> + + <!-- Allow loading third party libraries to support pkcs11 modules --> + <key>com.apple.security.cs.disable-library-validation</key><true/> + + <!-- Firefox needs to create executable pages with MAP_JIT on aarch64 --> + <key>com.apple.security.cs.allow-jit</key><true/> + + <!-- Firefox needs to access the microphone on sites the user allows --> + <key>com.apple.security.device.audio-input</key><true/> + + <!-- Firefox needs to access the camera on sites the user allows --> + <key>com.apple.security.device.camera</key><true/> + + <!-- Firefox needs to access the location on sites the user allows --> + <key>com.apple.security.personal-information.location</key><true/> + + <!-- For SmartCardServices(7) --> + <key>com.apple.security.smartcard</key><true/> + + <!-- Required for com.apple.developer.web-browser.public-key-credential --> + <key>com.apple.application-identifier</key> + <string>43AQ936H96.org.mozilla.firefoxdeveloperedition</string> + + <!-- For platform passkey (webauthn) support --> + <key>com.apple.developer.web-browser.public-key-credential</key><true/> + </dict> +</plist> diff --git a/security/mac/hardenedruntime/v2/production/media-plugin-helper.xml b/security/mac/hardenedruntime/v2/production/media-plugin-helper.xml new file mode 100644 index 0000000000..8ea97fc742 --- /dev/null +++ b/security/mac/hardenedruntime/v2/production/media-plugin-helper.xml @@ -0,0 +1,12 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> +<!-- + Entitlements to apply to the media-plugin-helper.app bundle during + codesigning of production channel builds. +--> +<plist version="1.0"> + <dict> + <!-- Allow loading third party CDM libraries --> + <key>com.apple.security.cs.disable-library-validation</key><true/> + </dict> +</plist> diff --git a/security/mac/hardenedruntime/v2/production/nightly.browser.xml b/security/mac/hardenedruntime/v2/production/nightly.browser.xml new file mode 100644 index 0000000000..03ff689334 --- /dev/null +++ b/security/mac/hardenedruntime/v2/production/nightly.browser.xml @@ -0,0 +1,37 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> +<!-- + Entitlements to apply to the main browser process executable during + codesigning of production channel builds. +--> +<plist version="1.0"> + <dict> + <!-- Firefox needs to create executable pages (without MAP_JIT) --> + <key>com.apple.security.cs.allow-unsigned-executable-memory</key><true/> + + <!-- Allow loading third party libraries to support pkcs11 modules --> + <key>com.apple.security.cs.disable-library-validation</key><true/> + + <!-- Firefox needs to create executable pages with MAP_JIT on aarch64 --> + <key>com.apple.security.cs.allow-jit</key><true/> + + <!-- Firefox needs to access the microphone on sites the user allows --> + <key>com.apple.security.device.audio-input</key><true/> + + <!-- Firefox needs to access the camera on sites the user allows --> + <key>com.apple.security.device.camera</key><true/> + + <!-- Firefox needs to access the location on sites the user allows --> + <key>com.apple.security.personal-information.location</key><true/> + + <!-- For SmartCardServices(7) --> + <key>com.apple.security.smartcard</key><true/> + + <!-- Required for com.apple.developer.web-browser.public-key-credential --> + <key>com.apple.application-identifier</key> + <string>43AQ936H96.org.mozilla.nightly</string> + + <!-- For platform passkey (webauthn) support --> + <key>com.apple.developer.web-browser.public-key-credential</key><true/> + </dict> +</plist> diff --git a/security/mac/hardenedruntime/v2/production/plugin-container.xml b/security/mac/hardenedruntime/v2/production/plugin-container.xml new file mode 100644 index 0000000000..cfc79f1d21 --- /dev/null +++ b/security/mac/hardenedruntime/v2/production/plugin-container.xml @@ -0,0 +1,15 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> +<!-- + Entitlements to apply to the plugin-container.app bundle during + codesigning of production channel builds. +--> +<plist version="1.0"> + <dict> + <!-- Firefox needs to create executable pages without MAP_JIT on x64 --> + <key>com.apple.security.cs.allow-unsigned-executable-memory</key><true/> + + <!-- Firefox needs to create executable pages with MAP_JIT on aarch64 --> + <key>com.apple.security.cs.allow-jit</key><true/> + </dict> +</plist> |