Skip to content
This repository has been archived by the owner on Feb 20, 2023. It is now read-only.

Enable FxA state encryption for release #6704

Closed
1 of 2 tasks
grigoryk opened this issue Nov 20, 2019 · 9 comments
Closed
1 of 2 tasks

Enable FxA state encryption for release #6704

grigoryk opened this issue Nov 20, 2019 · 9 comments
Labels
Feature:Accounts P2 Upcoming release 🙅 waiting Issues that are blocked or has dependencies that are not ready wontfix

Comments

@grigoryk
Copy link
Contributor

grigoryk commented Nov 20, 2019

#5938 enabled account state encryption for nightly users.

Things to watch out for in Sentry:

  • instances of AbnormalFxaEvent, specifically MissingExpectedAccountAfterStartup
  • instances of AbnormalAccountStorageEvent@UnexpectedlyMissingAccountState

If we don't see a spike in these after a few weeks, let's consider flipping encrypted storage for the release channels.

Acceptance Criteria

  • Look on Sentry and verify that there are not a lot of the highlighted issues. If there are, file and prioritize them.
  • Enable FxA state encryption on release

┆Issue is synchronized with this Jira Task

@grigoryk
Copy link
Contributor Author

Note that there's currently some volume of MissingExpectedAccountAfterStartup. I expect those to drop to zero once mozilla-mobile/android-components#5103 makes its way to nightly users.

@boek boek added the P2 Upcoming release label Dec 27, 2019
@grigoryk
Copy link
Contributor Author

There was a non-zero volume of Android KeyStore related crashes in Sentry. This needs more investigation.

@liuche
Copy link
Contributor

liuche commented Jan 18, 2020

Not seeing many crashes for AbnormalFxaEvent$MissingExpectedAccountAfterStartup on Nightly, which peaked Jan 11 with the Login startup crash, and then has trended back down. Not many crashes on Sentry either.

This is probably fine to turn on at this point.

@ValentinTimisica ValentinTimisica self-assigned this Jan 22, 2020
ValentinTimisica added a commit to ValentinTimisica/fenix that referenced this issue Jan 22, 2020
@ValentinTimisica
Copy link
Contributor

ValentinTimisica commented Jan 22, 2020

Based on this comment I understand that FxA state encryption needs to be enabled for all channels. So I made a PR where I set secureStateAtRest = true. @grigoryk is this correct?
If it needs to be enabled just for Nightly and Release I will change it accordingly.

@ekager
Copy link
Contributor

ekager commented Feb 12, 2020

We've decided to wait a bit longer to enable for all channels see #8324

@ekager ekager closed this as completed Feb 12, 2020
@ekager
Copy link
Contributor

ekager commented Feb 12, 2020

Didn't mean to close the issue

@ekager ekager reopened this Feb 12, 2020
@ValentinTimisica ValentinTimisica removed their assignment Feb 12, 2020
@ValentinTimisica ValentinTimisica added the 🙅 waiting Issues that are blocked or has dependencies that are not ready label Feb 12, 2020
@liuche liuche removed the must label Feb 12, 2020
@liuche
Copy link
Contributor

liuche commented Feb 12, 2020

We'll do this after release, based on some concerns about a low number of crashes #8324 and how this would affect Fennec Release population devices. This is probably low because the Fenix release population is already using the system keystore, but to be safe we'll turn this on as an experiment rollout after our release.

@liuche
Copy link
Contributor

liuche commented Apr 15, 2020

@grigoryk do we still care about this bug

@stale
Copy link

stale bot commented Feb 5, 2021

See: #17373 This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.

@stale stale bot added the wontfix label Feb 5, 2021
@stale stale bot closed this as completed Feb 12, 2021
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
Feature:Accounts P2 Upcoming release 🙅 waiting Issues that are blocked or has dependencies that are not ready wontfix
Projects
None yet
Development

No branches or pull requests

5 participants