Go to file
Jakub Jelinek cbffc05bdd 4.3.0-0.8
2008-02-12 22:40:15 +00:00
.cvsignore 4.3.0-0.8 2008-02-12 22:40:15 +00:00
gcc43-build-id.patch 4.3.0-0.2 2007-12-12 20:33:17 +00:00
gcc43-c++-builtin-redecl.patch 4.3.0-0.2 2007-12-12 20:33:17 +00:00
gcc43-cpp-pragma.patch 4.3.0-0.6 2008-01-25 17:43:01 +00:00
gcc43-ia64-libunwind.patch 4.3.0-0.2 2007-12-12 20:33:17 +00:00
gcc43-java-debug-iface-type.patch 4.3.0-0.6 2008-01-25 17:43:01 +00:00
gcc43-java-nomulti.patch 4.3.0-0.2 2007-12-12 20:33:17 +00:00
gcc43-ppc32-retaddr.patch 4.3.0-0.2 2007-12-12 20:33:17 +00:00
gcc43-ppc64-ia64-GNU-stack.patch 4.3.0-0.2 2007-12-12 20:33:17 +00:00
gcc43-pr27898.patch 4.3.0-0.2 2007-12-12 20:33:17 +00:00
gcc43-pr32139.patch 4.3.0-0.6 2008-01-25 17:43:01 +00:00
gcc43-pr33763.patch 4.3.0-0.2 2007-12-12 20:33:17 +00:00
gcc43-pr35130.patch 4.3.0-0.8 2008-02-12 22:40:15 +00:00
gcc43-pr35138.patch 4.3.0-0.8 2008-02-12 22:40:15 +00:00
gcc43-rh330771.patch 4.3.0-0.2 2007-12-12 20:33:17 +00:00
gcc43-rh341221.patch 4.3.0-0.2 2007-12-12 20:33:17 +00:00
gcc43.spec 4.3.0-0.8 2008-02-12 22:40:15 +00:00
libgcc_post_upgrade.c 4.1.2-16 2007-07-23 12:23:41 +00:00
Makefile makefile update to properly grab makefile.common 2007-10-15 18:46:35 +00:00
protoize.1
README.libgcjwebplugin.so
sources 4.3.0-0.8 2008-02-12 22:40:15 +00:00

gcjwebplugin is a Firefox plugin for running Java applets.  It is now
included in the libgcj sub-package, though it is not enabled by
default.

GNU Classpath and libgcj's security implementation is under active
development, but it is not ready to be declared secure.  Specifically,
it cannot run untrusted applets safely.

When gcjwebplugin is enabled, it prompts you with a dialog before
loading an applet.  The dialog tells you that a certain URL would like
to load an applet, and asks if you trust the applet.  Be aware though
that this dialog is mostly informative and doesn't provide much
protection:

- http and DNS can be spoofed meaning that the URL named in the
  warning dialog cannot be trusted

- someone could create a browser denial-of-service attack by creating a
  page with hundreds of applet tags, causing gcjwebplugin to create
  warning dialog after warning dialog.  The browser would have to be
  closed to eliminate the latest dialog

- the whitelist is provided as a convenience, but it is unsafe because a
  domain may change hands from a trusted owner to an untrusted owner.
  If that domain is in the whitelist then the warning dialog will not
  appear when loading the new malicious applet.

CURRENTLY GCJWEBPLUGIN RUNS WITH NO SECURITY MANAGER.  THIS MEANS THAT
APPLETS CAN DO ANYTHING A JAVA APPLICATION THAT YOU DOWNLOAD AND RUN
COULD DO.  BE *VERY* CAREFUL WHICH APPLETS YOU RUN.  DO NOT USE
GCJWEBPLUGIN ON YOUR SYSTEM IF YOUR SYSTEM STORES IMPORTANT DATA.
THIS DATA CAN BE DESTROYED OR STOLEN.

The same warning applies to gappletviewer, which also runs with no
security manager (in fact, gcjwebplugin spawns gappletviewer to do the
applet loading).  When run on the command line, gappletviewer issues a
warning on startup and asks you if you want to continue.

Even considering the risks involved, you may still want to try
gcjwebplugin.  GNU Classpath's AWT and Swing implementations are now
sufficiently mature that they're able to run many applets deployed on
the web.  If you're interested in trying gcjwebplugin, you can do so
by creating a symbolic link in ~/.mozilla/plugins like so:

ln -s /usr/lib/gcj-@VERSION@/libgcjwebplugin.so ~/.mozilla/plugins/

Type about:plugins in Firefox's URL bar to confirm that the plugin has
been loaded.  To see gcjwebplugin debugging output, run:

firefox -g

then at the GDB prompt, type

run

Please report bugs in Red Hat Bugzilla: http://bugzilla.redhat.com