Security/Sandbox/Deny Filesystem Access: Difference between revisions
Haftandilian (talk | contribs) (Cross-Platform Blockers) |
Haftandilian (talk | contribs) |
||
Line 39: | Line 39: | ||
| {{bug|1090454}} Trigger print jobs from the parent instead of the child when printing from a remote browser || Blocks disabling '''write''' access to $HOME and other locations || | | {{bug|1090454}} Trigger print jobs from the parent instead of the child when printing from a remote browser || Blocks disabling '''write''' access to $HOME and other locations || | ||
# For print-to-file (e.g., PDF, postscript). | # For print-to-file (e.g., PDF, postscript). | ||
# | # Printing to a printer seems to work with write access to $HOME disabled. Without using print_via_parent, using dtrace I saw plugin-container read from ~/.cups/client.conf and write to the content process temp dir ~/Library/Caches/TemporaryItems/Temp-{UUID}. | ||
|- | |- | ||
| {{bug|1136836}} Load chrome: URLs through parent process || Blocks disabling read access to parts of the profile dir || | | {{bug|1136836}} Load chrome: URLs through parent process || Blocks disabling read access to parts of the profile dir || |
Revision as of 17:39, 19 July 2016
References
Status
Platform | Current Status of Content Filesystem Sandboxing on Nightly |
---|---|
Windows | TBD |
OS X | Some directories are read/write protected, but this will not provide real security until the bulk of the $HOME directory is read/write protected.
On OS X, the Firefox Profile directory is stored within ~/Library/Application Support/Firefox/Profiles/. ~/Library is read/write protected with a few exceptions for some specific subdirectories. Access to $HOME and other areas of the filesystem is not restricted. i.e., the content process can read and write to/from anywhere the OS permits: $HOME and temporary directories. The ~/Library read/write prevention could be bypassed because the rest of the $HOME is read/write accessible. For example, a compromised process could add malicious commands to ~/.login-type files to copy data from ~/Library when a user logs in. |
Linux | No filesystem policy enabled |
Other | No filesystem policy enabled |
Blockers
Cross-Platform Blockers
- bug 1196384 - (sandbox-fs) [meta] Cross-platform blockers for default-deny filesystem policy for content processes
Bug | What does it block? | Why do we need it? |
---|---|---|
bug 922481 e10s: remote the file:// protocol | Blocks disabling read access to $HOME and other locations |
Another approach to this is to open file:// URI's in the chrome process. If a content process that has read or write access to a local file (even indirectly through the parent) shouldn't also be used for web content, it follows that more than one content process would be needed. See bug 1147911 Use a separate content process for file:// URLs. If file:// access is remoted to the parent, could the contents of the URL bar be used to determine the allowable scope and accept/reject files as necessary? (Discussed previously by :billm, :bobowen.) |
bug 1090454 Trigger print jobs from the parent instead of the child when printing from a remote browser | Blocks disabling write access to $HOME and other locations |
|
bug 1136836 Load chrome: URLs through parent process | Blocks disabling read access to parts of the profile dir |
Another approach is to give the content process read access to the these chrome:// and resource:// files. That would be a place in the profile and also the Firefox install bundle. billm suspects those are safe locations in the profile that don't contain sensitive data. |
bug 1109293 Desktop content process resource:// and moz-extension:// URIs should not directly use file:/// | Might block how we handle file:// URI's |
|
bug 1187099 User stylesheets loaded from a file inside ~/Library don't apply in the content process | TBD | TBD |
Windows-Specific Blockers
Mac-Specific Blockers
- bug 1228022 Trigger print jobs from the parent instead of the child for OSX
- bug 1187099 User stylesheets loaded from a file inside ~/Library don't apply in the content process