Security and Javascript

simo s at ssimo.org
Tue Jul 2 13:07:55 UTC 2013


On Tue, 2013-07-02 at 11:24 +0300, Timo Juhani Lindfors wrote:
> Simo Sorce <s at ssimo.org> writes:
> > sandbox -i $HOME/.mozilla/extensions -i $HOME/.mozilla/plugins -i 
> > $HOME/.mozilla/firefox/abcdefgh.sandbox -i 
> > $HOME/.mozilla/firefox/profiles.ini -w 1024x900 -t sandbox_web_t -M -X 
> > /usr/bin/firefox -P sandbox $*
> >
> > It requires at least a basic SeLinux Policy installed and the sandbox
> > program, but it is really neat in that it completely isolates the
> > browser and crates a completely new environment for it to run.
> 
> Can't the browser still talk anything it wants with the X server? Or
> does your X server somehow understand selinux labels?

sandbox -X runs everything into a nested X server (Xephyr here) run
explicitly for the application, so that the app does not have direct
access to the outer X server.

Although there was a feature (XACE) to make the X server more secure I
do no think it ever worked well enough. I think the only good solution
will be to use wayland once it is good enough. Its model isolates each
process and is much better from a security pov from what I've been told
so far.

Simo.




More information about the Discussion mailing list