Skip to content

Sandbox the web browser

The web browser probably has one the biggest attack surface exposed by Tails to a network attacker, so anything we can do to make it harder, for an attacker, to escalate from "browser exploited" to "whole system under’s attacker control", is welcome.

When a container-based solution becomes a viable, secure solution for creating isolated jails, the chroot approach used by the unsafe browser will be adaptable to the regular Iceweasel.

Our work to add AppArmor support will be useful in this area too, either in replacement of a container-based approach, or to complement it.

Special care needs to be given to allow sharing files between the Tor Browser and the rest of the system, e.g. to download and upload files. One could give read/write access from/to one special directory in $HOME (likely: “Downloads”), using bind-mounts and ACLs as needed.

Blueprint: https://tails.boum.org/blueprint/sandbox_the_web_browser/

Feature Branch: feature/5525-sandbox-web-browser

Subtasks

Related issues

Original created by @tails on 5525 (Redmine)

To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information