Sandbox the web browser
The web browser probably has one the biggest attack surface exposed by Tails to a network attacker, so anything we can do to make it harder, for an attacker, to escalate from "browser exploited" to "whole system under’s attacker control", is welcome.
When a container-based solution becomes a viable, secure solution for creating isolated jails, the chroot approach used by the unsafe browser will be adaptable to the regular Iceweasel.
Our work to add AppArmor support will be useful in this area too, either in replacement of a container-based approach, or to complement it.
Special care needs to be given to allow sharing files between the Tor
Browser and the rest of the system, e.g. to download and upload files.
One could give read/write access from/to one special directory in
$HOME
(likely: “Downloads”), using bind-mounts and ACLs as needed.
Blueprint: https://tails.boum.org/blueprint/sandbox_the_web_browser/
Feature Branch: feature/5525-sandbox-web-browser
Subtasks
Related issues
- Related to #5422
- Related to #5370 (closed)
- Related to #8280
- Related to #6178 (closed)
- Related to #8852 (closed)
Original created by @tails on 5525 (Redmine)