FoxInABox: Difference between revisions

From MozillaWiki
Jump to navigation Jump to search
No edit summary
Line 12: Line 12:


[[FoxInABox/ThingsThatShouldWork]]
[[FoxInABox/ThingsThatShouldWork]]
Related but not quite:
* * {{bug|730956}} - [[Features/Security/Low_rights_Firefox|Low rights Firefox]] (whole app sandbox)


Tracking: {{bug|925570}}.
Tracking: {{bug|925570}}.
Line 25: Line 22:
* {{ok|List and prioritize permissions to shut off}}
* {{ok|List and prioritize permissions to shut off}}
* {{ok|Burn down permission list}}
* {{ok|Burn down permission list}}
Resources:
* [[B2G/Architecture/System_Security/Seccomp|seccomp sandboxing]]


Permission Burndown List:
Permission Burndown List:
Line 67: Line 61:
* {{new|List and prioritize permissions to shut off}}
* {{new|List and prioritize permissions to shut off}}
* {{new|Burn down permission list}}
* {{new|Burn down permission list}}
Resources:
* [http://reverse.put.as/wp-content/uploads/2011/09/Apple-Sandbox-Guide-v1.0.pdf Apple's Sandbox guide]


Permission List:
Permission List:
Line 79: Line 70:
</table>
</table>


=== Puzzle Pieces ===
=== Additional Pieces ===
These are some things that we need to attack next (after a basic sandbox).
* GPU remoting (TBD)
* GPU remoting (TBD)
* Accessibility support
* Accessibility support
Line 90: Line 82:
= Resources =
= Resources =
== Sandboxing ==
== Sandboxing ==
* [[Features/Security/Low_rights_Firefox]]
* [[Features/Security/Low_rights_Firefox]] -- {{bug|730956}}
* [https://intranet.mozilla.org/User:Imelven@mozilla.com/Sandboxing Ian's sandboxing page]
* [https://intranet.mozilla.org/User:Imelven@mozilla.com/Sandboxing Ian's sandboxing page]
* [https://github.com/mozilla/servo/wiki Servo]
* [https://github.com/mozilla/servo/wiki Servo]
* [http://www.chromium.org/developers/design-documents/sandbox Chromium Sandbox]
* [http://www.chromium.org/developers/design-documents/sandbox Chromium Sandbox]
* [[B2G/Architecture/System_Security/Seccomp|seccomp sandboxing on b2g]]
* [http://reverse.put.as/wp-content/uploads/2011/09/Apple-Sandbox-Guide-v1.0.pdf Apple's Sandbox guide]


== Related projects ==
== Related projects ==

Revision as of 21:29, 23 October 2013

The fox cannot escape the box.
The fox is safe in the sandbox. The fox cannot escape.

Documentation

Status

We have a plan. Take the e10s code, slap the Chromium sandbox around the content process, and get AdBlockPlus working with it.

FoxInABox/ThingsThatShouldWork

Tracking: bug 925570.

Platform specific:

FxOS / B2G

  • [DONE] Land Library bug 742434
  • [DONE] Tie in to process model bug 790923
  • [ON TRACK] List and prioritize permissions to shut off
  • [ON TRACK] Burn down permission list

Permission Burndown List:

TBD

Linux Firefox

  • [DONE] Land Library bug 742434
  • [ON TRACK] Tie in to process model
  • [ON TRACK] List and prioritize permissions to shut off
  • [ON TRACK] Burn down permission list

Permission List:

TBD

Windows Firefox

  • [ON TRACK] Land Library bug 922756
  • [NEW] Tie in to process model
  • [NEW] List and prioritize permissions to shut off
  • [NEW] Burn down permission list

Permission List:

TBD

MacOS X Firefox

  • [NEW] Land Library -- bug 387248
  • [NEW] Tie in to process model
  • [NEW] List and prioritize permissions to shut off
  • [NEW] Burn down permission list

Permission List:

TBD

Additional Pieces

These are some things that we need to attack next (after a basic sandbox).

  • GPU remoting (TBD)
  • Accessibility support
  • Addon support path
  • Process Model (evolving? 2? Per-Tab?)
  • Incremental tightening plan
  • Child process resource limits
  • DevTools support

Resources

Sandboxing

Related projects

How things work

Who we are

Some folks from the SecurityEngineering team: briansmith, mmc, keeler, grobinson, ckerschb, sid, and bbondy.

  • Mailing list: boxing@lists.mozilla.org
  • IRC: irc.mozilla.org #boxing