Chrome Throws Flash Into the Sandbox 109
wiredmikey writes "Google announced today that it will be extending Chrome's sandboxing technology to include the Flash Player plug-in. 'Sandboxing' technology is a method of isolating an application from the rest of the operating system and tightly controlling its resources. According to Google, the new sandboxing feature adds an additional layer of protection and will help protect users against malicious pages that attempt to hijack systems or steal information from the system."
Re: (Score:1)
that Flash was 'as good as dead"?
Re: (Score:2)
Flash, ChromeOS, COBOL....
This is Slashdot - where unless it's tomorrow, it's yesterday.
Re: (Score:2)
Re: (Score:1)
Re: (Score:2)
that Chome was "as good as dead"?
That was ChromeBSD.
Does Netcraft confirm this?
Re: (Score:1)
Flex apps? (Score:1)
I've been developing a flex app for the Blackberry Playbook that's coming out in February; the ability to port it to the chrome store without much extra work would be handy.
Re: (Score:2)
Maybe you can explain this to me: what's the Chrome store other than a bunch of bookmarks?
Re: (Score:3, Interesting)
For instance, there's a plugin that allows interface to the system's ping, ping6, traceroute, traceroute6, whois, and a couple of other net-centric functions. It includes some friendly interfacing, and it's smart enough to grab the current tab's URL as the target when invoked.
If the 'plugin' functionality could invoke a flash app, that would work well for more complex programs, and would be h
Re: (Score:2)
Its a curated, annotated list of bookmarks (for installable hosted web apps) and download links (for packaged apps [google.com]).
Plus, of course, it has functions associated with purchase for non-free apps, and some other features beyond just being a list.
Apple has the ultimate Flash sandbox (Score:5, Funny)
Re: (Score:2)
Re: (Score:2)
Apple has the ultimate Flash sandbox. You have to run it on a completely different machine.
Why?
Re: (Score:1)
Re: (Score:1)
Re: (Score:2)
Because he is comparing Chrome, a browser that runs on PCs, to IOS devices.
I'm not sure why.
No, he's comparing running Flash on any other platform vs not running flash at all on IOS.
But I suspect you knew that and were just trolling.
Re: (Score:1)
Re: (Score:2)
That wasn't the confusing bit. It was the random reference iOS that threw me. He could have mentioned his Casio watch and it'd have been just as funny.
Re: (Score:2)
If you are comparing the functionality of an iPad to a watch than that is funny in and of itself.
Re: (Score:2)
It's a sensationalized problem. Funny is trying to hypocritically justify it.
Re: (Score:2)
The problem is sensationalised. True. But for many people it seemed like a big deal, until Youtube fixed it. It may even be a good thing for HTML5 and Intel Atom systems.
LOL (Score:3)
Re: (Score:2)
This is most likely in response to their poor score in the NSS Labs report. Maybe their score will improve from 3%?
Er, no. That report evaluated performance against "socially engineered malware" only. In short, it tested how well the browser handled protecting the user from being careless or gullible.
Chrome's sandboxing is intended to limit the damage if an attack is encountered, not to keep the attack from happening by warning you that a given site hosts malware.
Re: (Score:2)
Re: (Score:2)
The day they announced the Chrome browser they said they would work with Adobe toward this goal.
Re: (Score:2)
...we called this a "virtual machine".
You don't need a full VM though with a Modern OS. You can run a plug-in as a child process with almost no access privileges and then it has to request minimal (and hopefully secure) access API's from the host/parent process. This way the plug-in can't directly access file IO without going through an extra layer where it can be scrubbed and gated. Also, since it's running in a different process, it can not directly access any of the memory through pointers in the host/parent process.
Re: (Score:3)
Unfortunately, Linux in this respect is not a "Modern OS". The ability to sandbox user applications is extremely poorly developed. I have been looking at portable sandboxing lately, and it is a horrible nightmare. The Chrome developers created some fancy hacks for each OS, and they have pulled it off quite nicely, but they remain hacks, not elegant designs. The platform with the best current sandboxing API is, ironically, Windows Vista/7, with their configurable integrity levels. An API dubbed "Seatbelt" is
Re: (Score:2)
The Android operating system is a linux based OS that runs java virtual machines, every application in a separate machine with their own database.
You have to manually allow interaction between programs... it is quite stable.
Re: (Score:2)
The platform with the best current sandboxing API is, ironically, Windows Vista/7, with their configurable integrity levels.
They do say that necessity is the mother of invention.
Re: (Score:2)
As opposed to the Unix world where a process can be associated with a user and a group and have fine-grained permissions based on the user and group, and then even more so with AppArmor, SE Linux, etc?
Re: (Score:1)
NT supports that and more [tinypic.com]. It's just that when you stray from the realm of filesystem and registry object ACLs, it becomes horribly nonintuitive, and things like process-based IPC security are up to the application to enforce (which, except for the 0.01% of programs such as Chrome, they never do enforce).
Though I vastly prefer the SELinux/AppArmor approach of using agglomerate text files for defining rules... but that might be because I'm a part-time programmer.
Re: (Score:2)
What is needed is some simple tool for configuring an SElinux profile based on an application's behavior. A very complicated tool exists but that is not so helpful.
This might be very good, or very bad (Score:2)
Obvious financial motivations there... (Score:1)
Google earns money through advertising and wants to serve Flash banners (As doubleclick, which is already owned by Google, does). All new security holes in Flash cause more people to block or at least hate it. By sandboxing Flash in Chrome, Google both encourages people to use its browser and lowers the motivation to block all flash content. A great decision for Google and it happens to benefit the users, too.
(As a freelancer who prefers Chrome as his browser, works mostly in internet advertising and occasi
Re: (Score:1)
Re: (Score:2)
Lets do this.
By announced "today", you mean December 1st? (Score:5, Informative)
In case you missed it, the Chromium Blog talked about this in their December 1st blog entry [chromium.org].
Re: (Score:2)
Re: (Score:1)
Not really important to me (Score:5, Interesting)
Pretty much every exploit now begins by "the user visits a website". After that, pretty much any technology can be the hole it exploits - Java, Flash, PDF viewing, even JPEG rendering has been exploited. There's an abundance of targets. The modern browser is just too big a platform to secure completely. So, I don't trust any browser more modern than Lynx.
Re:Not really important to me (Score:4, Informative)
Re: (Score:2)
Even Lynx is too 'modern'. Check this exploit: http://www.vupen.com/english/advisories/2010/2042 [vupen.com]
This is exactly why I manually telnet to each website's port and issue GET requests directly
Re: (Score:2)
dude! For online banking, use ssh.
Re: (Score:2)
So, are you saying your sandbox code (which is probably not bug free) could be the source of some fruitful exploits?
Re: (Score:2)
Re: (Score:2)
not only does the "hacker" have to find an exploit in the browser, but in the sandbox as well, making it exponentially more difficult.
Huh, I'm pretty sure you don't know what exponential means, but you actually by mistake managed to use it in a way that makes a little sense, even if it takes a little creativity to see it. If the probability of being able to find a hole in a given layer is p, and there are n layers to get through (not just 2), and the probabilities are independent, the chance of finding a hole in all of them is p^n. Absurd assumptions, but it still amuses that someone used "exponentially" in a way that almost made sense in
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Worscht... link... ever!!!
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:1)
Re: (Score:1)
Dupe (Score:2)
Original Slashdot story [slashdot.org] from December 3rd.
Re:Dupe (Score:5, Informative)
Flash cookies (Score:2)
Re: (Score:2)
There isnt anything wrong with the concept of persistent local storage, the problem is multiple persistent local storage areas that a user has to jump through hoops to clear. HTML5, Cookies, and Flash Cookies all have this issue.
Re: (Score:2)
I could see this breaking sites that actually use those cookies for something meaningful across invocations. I'm surprised that Adobe didn't just go down Java's route and use the browser's built-in cookie management system for taking care of their own cookie needs.
Re: (Score:2)
I could see this breaking sites that actually use those cookies for something meaningful across invocations. I'm surprised that Adobe didn't just go down Java's route and use the browser's built-in cookie management system for taking care of their own cookie needs.
Those are easy to manage. Flash cookies, not as easy.
Well, not unless you understand how to create a RAMdrive and are familiar with MKLINK (in Windows).
I like my RAMdrive, so many things live there, albeit shortly.
Re: (Score:2)
Flash cookies, not as easy.
Well, not unless you understand how to create a RAMdrive and are familiar with MKLINK (in Windows).
They’re just stored in your application data folder. Firefox has addons that will automatically delete Flash cookies (e.g. BetterPrivacy). Does Chrome? And even if Chrome doesn’t, it’d be easy enough to make a script that would do it on startup or shutdown.
Re: (Score:2)
Too much trouble.
I just point to a folder on the ramdrive and not only does flash get a little faster (very little), but there are no open files on the HDD.
All my browser temp files live there, that way when I'm browsing the laptop shuts down the HDD.
Re: (Score:2)
Less trouble to install an extension than set up a RAMdrive, I think. Either way, it’s done and you can forget about it.
Re: (Score:2)
Less trouble to install an extension than set up a RAMdrive, I think. Either way, it’s done and you can forget about it.
Good point. It's my ramdrve.sys background, they were necessary way back when, so I tend to find a use for them now.
Re: (Score:1)
The naysayers will say to upgrade hardware or get a new system or drop in a second drive but for
Re: (Score:2)
I know exactly what you mean. I’ve debugged slow WinXP machines for people where it turned out they were “slow” because they only had 256MB of RAM. Good grief, people, drop the $40 or $20 it takes to get a gig or a half a gig of RAM (and tell them no, I don’t want to pay $60 for you to unscrew the panel on the case and pop it in for me), your computer will run just fine...
Re: (Score:2)
"i've made has been to add ram and move swap to ram"
Wow, please just turn off swapping all together and save yourself the trouble. You're just robbing from RAM the very resource that you need, RAM! The entire point for swapping is to save on RAM, and the very act of ram driving is taking away more of that precious resource. Just turn your swap off and kill the RAMDrive. I assure you that unless windows is on some serious drugs, your performance should improve.
It didn’t already? (Score:2)
Heck, I think Firefox did it already... I think Flash must have released an unstable version recently. I’ve had Firefox lock up on me a couple of times. Killing the “plugin container” process in Task Manager immediately made Firefox start responding again and display an info bar on pages that had been using Flash saying that a plugin had crashed (gee, wonder why?) and suggesting that I reload the page.
Re: (Score:2)
Firefox is running the flash player in a separate process. That process is not sandboxed.
If an exploit in flash is discovered, and you visit a page with malarious flash content, the flash player process can do anything that the user running firefox can do.
Yeah, I wasn’t thinking about that subtlety. However, that’s still a form of sandboxing; it’s sandboxed away from the rest of the browser, though not sandboxed from the OS.
Re: (Score:2)
Chrome seperated the plugin as a seperate process, which Firefox then copied. But merely having the plugin as a seperate process does not mean the plugin is sandboxed. Flash still has access to install spyware on your computer. By placing the plugin in a sandbox, Flash doesn't have the right to hose your box.
Re: (Score:2)
Processes should already be running under limited user access, so I was thinking more in terms of stability than security. But you’re right.
A simpler and safer approach (Score:2)
Re: (Score:2)
Or, don't install it if you can live without it.
The overwhelming majority of stuff that I do online doesn't need flash -- I see it in ads more than I do anything useful, and that gets blocked by noscript before it can discover that I don't even have Flash installed.
When I do need flash, I go into a fairly closed down VM image and run it -- and that's pretty rare, like twice/month tops. While I'm sure there are sites that people use that require it, I've always a
Can I Has Flash Player? (Score:1)
Litter box, sandbox; both are full of sand and "Tootsie Rolls".
Does this make it respect Incognito? (Score:2)
If you browse in incognito mode does it then make all flash storage non-persistent? Because this is how the evercookie works across incognito.
Not safe enough (Score:1)
I run my sandbox in a sandbox. That ought to be safe enough!
Java did it (Score:1)
Re: (Score:1)
flash players written in Java.
That is just nasty. We'd need quantum computers to be able to run that!
Re: (Score:2)
It couldn’t use hardware acceleration before. It can now. They’re releasing a new version that does.
I think you mean, Flash used to suck... and it wasn’t really entirely its fault.
Correlation (Score:2)
Re: (Score:2)
Maybe kitty will come along soon and bury it.
Step Forward... (Score:1)
Sandboxing 'protection' (Score:2)
It will not be fully closed. (Score:1)
The tracking cookies will not be blocked and thus there will be a way to "escape" the sandbox. Google is an advertisement company you know.
Disclaimer: I am a Google user. I am simply aware of their revenue stream.