Bug 187018 - Update Cisco Webex sandbox to make it functional
Summary: Update Cisco Webex sandbox to make it functional
Status: RESOLVED WONTFIX
Alias: None
Product: WebKit
Classification: Unclassified
Component: WebRTC (show other bugs)
Version: WebKit Nightly Build
Hardware: Unspecified Unspecified
: P2 Normal
Assignee: youenn fablet
URL:
Keywords: InRadar
Depends on:
Blocks:
 
Reported: 2018-06-25 14:41 PDT by youenn fablet
Modified: 2018-10-12 09:58 PDT (History)
5 users (show)

See Also:


Attachments
Patch (3.22 KB, patch)
2018-06-25 14:44 PDT, youenn fablet
no flags Details | Formatted Diff | Diff
Patch (5.05 KB, patch)
2018-06-25 23:06 PDT, youenn fablet
no flags Details | Formatted Diff | Diff
Patch (4.42 KB, patch)
2018-06-26 18:10 PDT, youenn fablet
no flags Details | Formatted Diff | Diff
Archive of layout-test-results from ews206 for win-future (12.76 MB, application/zip)
2018-06-27 00:05 PDT, EWS Watchlist
no flags Details
Patch (4.56 KB, patch)
2018-06-27 07:56 PDT, youenn fablet
no flags Details | Formatted Diff | Diff
Archive of layout-test-results from ews206 for win-future (12.75 MB, application/zip)
2018-06-27 11:23 PDT, EWS Watchlist
no flags Details

Note You need to log in before you can comment on or make changes to this bug.
Description youenn fablet 2018-06-25 14:41:51 PDT
Update Cisco Webex sandbox to make it functional
Comment 1 youenn fablet 2018-06-25 14:44:42 PDT
Created attachment 343543 [details]
Patch
Comment 2 youenn fablet 2018-06-25 23:06:43 PDT
Created attachment 343586 [details]
Patch
Comment 3 Alexey Proskuryakov 2018-06-25 23:43:16 PDT
Comment on attachment 343586 [details]
Patch

View in context: https://bugs.webkit.org/attachment.cgi?id=343586&action=review

> Source/WebKit/Resources/PlugInSandboxProfiles/com.cisco.webex.plugin.gpc64.sb:37
> +    (literal "/Library/ScriptingAdditions"))

Allowing writing here seems very insecure.

> Source/WebKit/Resources/PlugInSandboxProfiles/com.cisco.webex.plugin.gpc64.sb:65
> +    (prefix "/private/var/folders"))

And this is definitely unacceptable.
Comment 4 youenn fablet 2018-06-26 18:10:15 PDT
Created attachment 343668 [details]
Patch
Comment 5 youenn fablet 2018-06-26 18:14:48 PDT
> > Source/WebKit/Resources/PlugInSandboxProfiles/com.cisco.webex.plugin.gpc64.sb:65
> > +    (prefix "/private/var/folders"))
> 
> And this is definitely unacceptable.

This is mandatory to make the plugin work as it is right now.
To improve on this, there would be a need to coordinate with the plugin authors.
We need to have something working to continue fiddling with the sandbox.

Brent, is there a way to add the restriction that only the folders/files that the plugin creates are actually accessible?
Comment 6 youenn fablet 2018-06-26 18:16:53 PDT
Or maybe deny access to some patterns...
Comment 7 EWS Watchlist 2018-06-27 00:05:33 PDT
Comment on attachment 343668 [details]
Patch

Attachment 343668 [details] did not pass win-ews (win):
Output: https://webkit-queues.webkit.org/results/8356378

New failing tests:
http/tests/security/canvas-remote-read-remote-video-blocked-no-crossorigin.html
http/tests/security/video-poster-cross-origin-crash2.html
Comment 8 EWS Watchlist 2018-06-27 00:05:44 PDT
Created attachment 343696 [details]
Archive of layout-test-results from ews206 for win-future

The attached test failures were seen while running run-webkit-tests on the win-ews.
Bot: ews206  Port: win-future  Platform: CYGWIN_NT-6.1-2.9.0-0.318-5-3-x86_64-64bit
Comment 9 Alexey Proskuryakov 2018-06-27 02:17:11 PDT
> Or maybe deny access to some patterns...

Yes, regexes can definitely be used for access patterns. Surely the plug-in doesn't need to write to temporary and cache files of all apps for all users.
Comment 10 youenn fablet 2018-06-27 07:56:28 PDT
Created attachment 343711 [details]
Patch
Comment 11 Radar WebKit Bug Importer 2018-06-27 09:45:54 PDT
<rdar://problem/41528287>
Comment 12 EWS Watchlist 2018-06-27 11:23:23 PDT
Comment on attachment 343711 [details]
Patch

Attachment 343711 [details] did not pass win-ews (win):
Output: https://webkit-queues.webkit.org/results/8359738

New failing tests:
http/tests/security/canvas-remote-read-remote-video-blocked-no-crossorigin.html
http/tests/security/canvas-remote-read-remote-video-redirect.html
Comment 13 EWS Watchlist 2018-06-27 11:23:34 PDT
Created attachment 343730 [details]
Archive of layout-test-results from ews206 for win-future

The attached test failures were seen while running run-webkit-tests on the win-ews.
Bot: ews206  Port: win-future  Platform: CYGWIN_NT-6.1-2.9.0-0.318-5-3-x86_64-64bit
Comment 14 Alexey Proskuryakov 2018-06-28 01:31:12 PDT
Comment on attachment 343711 [details]
Patch

View in context: https://bugs.webkit.org/attachment.cgi?id=343711&action=review

> Source/WebKit/Resources/PlugInSandboxProfiles/com.cisco.webex.plugin.gpc64.sb:62
>  ;; FIXME: We should tigthen the sandbox to some tmp subfolders
>  (allow file*
>      (prefix "/private/tmp"))

:-/

> Source/WebKit/Resources/PlugInSandboxProfiles/com.cisco.webex.plugin.gpc64.sb:67
> +(allow file*
> +    (regex #"^/private/var/folders/.*/TemporaryItems")
> +    (regex #"^/private/var/folders/.*\.cache$")
> +    (regex #"^/private/var/folders/.*/mds.lock$"))

This doesn't make it substantially more secure - folders for other users are unaccessible due to POSIX permissions anyway, and this still allows access to other applications' files.

What exactly are you trying to achieve with these rules?
Comment 15 youenn fablet 2018-07-03 16:25:33 PDT
Comment on attachment 343711 [details]
Patch

win error unrelated