Sandbox the web browser
Originally created by Tails on #5525 (Redmine)
The web browser probably has one the biggest attack surface exposed by Tails to a network attacker, so anything we can do to make it harder, for an attacker, to escalate from "browser exploited" to "whole system under’s attacker control", is welcome.
When a container-based solution becomes a viable, secure solution for creating isolated jails, the chroot approach used by the unsafe browser will be adaptable to the regular Iceweasel.
Our work to add AppArmor support will be useful in this area too, either in replacement of a container-based approach, or to complement it.
Special care needs to be given to allow sharing files between the Tor
Browser and the rest of the system, e.g. to download and upload files.
One could give read/write access from/to one special directory in
$HOME (likely: “Downloads”), using bind-mounts and ACLs as needed.
Feature Branch: feature/5525-sandbox-web-browser