View Full Version : [ubuntu] AppArmor, Firefox, and plug-ins
mike acker
November 26th, 2012, 02:28 PM
Q: Does AppArmor protect Firefox from the installation and/or activation of un-wanted plug-ins?
particularly this new facebook thing?
Q: How would we evaluate the AppArmor profile for Firefox in this regard ?
note: I'm running the profile provided by Canonical.
vasa1
November 26th, 2012, 02:47 PM
Q: Does AppArmor protect Firefox from the installation and/or activation of un-wanted plug-ins?
particularly this new facebook thing?
Q: How would we evaluate the AppArmor profile for Firefox in this regard ?
note: I'm running the profile provided by Canonical.
Recent versions of Firefox will inform you of attempts to install new plug-ins whether you use Apparmor or not.
AFAIK, the Facebook thing isn't on by default. If it is, you can turn it off from about:config. Enter social in the search bar of the about:config page and ensure that the relevant entries are set to false.
social.active;false
social.enabled;falseetc
mike acker
November 26th, 2012, 08:37 PM
Recent versions of Firefox will inform you of attempts to install new plug-ins whether you use Apparmor or not.
AFAIK, the Facebook thing isn't on by default. If it is, you can turn it off from about:config. Enter social in the search bar of the about:config page and ensure that the relevant entries are set to false.
social.active;false
social.enabled;falseetc
thanks . as a fugitive from that other o/s i must say i did not appreciate it when sites attempted un-wanted browser updates .
hopefully the only way Firefox gets a plug-in is when the owner selects tools | add ons and selects an update .
this is critical . a hidden update could be re-directing browser activity without the knowlege of the owner and that could be just a detrimental a a root kit .
cariboo
November 27th, 2012, 06:49 AM
thanks . as a fugitive from that other o/s i must say i did not appreciate it when sites attempted un-wanted browser updates .
hopefully the only way Firefox gets a plug-in is when the owner selects tools | add ons and selects an update .
this is critical . a hidden update could be re-directing browser activity without the knowlege of the owner and that could be just a detrimental a a root kit .
If you are using Firefox from the repositories, auto-updating is turned off. The only way to update Firefox, is to update it using update-manager, the Software Centre, synaptic or from the command line. No hidden updates here. :-D
mike acker
November 27th, 2012, 01:30 PM
If you are using Firefox from the repositories, auto-updating is turned off. The only way to update Firefox, is to update it using update-manager, the Software Centre, synaptic or from the command line. No hidden updates here. :-D
thanks, pard, I appreciate that note.
I did go and check the switches as directed by the earlier post: they are set properly (both=false)
:)
the next question: can a script access that same page and turn the switches on ?
AppArmor should prevent this (I am running Firefox with AppArmor on, using the profile provided by Canonical ) .
zombifier25
November 27th, 2012, 01:51 PM
If you're really paranoid about malicious scripts, you should install NoScript. It gives you per-site permissions for scripts, and it also protects you from certain exploits.
SlugSlug
November 27th, 2012, 03:19 PM
particularly this new facebook thing?
What new facebook thing?
zombifier25
November 27th, 2012, 03:35 PM
What new facebook thing?
Firefox 17 has a new feature that integrates Facebook directly into the browser. Before anyone screams "PRIVACY INVASION!!1!!1", it's only a plugin that is activated only if the user chooses to.
SlugSlug
November 27th, 2012, 03:39 PM
Ahh thanks - just found this
http://arstechnica.com/information-technology/2012/11/firefox-17-is-more-social-and-secure-but-doesnt-care-for-leopards/
Powered by vBulletin® Version 4.2.2 Copyright © 2025 vBulletin Solutions, Inc. All rights reserved.