Re: [qubes-users] Customizing Firefox in dispVMs (brand new profile on every dispVM startup)

2019-11-12 Thread prago
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

t 19, 2019, 00:05 by qubes-users@googlegroups.com:


    Problem
    ===

    Firefox can leak various IDs from a profile to websites, so different 
sessions can be correlated across different qubes, including DispVMs.
    See e.g. [this bug](https://bugzilla.mozilla.org/show_bug.cgi?id=1372288) 
and possibly many other bugs.


    (Partial) solution
    ===

    On every DispVM startup, we start without a Firefox profile, so a fresh one 
with random ID is created. However, the default settings are not very privacy 
friendly (and annoying), so we need to change some and we also need to auto 
install some extensions. (e.g. ad blocker)
    We do this by deploying a Firefox `policies.json` file into 
`/usr/lib/firefox-esr/distribution/policies.json` _before_ FF starts, so it 
pulls these settings onto itself at startup. We use the Qubes 
`/rw/config/rc.local` script to deploy the FF policy, as it runs immediately 
after VM startup.


    Limitations
    ===

    There are still plenty opportunities to fingerprint the firefox+OS+HW 
combo, e.g. the classic [EFF panopticlick](https://panopticlick.eff.org/) (see 
fingerprint section after test) or the more advanced leak tests at 
[browserleaks](https://browserleaks.com).
    For a whole list of leak test sites check this GitHub page of 
[ghacks-user.js](https://github.com/ghacksuserjs/ghacks-user.js/wiki/Appendix-A---Test-Sites)

    No bookmarks (perhaps also deployable by script), no history.


    Qubes setup
    ===

    Docs for the setup:

    - 
[mozilla/policy-templates](https://github.com/mozilla/policy-templates/blob/master/README.md)
    - [Qubes: running script on VM 
startup](https://www.qubes-os.org/doc/config-files/)

    In a TemplateVM of DispVMs (DVM Template) put your settings in 
`/rw/config/firefox_policies.json`, e.g.:

    ...
    and set up `/rw/config/rc.local` to deploy the policy at VM startup:

    ...

    Further ideas, TODO
    ===

    - Install more extensions: NoScript or uMatrix, etc.
    - How to setup extensions, e.g. add a list to uBlock?
    - Perhaps use Debian central `user.js`: `/etc/firefox-esr/firefox-esr.js`
    fill it with
    `https://github.com/ghacksuserjs/ghacks-user.js`
    or
    `https://github.com/pyllyukko/user.js`

I've created a salt for my set up, it also includes the further ideas section 
with a few hacks to get everything to work properly. I install the add-ons from
the debian repos and make modifications to the source of umatrix to allow 
changing the default rules. This isn't necessary on ublock as there is a way to
deploy custom settings from a file. I've taken the ghacks user.js file as my 
starting point and added my customisations into the user-overrides file. I also
delete the .mozilla folder in the home folder at start up. The repo is
available here:

https://gitlab.com/prago/my-salt
-BEGIN PGP SIGNATURE-

iIgEARMKADAWIQRFNnsoPo7HH0XEMXc88cBGMbAIWAUCXctfWBIccHJhZ29AdHV0
YW5vdGEuZGUACgkQPPHARjGwCFg0dgD/RTthgBj2ToJEy1Cgi9mvYc7vyc6UmaEk
trvfWgzMD9IA/1XZ2Gj1aO6UJmm82UbBorQ5yK83zG/mtM4GH+ln+yCz
=tuEw
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/LtXQU3y--3-1%40tutanota.de.


Re: [qubes-users] Customizing Firefox in dispVMs (brand new profile on every dispVM startup)

2019-10-19 Thread 'mekken1et' via qubes-users
‐‐‐ Original Message ‐‐‐
On Saturday, October 19, 2019 2:42 PM, 'awokd' via qubes-users 
 wrote:

> 'mekken1et' via qubes-users:
> 

> > Problem
> > 

> > 
> > 

> > Firefox can leak various IDs from a profile to websites, so different 
> > sessions can be correlated across different qubes, including DispVMs.
> 

> Thank you; nice list.
> 


Forgot to mention, /usr/lib/firefox-esr/distribution/policies.json may or may 
not be a Debian specific location.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/rAlcwc2PSROCss_Ui6wJWyVafw2ZI-ezepoecjV2swzMNCbcdeJmrn-m_1Rn1Xp8MiJ4l5CaASoZn4WTYA0HIavuO9_6oSxvBlMnXIxxIo0%3D%40protonmail.com.


signature.asc
Description: OpenPGP digital signature


Re: [qubes-users] Customizing Firefox in dispVMs (brand new profile on every dispVM startup)

2019-10-19 Thread 'awokd' via qubes-users
'mekken1et' via qubes-users:
> 
>Problem
> ===
> 
> Firefox can leak various IDs from a profile to websites, so different 
> sessions can be correlated across different qubes, including DispVMs.

Thank you; nice list.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a836962c-fc0c-5d2d-ca1e-a921c5a18755%40danwin1210.me.


[qubes-users] Customizing Firefox in dispVMs (brand new profile on every dispVM startup)

2019-10-18 Thread 'mekken1et' via qubes-users

   Problem
===

Firefox can leak various IDs from a profile to websites, so different sessions 
can be correlated across different qubes, including DispVMs.
See e.g. [this bug](https://bugzilla.mozilla.org/show_bug.cgi?id=1372288) and 
possibly many other bugs.


   (Partial) solution
===

On every DispVM startup, we start without a Firefox profile, so a fresh one 
with random ID is created. However, the default settings are not very privacy 
friendly (and annoying), so we need to change some and we also need to auto 
install some extensions. (e.g. ad blocker)
We do this by deploying a Firefox `policies.json` file into 
`/usr/lib/firefox-esr/distribution/policies.json` _before_ FF starts, so it 
pulls these settings onto itself at startup. We use the Qubes 
`/rw/config/rc.local` script to deploy the FF policy, as it runs immediately 
after VM startup.


   Limitations
===

There are still plenty opportunities to fingerprint the firefox+OS+HW combo, 
e.g. the classic [EFF panopticlick](https://panopticlick.eff.org/) (see 
fingerprint section after test) or the more advanced leak tests at 
[browserleaks](https://browserleaks.com).
For a whole list of leak test sites check this GitHub page of 
[ghacks-user.js](https://github.com/ghacksuserjs/ghacks-user.js/wiki/Appendix-A---Test-Sites)

No bookmarks (perhaps also deployable by script), no history.


   Qubes setup
===

Docs for the setup:

-   
[mozilla/policy-templates](https://github.com/mozilla/policy-templates/blob/master/README.md)
-   [Qubes: running script on VM 
startup](https://www.qubes-os.org/doc/config-files/)

In a TemplateVM of DispVMs (DVM Template) put your settings in 
`/rw/config/firefox_policies.json`, e.g.:

```
$ cat 

[qubes-users] Customizing Firefox in dispVMs

2019-10-13 Thread Jin-oh Kang
Simply change the settings in the AppVM that acts as the template for such 
DispVMs. Note that you should call `qvm-run` directly to do this since Appmenus 
spins off DispVMs from the AppVM instead of launching it directly.

In my case I just wanted it applied to every AppVM based on my template (and 
not just DispVMs), so I used /etc/firefox/pref/*.js instead.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e81143c3-77d1-41cd-8365-0ecf4c35a985%40googlegroups.com.


Re: [qubes-users] Customizing Firefox in dispVMs

2019-10-12 Thread Charles Peters
On Sat, Oct 12, 2019 at 5:36 AM David Hobach  wrote:
>
> On 10/11/19 5:23 PM, unman wrote:
> > On Fri, Oct 11, 2019 at 03:04:16PM +, 'Totally Zoid' via qubes-users 
> > wrote:
> >>
> >> Is there a definite way to customize the default Firefox install in the 
> >> DispVMs without launching it first in the TemplateVM (which I don't want 
> >> to do for obvious reasons)?

How about installing the latest firefox as a further customization?

Debian packages firefox-esr and changing the settings to turn off
video autoplay is very unfriendly compared to the latest versions of
firefox.  I'm installing the latest firefox in user space rather than
the templates because of the problems created by using qubes
persistence/userspace and firefox's built in updating method.   Any
suggestions how to do that with Debian DispVMs?

> > How about this:
> >
> > Create a qube, which has no netvm.
> > Open firefox - configure it as you will. (To install plugins, you wil
> > have to download elsewhere and copy them in to this qube to install)
> > Close qube.
> > Use `qvm-prefs qube template_for_dispvms True`
> > Set netvm for that qube.
> > Open disposableVM based on qube.
> > Profit.

For the Fedora template yes, but I would have to repeat the process
every time for a new release of firefox in the Debian DispVM's.


Chuck

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAMet1z5OJT10N%3D9MJjU0%3DCYr65ZhF1GDwFig4yoSqGDbYGsPyg%40mail.gmail.com.


Re: [qubes-users] Customizing Firefox in dispVMs

2019-10-12 Thread David Hobach



On 10/11/19 5:23 PM, unman wrote:

On Fri, Oct 11, 2019 at 03:04:16PM +, 'Totally Zoid' via qubes-users wrote:

Hello

Is there a definite way to customize the default Firefox install in the DispVMs 
without launching it first in the TemplateVM (which I don't want to do for 
obvious reasons)?

I thought to add a prefs.js file to get rid of the Google search and other 
garbage that comes preinstalled and turned on in Firefox and which I have to 
manually turn off in preferences and about:config every time I start the DispVM 
(which gets tiring). However, apparently the profile folder is always generated 
under a different name and the new default profile I created doesn't get 
recognized.

~ Zoid



How about this:

Create a qube, which has no netvm.
Open firefox - configure it as you will. (To install plugins, you wil
have to download elsewhere and copy them in to this qube to install)
Close qube.
Use `qvm-prefs qube template_for_dispvms True`
Set netvm for that qube.
Open disposableVM based on qube.
Profit.


Also, if you have an old profile that you want to re-use, you can edit 
~/.mozilla/firefox/profiles.ini to point to it.


E.g.:

[General]
StartWithLastProfile=1

[Profile0]
Name=default
IsRelative=0
Path=[full path to your profile.default]
Default=1

Also put your settings in user.js, not prefs.js. The latter is for 
internal firefox usage only and may be modified by firefox.


Btw a website with some nice firefox settings: privacy-handbuch.de

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/07261753-1f1a-e3c4-2693-7b57e80b5f1d%40hackingthe.net.


smime.p7s
Description: S/MIME Cryptographic Signature


Re: [qubes-users] Customizing Firefox in dispVMs

2019-10-11 Thread unman
On Fri, Oct 11, 2019 at 03:04:16PM +, 'Totally Zoid' via qubes-users wrote:
> Hello
> 
> Is there a definite way to customize the default Firefox install in the 
> DispVMs without launching it first in the TemplateVM (which I don't want to 
> do for obvious reasons)?
> 
> I thought to add a prefs.js file to get rid of the Google search and other 
> garbage that comes preinstalled and turned on in Firefox and which I have to 
> manually turn off in preferences and about:config every time I start the 
> DispVM (which gets tiring). However, apparently the profile folder is always 
> generated under a different name and the new default profile I created 
> doesn't get recognized.
> 
> ~ Zoid
> 

How about this:

Create a qube, which has no netvm.
Open firefox - configure it as you will. (To install plugins, you wil
have to download elsewhere and copy them in to this qube to install)
Close qube.
Use `qvm-prefs qube template_for_dispvms True`
Set netvm for that qube.
Open disposableVM based on qube.
Profit.

unman

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191011152355.GA32237%40thirdeyesecurity.org.


[qubes-users] Customizing Firefox in dispVMs

2019-10-11 Thread 'Totally Zoid' via qubes-users
Hello

Is there a definite way to customize the default Firefox install in the DispVMs 
without launching it first in the TemplateVM (which I don't want to do for 
obvious reasons)?

I thought to add a prefs.js file to get rid of the Google search and other 
garbage that comes preinstalled and turned on in Firefox and which I have to 
manually turn off in preferences and about:config every time I start the DispVM 
(which gets tiring). However, apparently the profile folder is always generated 
under a different name and the new default profile I created doesn't get 
recognized.

~ Zoid

Sent with [ProtonMail](https://protonmail.com) Secure Email.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/MuxpNCuFw3NP7Fu2FNCiuLC_h6e1lX6gYw7FFED7lIV9XhKQEBmfzltN3pbLkkc5UBiyg6LPP5Fubq1L0bXLJiezOQI1vy-7yJb4ZufgwG0%3D%40protonmail.com.