Re: [qubes-users] Customizing Firefox in dispVMs (brand new profile on every dispVM startup)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 t 19, 2019, 00:05 by qubes-users@googlegroups.com: Problem === Firefox can leak various IDs from a profile to websites, so different sessions can be correlated across different qubes, including DispVMs. See e.g. [this bug](https://bugzilla.mozilla.org/show_bug.cgi?id=1372288) and possibly many other bugs. (Partial) solution === On every DispVM startup, we start without a Firefox profile, so a fresh one with random ID is created. However, the default settings are not very privacy friendly (and annoying), so we need to change some and we also need to auto install some extensions. (e.g. ad blocker) We do this by deploying a Firefox `policies.json` file into `/usr/lib/firefox-esr/distribution/policies.json` _before_ FF starts, so it pulls these settings onto itself at startup. We use the Qubes `/rw/config/rc.local` script to deploy the FF policy, as it runs immediately after VM startup. Limitations === There are still plenty opportunities to fingerprint the firefox+OS+HW combo, e.g. the classic [EFF panopticlick](https://panopticlick.eff.org/) (see fingerprint section after test) or the more advanced leak tests at [browserleaks](https://browserleaks.com). For a whole list of leak test sites check this GitHub page of [ghacks-user.js](https://github.com/ghacksuserjs/ghacks-user.js/wiki/Appendix-A---Test-Sites) No bookmarks (perhaps also deployable by script), no history. Qubes setup === Docs for the setup: - [mozilla/policy-templates](https://github.com/mozilla/policy-templates/blob/master/README.md) - [Qubes: running script on VM startup](https://www.qubes-os.org/doc/config-files/) In a TemplateVM of DispVMs (DVM Template) put your settings in `/rw/config/firefox_policies.json`, e.g.: ... and set up `/rw/config/rc.local` to deploy the policy at VM startup: ... Further ideas, TODO === - Install more extensions: NoScript or uMatrix, etc. - How to setup extensions, e.g. add a list to uBlock? - Perhaps use Debian central `user.js`: `/etc/firefox-esr/firefox-esr.js` fill it with `https://github.com/ghacksuserjs/ghacks-user.js` or `https://github.com/pyllyukko/user.js` I've created a salt for my set up, it also includes the further ideas section with a few hacks to get everything to work properly. I install the add-ons from the debian repos and make modifications to the source of umatrix to allow changing the default rules. This isn't necessary on ublock as there is a way to deploy custom settings from a file. I've taken the ghacks user.js file as my starting point and added my customisations into the user-overrides file. I also delete the .mozilla folder in the home folder at start up. The repo is available here: https://gitlab.com/prago/my-salt -BEGIN PGP SIGNATURE- iIgEARMKADAWIQRFNnsoPo7HH0XEMXc88cBGMbAIWAUCXctfWBIccHJhZ29AdHV0 YW5vdGEuZGUACgkQPPHARjGwCFg0dgD/RTthgBj2ToJEy1Cgi9mvYc7vyc6UmaEk trvfWgzMD9IA/1XZ2Gj1aO6UJmm82UbBorQ5yK83zG/mtM4GH+ln+yCz =tuEw -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/LtXQU3y--3-1%40tutanota.de.
Re: [qubes-users] Customizing Firefox in dispVMs (brand new profile on every dispVM startup)
‐‐‐ Original Message ‐‐‐ On Saturday, October 19, 2019 2:42 PM, 'awokd' via qubes-users wrote: > 'mekken1et' via qubes-users: > > > Problem > > > > > > > > Firefox can leak various IDs from a profile to websites, so different > > sessions can be correlated across different qubes, including DispVMs. > > Thank you; nice list. > Forgot to mention, /usr/lib/firefox-esr/distribution/policies.json may or may not be a Debian specific location. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/rAlcwc2PSROCss_Ui6wJWyVafw2ZI-ezepoecjV2swzMNCbcdeJmrn-m_1Rn1Xp8MiJ4l5CaASoZn4WTYA0HIavuO9_6oSxvBlMnXIxxIo0%3D%40protonmail.com. signature.asc Description: OpenPGP digital signature
Re: [qubes-users] Customizing Firefox in dispVMs (brand new profile on every dispVM startup)
'mekken1et' via qubes-users: > >Problem > === > > Firefox can leak various IDs from a profile to websites, so different > sessions can be correlated across different qubes, including DispVMs. Thank you; nice list. -- - don't top post Mailing list etiquette: - trim quoted reply to only relevant portions - when possible, copy and paste text instead of screenshots -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a836962c-fc0c-5d2d-ca1e-a921c5a18755%40danwin1210.me.
[qubes-users] Customizing Firefox in dispVMs (brand new profile on every dispVM startup)
Problem === Firefox can leak various IDs from a profile to websites, so different sessions can be correlated across different qubes, including DispVMs. See e.g. [this bug](https://bugzilla.mozilla.org/show_bug.cgi?id=1372288) and possibly many other bugs. (Partial) solution === On every DispVM startup, we start without a Firefox profile, so a fresh one with random ID is created. However, the default settings are not very privacy friendly (and annoying), so we need to change some and we also need to auto install some extensions. (e.g. ad blocker) We do this by deploying a Firefox `policies.json` file into `/usr/lib/firefox-esr/distribution/policies.json` _before_ FF starts, so it pulls these settings onto itself at startup. We use the Qubes `/rw/config/rc.local` script to deploy the FF policy, as it runs immediately after VM startup. Limitations === There are still plenty opportunities to fingerprint the firefox+OS+HW combo, e.g. the classic [EFF panopticlick](https://panopticlick.eff.org/) (see fingerprint section after test) or the more advanced leak tests at [browserleaks](https://browserleaks.com). For a whole list of leak test sites check this GitHub page of [ghacks-user.js](https://github.com/ghacksuserjs/ghacks-user.js/wiki/Appendix-A---Test-Sites) No bookmarks (perhaps also deployable by script), no history. Qubes setup === Docs for the setup: - [mozilla/policy-templates](https://github.com/mozilla/policy-templates/blob/master/README.md) - [Qubes: running script on VM startup](https://www.qubes-os.org/doc/config-files/) In a TemplateVM of DispVMs (DVM Template) put your settings in `/rw/config/firefox_policies.json`, e.g.: ``` $ cat
[qubes-users] Customizing Firefox in dispVMs
Simply change the settings in the AppVM that acts as the template for such DispVMs. Note that you should call `qvm-run` directly to do this since Appmenus spins off DispVMs from the AppVM instead of launching it directly. In my case I just wanted it applied to every AppVM based on my template (and not just DispVMs), so I used /etc/firefox/pref/*.js instead. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/e81143c3-77d1-41cd-8365-0ecf4c35a985%40googlegroups.com.
Re: [qubes-users] Customizing Firefox in dispVMs
On Sat, Oct 12, 2019 at 5:36 AM David Hobach wrote: > > On 10/11/19 5:23 PM, unman wrote: > > On Fri, Oct 11, 2019 at 03:04:16PM +, 'Totally Zoid' via qubes-users > > wrote: > >> > >> Is there a definite way to customize the default Firefox install in the > >> DispVMs without launching it first in the TemplateVM (which I don't want > >> to do for obvious reasons)? How about installing the latest firefox as a further customization? Debian packages firefox-esr and changing the settings to turn off video autoplay is very unfriendly compared to the latest versions of firefox. I'm installing the latest firefox in user space rather than the templates because of the problems created by using qubes persistence/userspace and firefox's built in updating method. Any suggestions how to do that with Debian DispVMs? > > How about this: > > > > Create a qube, which has no netvm. > > Open firefox - configure it as you will. (To install plugins, you wil > > have to download elsewhere and copy them in to this qube to install) > > Close qube. > > Use `qvm-prefs qube template_for_dispvms True` > > Set netvm for that qube. > > Open disposableVM based on qube. > > Profit. For the Fedora template yes, but I would have to repeat the process every time for a new release of firefox in the Debian DispVM's. Chuck -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAMet1z5OJT10N%3D9MJjU0%3DCYr65ZhF1GDwFig4yoSqGDbYGsPyg%40mail.gmail.com.
Re: [qubes-users] Customizing Firefox in dispVMs
On 10/11/19 5:23 PM, unman wrote: On Fri, Oct 11, 2019 at 03:04:16PM +, 'Totally Zoid' via qubes-users wrote: Hello Is there a definite way to customize the default Firefox install in the DispVMs without launching it first in the TemplateVM (which I don't want to do for obvious reasons)? I thought to add a prefs.js file to get rid of the Google search and other garbage that comes preinstalled and turned on in Firefox and which I have to manually turn off in preferences and about:config every time I start the DispVM (which gets tiring). However, apparently the profile folder is always generated under a different name and the new default profile I created doesn't get recognized. ~ Zoid How about this: Create a qube, which has no netvm. Open firefox - configure it as you will. (To install plugins, you wil have to download elsewhere and copy them in to this qube to install) Close qube. Use `qvm-prefs qube template_for_dispvms True` Set netvm for that qube. Open disposableVM based on qube. Profit. Also, if you have an old profile that you want to re-use, you can edit ~/.mozilla/firefox/profiles.ini to point to it. E.g.: [General] StartWithLastProfile=1 [Profile0] Name=default IsRelative=0 Path=[full path to your profile.default] Default=1 Also put your settings in user.js, not prefs.js. The latter is for internal firefox usage only and may be modified by firefox. Btw a website with some nice firefox settings: privacy-handbuch.de -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/07261753-1f1a-e3c4-2693-7b57e80b5f1d%40hackingthe.net. smime.p7s Description: S/MIME Cryptographic Signature
Re: [qubes-users] Customizing Firefox in dispVMs
On Fri, Oct 11, 2019 at 03:04:16PM +, 'Totally Zoid' via qubes-users wrote: > Hello > > Is there a definite way to customize the default Firefox install in the > DispVMs without launching it first in the TemplateVM (which I don't want to > do for obvious reasons)? > > I thought to add a prefs.js file to get rid of the Google search and other > garbage that comes preinstalled and turned on in Firefox and which I have to > manually turn off in preferences and about:config every time I start the > DispVM (which gets tiring). However, apparently the profile folder is always > generated under a different name and the new default profile I created > doesn't get recognized. > > ~ Zoid > How about this: Create a qube, which has no netvm. Open firefox - configure it as you will. (To install plugins, you wil have to download elsewhere and copy them in to this qube to install) Close qube. Use `qvm-prefs qube template_for_dispvms True` Set netvm for that qube. Open disposableVM based on qube. Profit. unman -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20191011152355.GA32237%40thirdeyesecurity.org.
[qubes-users] Customizing Firefox in dispVMs
Hello Is there a definite way to customize the default Firefox install in the DispVMs without launching it first in the TemplateVM (which I don't want to do for obvious reasons)? I thought to add a prefs.js file to get rid of the Google search and other garbage that comes preinstalled and turned on in Firefox and which I have to manually turn off in preferences and about:config every time I start the DispVM (which gets tiring). However, apparently the profile folder is always generated under a different name and the new default profile I created doesn't get recognized. ~ Zoid Sent with [ProtonMail](https://protonmail.com) Secure Email. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/MuxpNCuFw3NP7Fu2FNCiuLC_h6e1lX6gYw7FFED7lIV9XhKQEBmfzltN3pbLkkc5UBiyg6LPP5Fubq1L0bXLJiezOQI1vy-7yJb4ZufgwG0%3D%40protonmail.com.