How to prevent dirty hands from touching my cookies?

8

According to my other question, it seems that my cookies are unprotected. (I should have known that as there was a time I just manually deleted cookies from Internet Temporary Files.)

So to make my question a little bit more general:

How to prevent a program on my computer from accessing some resources on my computer?

Or the other way around:

How to open access of some resources only to selected programs?

Or an seemingly impractical request:

How to make programs ask for permission when they want to access certain resources?


Though Windows 7 makes it a rule to request administrative privilege when changes are made to system files. However, access to (I mean, just view) resources is open to all programs.

Virtual machines seem to be a choice, but those programs isolated by a virtual machine stand no chance to view any of the resources of the outer (host) system, which does not seem to be preferable.

I am using Windows 7 now, but solutions on any OS are welcomed.

user69835

Posted 2011-08-15T16:22:13.470

Reputation:

Answers

7

Well, let me answer one part of your broader question first: how to do it. My immediate experience is on Linux, but you said that answers on any platform were welcome, so here goes. If you were on Linux, you could probably require root access to access your cookies in any way other than (in principle) deleting them. The general procedure would look like this:

  1. Change the permissions of the file so that other users can't read it. chmod 600 <file> should work as the right mode for this.
  2. Test to make sure that your browser doesn't clobber those permissions accidentally.
  3. Create a new user account for your browser. Let's call it foxy for argument's sake.
  4. Change the ownership of the browser's cookies file to foxy, as well as anything else which the browser may need to write to. (Really everything in the browser's user directory could in principle be affected.)
  5. Test to make sure that your browser still knows where its cookies are stored when being run as foxy. If necessary, give foxy a home directory exclusively for such things.
  6. Use visudo to give yourself permission, but only when running your browser, to change users to foxy The line in the sudoers file would look something like <your user name> ALL = (foxy) NOPASSWD: /usr/bin/firefox. This would guarantee that you only have permission to run this one particular program as user foxy.
  7. Write a shell script which runs your browser with the given user name, so that you can refit the .desktop files of the links you use to open the browser. Let's say you put it at /usr/local/bin/browse; it might simply contains (after the hash-bang line) sudo -u foxy /usr/bin/firefox or so.

The part that Linux does really well is in these sorts of extra options. I don't know much about Windows 7, but I would be somewhat surprised if it could do the same thing -- if it had a substitute-user system which could restrict the user which you substitute as based on the executable name. (Notice that if I just give myself arbitrary permission to substitute as foxy, this will not stop a dedicated attacker; they will just substitute an arbitrary command to read out the cookies as foxy.

Now let me explain why perhaps this is the wrong question. Gmail happens to have nice options that force you to only send your cookies over TLS/SSL (secured browsing connections). Most login-based services don't. This means that your cookies are in principle viewable to the entire Internet infrastructure. Surprisingly, that infrastructure has proven quite passive and generally will not attack you except perhaps to censor you, although there are parts of the Internet like Tor where this rule breaks completely.

However, it is still an issue when, say, you're using someone else's WiFi connection. They can "hear" everything which you send which is not TLS, and you have no way of stopping them without, say, using a secure proxying scheme to get through. (Like Tor! ...whoops.) It's not just the wireless security which I'm talking about (though if they're not using proper encryption, your cookies might also be in danger from anyone who has a laptop in the same room as you). It's the establishment itself. Perhaps your hotel desk clerk happens to be technologically savvy and wants to eavesdrop on Internet traffic at the hotel he works at; how do you stop him?

You could also solve this in Linux, but it requires shelling out a little cash to someone to buy what's called an SSH tunnel server. It's a remote proxy which you control which has (hopefully) a safer Internet connection than your day-to-day wireless voyages; you connect to it through an encrypted connection. It still depends on the rest of the Internet to be secure, but your immediate surroundings can be insecure. By setting up a ~/.ssh/authorized_keys file on that server you can get the tunnel to work without providing a password, though you might want to (or have to) set up a shell script to add this to firefox by default, as before.

CR Drost

Posted 2011-08-15T16:22:13.470

Reputation: 236

In windows 'runas' might be part of the solution for alternate user running, as well as proper use of NTFS ACL – Journeyman Geek – 2011-08-24T03:42:01.767

1

One way you can accomplish this...

  1. Create a new user account and set a password
  2. Login to that account and install Chrome or run Firefox to create the %Appdata% folder
  3. Encrypt that %AppData% folder using EFS (Right Click -> Properties -> Advanced -> Encrypt...)
  4. Switch to your main account Hold Shift and Right click on your browser shortcut and choose "Run as different user"
  5. Enter the new account credentials and click ok

You are now running the browser as a different user and those files are encrypted so only that user/application can read them.

For Chrome you will need to edit the shortcut to open the Chrome installed in the browser account.

You will also need to change the download directory to your main users and give the browser user permission on that directory or you can possible set it to a public folder and add that public folder as a library.

Edit: Just tested it in a VM with Firefox and Chrome... Firefox worked but Chrome crashes. It might be due to the sandbox it uses but I am not sure and there is probably a simple work around.

Edit2: Yea its the sandbox. If you add --no-sandbox to the shortcut it will work :\ If you have sandboxie you could set Chrome to be forced into a sandbox that is encrypted by the browser user.

Riguez

Posted 2011-08-15T16:22:13.470

Reputation: 3 594

Running with different credentials might help. Chrome might not start as different user because it installs itself for the current user and another account can't run/access it. – Nime Cloud – 2011-08-24T06:13:00.020

0

Most modern OSes supports a security model called "Mandatory access control" which can easily achieve what you want, but knowledge required to correctly configure the access control policies are difficult to learn.

A simpler solution on Windows is to use a Host-based intrusion-detection system (HIDS) which is now included in many antivirus software. They will typically allow you to set rules for each application on which resources it can access. Just put your cookies folder in to the list of protected files (or private files, or whatever they are called in your A/V software) and only allow IE to access them. Some anti-virus product does not have protection again read access, in which case, you may have to fall back to creating a user just for accessing that application (IE).

However, if you want to go through the trouble, you can run IE in a sandbox.

billc.cn

Posted 2011-08-15T16:22:13.470

Reputation: 6 821

0

Automatically emptying Temporary Internet Files might help, if you use Internet Explorer.

If you want to keep cookies, just encrypt the disks, remove the administrative -hidden- shares and restrict access to folders where you want to protect. Use Win+L combination, assign password when the computer returns from screensaver. That's what I do.

Nime Cloud

Posted 2011-08-15T16:22:13.470

Reputation: 923

By restrict access, how? Anyway, any program on the computer has the same privilege as me. – None – 2011-08-20T03:38:26.857

Right click any folder > select Properties. A dialog box will open. Click the security tab, set the permissions.

P.S: You can set permissions on NTFS formatted drives. Many hard disks are NTFS formatted. Many portable drives -including memory cards & USB memories- are not. – Nime Cloud – 2011-08-20T16:38:00.663

1@Nime Cloud: he wants to protect his files from a program, not from a user. What you describe only allows setting ACLs depending on the logged in user. One option might be to run your selected programs as a different user, and modify file ACLs accordingly. However I smell an architectural problem and a lost cause. – Jürgen Strobel – 2011-08-24T00:27:10.493