Safe Browsing and URL Forwarding

Trusted Extensions makes it possible to separate network traffic
into labeled zones which provide robust isolation. As I mentioned in the previous posting, this
isolation provides an environment for safe browsing. The ability to automatically redirect web pages to the
appropriate browser prevents a variety of threats such as spyware,
viruses, and similar web-based attacks. I use the internal zone for all
of my activity on Sun's Wide Area Network (SWAN). I use the public zone
for browsing the external web.



Here is the data flow:

 Data



  1. The internal browser executes its proxy.pac script for a selected URL. The
    script specifies that a non-resolvable URL (outside of SWAN) should be forwarded to the url.xfer proxy on port 8080.

  2. The url.xfer proxy, listening on the multilevel port 8080 receives a proxy request, and calls getpeerucred(2)
    to determine the label and user ID of the request. It validates the
    request by checking the label of the requestor, and whether it has been
    confirmed.

  3.  For an initial request  it replies with a page
    containing a JavaScript confirmer, asking the user for permission to
    forward the specified URL to the public zone.

  4. The browser executes the JavaScript and gets the user's reply.

  5. If confirmed, the browser encapsulates the original URL as a
    parameter and sends it back to the url.xfer proxy using the special
    hostname url.xfer. In either case, the internal browser is directed to return to the original page.

  6. The url.xfer proxy receives a request with the special hostname url.xfer. It starts a child process with the requestor's ID, and executes the Mozilla remote protocol to send the original URL to the Firefox instance which is running in the public zone with the specified user's ID.


  7. The Mozilla remote helper process finds the matching X11 property ( with the correct label and user ID) and signals the Firefox instance
    to open another JavaSript file which takes the focus, pops to the
    front, and requests the orignal URL to be loaded into the current
    window.

  8. The public Firefox instance executes its own proxy.pac file to determine how to handle this request.


Here is a sample confirmer dialog that is discussed in steps 3 and 4.



Comments:

Hello,
Great ifno!!
I am so very glad that I found your blog post and that I read it.
You have some very useful and helpful tips on here.
We can never be to safe with this kind of stuff. Our computers are the best spot for someone to get into.
Thanks for the great post.

Posted by grace on June 25, 2010 at 02:45 AM PDT #

Post a Comment:
  • HTML Syntax: NOT allowed
About

This blog explores some of the security features of Oracle Solaris. In particular, topics such as Role-Based Access Control and Labeled Security are my special interests.

Search

Categories
Archives
« April 2014
SunMonTueWedThuFriSat
  
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
   
       
Today
Bookmarks