Chrome Security
Chrome is designed to keep you safer and more secure on the web with built-in
malware and phishing protection, auto-updates to make sure you have all the latest
security fixes, and more.
Sandboxing
Sandboxing helps prevent malware from installing itself on your computer, or
using what happens in one browser tab to affect what happens in another. The sandbox
adds an additional layer of protection against malicious web pages that try to leave
programs on your computer, monitor your web activities, or steal private information
from your hard drive (see video below).
With
Safe Browsing technology enabled in Chrome, if you encounter a website suspected
of containing phishing or malware as you browse the web, you will see a warning
page like the one shown above.
A phishing attack takes place when someone masquerades as someone else to trick
you into sharing personal or other sensitive information with them, usually through
a fake website. Malware, on the other hand, is software installed on your machine
often without your knowledge, and is designed to harm your computer or potentially
steal information from your computer.
Opting out of ad personalization
Advertisers use cookies to personalize your ads and improve your experience,
so that you see ads you are interested in. Advertising companies that are members
of the Network
Advertising Initiative (NAI) and other self-regulatory
efforts allow you to opt out
of this personalization. In Chrome, you can maintain your opt-out status for the
browser permanently even when you clear all cookies by installing the
“Keep My Opt-Outs” Chrome extension.
The first thing you want to be aware of when discussing security features on
Google’s Chrome browser is that many of the best options aren’t built into the browser,
but rather are offered as extensions, apps, and plugins in the
Chrome webstore
However, there are some very helpful security features built directly into Chrome.
You can find them in the Chrome settings sections. You have to scroll down and click
“show advanced settings…” the first section is ‘Privacy.’
There is a lot of pretty technical stuff in here that will affect your browsing
experience if you mess with it so we’re just going to stick with the simple stuff.
You can choose to block pop-ups. You can also make it so that sites must seek permission
when they want to track your physical location or you can disallow this sort of
tracking altogether. There are also sites that will want to use your camera or microphone.
You have the option of turning this off all the time or at the very least making
it so these sites need your permission before using these devices.
Back in the advanced settings area, you can check a box to enable phishing and
malware protection. When this is enabled and you hit a site that Google has flagged
as being potentially malicious, Chrome will throw this warning page (http://blog.chromium.org/2008/11/understanding-phishing-and-malware.html)
at you, letting you know that the page you are attempting to visit may harm your
computer in some way or attempt to steal your personal information.
Beneath that option is the passwords and forms section. As we mentioned in the
Firefox browser security article, there is no way to protect these passwords once
someone is on your computer. If you let Chrome save your passwords for you, they
are stored in this section. When you click “manage saved passwords”, your saved
passwords appear obscured, but all you have to do is click on any of the individual
accounts, choose show, and there they are, in plain text.
The ‘Do Not Track’ feature that we discussed in the Firefox article was
implemented in Chrome 23, which came out late last year and provides a good
baseline of protection against ad tracking. In the meantime, there are some great
privacy and security plugins that we discuss
here.
Building a secure browser is
a top priority for the Chromium
team; it's why we spend a lot of
time and effort keeping our code
secure. But as you can imagine,
code perfection is something almost
impossible to achieve for a project
of this size and complexity. To
make things worse, a browser spends
most of its time handling and executing
untrusted and potentially malicious
input data. In the event that something
goes wrong, the team has developed
a sandbox to help thwart any exploit
in two of the most popular vectors
of attack against browsers: HTML
Rendering and JavaScript execution.
In a nutshell, a sandbox is security
mechanism used to run an application
in a restricted environment. If
an attacker is able to exploit the
browser in a way that lets him run
arbitrary code on the machine, the
sandbox would help prevent this
code from causing damage to the
system. The sandbox would also help
prevent this exploit from modifying
and even reading your files or any
information on the system.
We are very excited to be able to
launch Google Chrome with the sandbox
enabled on all the platforms we
currently support. Even though the
sandbox in Google Chrome uses some
of the new security features on
Windows Vista, it is fully compatible
with Windows XP.
What part of chromium is sandboxed?
Google Chrome's
multi process architecture allows
for a lot of flexibility in the
way we do security. The entire HTML
rendering and JavaScript execution
is isolated to its own class of
processes; the renderers. These
are the ones that live in the sandbox.
We expect to work in the near future
with the plug-in vendors to securely
sandbox them as well.
How does the sandbox work?
The sandbox uses the security features
of Windows extensively; it does
not reinvent any security model.
To understand how it works, one
needs a basic understanding of the
Windows security model. With this
model all processes have an
access token. This access
token is like an ID card, it contains
information about the owner of the
process, the list of groups that
it belongs to and a list of privileges.
Each process has its own token,
and the system uses it to deny or
grant access to resources.
These resources are called
securable objects. They are
securable because they are associated
with an access control list, or
security descriptor. It contains
the security settings of the object.
The list of all the users and groups
having access to the resource, and
what kind of access they have (read,
write, execute, etc) can be found
there. Files, registry keys, mutexes,
pipes, events, semaphores are examples
of securable objects.
The
access check is the mechanism
by which the system determines whether
the security descriptor of an object
grants the rights requested to an
access token. It is performed every
time a process tries to acquire
a securable object.
The process access token is almost
entirely customizable. It's possible
to remove privileges and disable
some groups. This is exactly what
the sandbox does.
Before launching the renderer process
we modify its token to remove all
privileges and disable all groups.
We then convert the token to a restricted
token. A restricted token is like
a normal token, but the access checks
are performed twice, the first time
with the normal information in the
token, and the second one using
a secondary list of groups. Both
access checks have to succeed for
the resources to be granted to the
process. Google Chrome sets the
secondary list of groups to contain
only one item, the NULL user. Since
this user is never given permissions
to any objects, all access checks
performed with the access token
of the renderer process fail, making
this process useless to an attacker.
Of course, not all resources on
Windows follow this security model.
The keyboard, the mouse, the screen
and some user objects, like cursors,
icons and windows are examples of
resources that don't have security
descriptors. There is no access
check performed when trying to access
them. To prevent the renderer from
accessing those, the sandbox uses
a combination of Job Objects and
alternate desktops. A job object
is used to apply some restrictions
on a group of processes. Some of
the restrictions we apply on the
renderer process include accessing
windows created outside the job,
reading or writing to the clipboard,
and exiting Windows. We also used
an alternate desktop to prevent
the renderer from seeing the screen
(screen scrapping) or eavesdropping
on the keyboard and mouse (key logging).
Alternate desktops are commonly
used for security. For example,
on Windows, the login screen is
on another desktop. It ensures that
your password can't be stolen by
applications running on your normal
desktop.
What are the limitations?
As we said earlier, the sandbox
itself is not a new security model;
it relies on Windows to achieve
its security. Therefore, it is impossible
for us to prevent against a flaw
in the OS security model itself.
In addition, some legacy file systems,
like FAT32, used on certain computers
and USB keys don't support security
descriptors. Files on these devices
can't be protected by the sandbox.
Finally, some third party vendors
mistakenly configure files, registry
keys and other objects in a way
that bypasses the access check,
giving everyone on the machine full
access on them. Unfortunately, it's
impossible for the sandbox to protect
most of these misconfigured resources.
To conclude, it is important to
mention that this sandbox was designed
to be generic. It is not tied to
Google Chrome. It can easily be
used by any other projects with
a compatible multi-process architecture.
You can find more information about
the sandbox in the
design doc, and we will post
here again about the details of
our token manipulation and our policy
framework to configure the level
of security of the sandbox.
We hope you will feel safe browsing
the web using Google Chrome, and
we are looking forward to your feedback
and code contribution!
Posted by
Nicolas Sylvain, Software Engineer
Society
Groupthink :
Two Party System
as Polyarchy :
Corruption of Regulators :
Bureaucracies :
Understanding Micromanagers
and Control Freaks : Toxic Managers :
Harvard Mafia :
Diplomatic Communication
: Surviving a Bad Performance
Review : Insufficient Retirement Funds as
Immanent Problem of Neoliberal Regime : PseudoScience :
Who Rules America :
Neoliberalism
: The Iron
Law of Oligarchy :
Libertarian Philosophy
Quotes
War and Peace
: Skeptical
Finance : John
Kenneth Galbraith :Talleyrand :
Oscar Wilde :
Otto Von Bismarck :
Keynes :
George Carlin :
Skeptics :
Propaganda : SE
quotes : Language Design and Programming Quotes :
Random IT-related quotes :
Somerset Maugham :
Marcus Aurelius :
Kurt Vonnegut :
Eric Hoffer :
Winston Churchill :
Napoleon Bonaparte :
Ambrose Bierce :
Bernard Shaw :
Mark Twain Quotes
Bulletin:
Vol 25, No.12 (December, 2013) Rational Fools vs. Efficient Crooks The efficient
markets hypothesis :
Political Skeptic Bulletin, 2013 :
Unemployment Bulletin, 2010 :
Vol 23, No.10
(October, 2011) An observation about corporate security departments :
Slightly Skeptical Euromaydan Chronicles, June 2014 :
Greenspan legacy bulletin, 2008 :
Vol 25, No.10 (October, 2013) Cryptolocker Trojan
(Win32/Crilock.A) :
Vol 25, No.08 (August, 2013) Cloud providers
as intelligence collection hubs :
Financial Humor Bulletin, 2010 :
Inequality Bulletin, 2009 :
Financial Humor Bulletin, 2008 :
Copyleft Problems
Bulletin, 2004 :
Financial Humor Bulletin, 2011 :
Energy Bulletin, 2010 :
Malware Protection Bulletin, 2010 : Vol 26,
No.1 (January, 2013) Object-Oriented Cult :
Political Skeptic Bulletin, 2011 :
Vol 23, No.11 (November, 2011) Softpanorama classification
of sysadmin horror stories : Vol 25, No.05
(May, 2013) Corporate bullshit as a communication method :
Vol 25, No.06 (June, 2013) A Note on the Relationship of Brooks Law and Conway Law
History:
Fifty glorious years (1950-2000):
the triumph of the US computer engineering :
Donald Knuth : TAoCP
and its Influence of Computer Science : Richard Stallman
: Linus Torvalds :
Larry Wall :
John K. Ousterhout :
CTSS : Multix OS Unix
History : Unix shell history :
VI editor :
History of pipes concept :
Solaris : MS DOS
: Programming Languages History :
PL/1 : Simula 67 :
C :
History of GCC development :
Scripting Languages :
Perl history :
OS History : Mail :
DNS : SSH
: CPU Instruction Sets :
SPARC systems 1987-2006 :
Norton Commander :
Norton Utilities :
Norton Ghost :
Frontpage history :
Malware Defense History :
GNU Screen :
OSS early history
Classic books:
The Peter
Principle : Parkinson
Law : 1984 :
The Mythical Man-Month :
How to Solve It by George Polya :
The Art of Computer Programming :
The Elements of Programming Style :
The Unix Hater’s Handbook :
The Jargon file :
The True Believer :
Programming Pearls :
The Good Soldier Svejk :
The Power Elite
Most popular humor pages:
Manifest of the Softpanorama IT Slacker Society :
Ten Commandments
of the IT Slackers Society : Computer Humor Collection
: BSD Logo Story :
The Cuckoo's Egg :
IT Slang : C++ Humor
: ARE YOU A BBS ADDICT? :
The Perl Purity Test :
Object oriented programmers of all nations
: Financial Humor :
Financial Humor Bulletin,
2008 : Financial
Humor Bulletin, 2010 : The Most Comprehensive Collection of Editor-related
Humor : Programming Language Humor :
Goldman Sachs related humor :
Greenspan humor : C Humor :
Scripting Humor :
Real Programmers Humor :
Web Humor : GPL-related Humor
: OFM Humor :
Politically Incorrect Humor :
IDS Humor :
"Linux Sucks" Humor : Russian
Musical Humor : Best Russian Programmer
Humor : Microsoft plans to buy Catholic Church
: Richard Stallman Related Humor :
Admin Humor : Perl-related
Humor : Linus Torvalds Related
humor : PseudoScience Related Humor :
Networking Humor :
Shell Humor :
Financial Humor Bulletin,
2011 : Financial
Humor Bulletin, 2012 :
Financial Humor Bulletin,
2013 : Java Humor : Software
Engineering Humor : Sun Solaris Related Humor :
Education Humor : IBM
Humor : Assembler-related Humor :
VIM Humor : Computer
Viruses Humor : Bright tomorrow is rescheduled
to a day after tomorrow : Classic Computer
Humor
The Last but not Least Technology is dominated by
two types of people: those who understand what they do not manage and those who manage what they do not understand ~Archibald Putt.
Ph.D
Copyright © 1996-2021 by Softpanorama Society. www.softpanorama.org
was initially created as a service to the (now defunct) UN Sustainable Development Networking Programme (SDNP)
without any remuneration. This document is an industrial compilation designed and created exclusively
for educational use and is distributed under the Softpanorama Content License.
Original materials copyright belong
to respective owners. Quotes are made for educational purposes only
in compliance with the fair use doctrine.
FAIR USE NOTICE This site contains
copyrighted material the use of which has not always been specifically
authorized by the copyright owner. We are making such material available
to advance understanding of computer science, IT technology, economic, scientific, and social
issues. We believe this constitutes a 'fair use' of any such
copyrighted material as provided by section 107 of the US Copyright Law according to which
such material can be distributed without profit exclusively for research and educational purposes.
This is a Spartan WHYFF (We Help You For Free)
site written by people for whom English is not a native language. Grammar and spelling errors should
be expected. The site contain some broken links as it develops like a living tree...
Disclaimer:
The statements, views and opinions presented on this web page are those of the author (or
referenced source) and are
not endorsed by, nor do they necessarily reflect, the opinions of the Softpanorama society. We do not warrant the correctness
of the information provided or its fitness for any purpose. The site uses AdSense so you need to be aware of Google privacy policy. You you do not want to be
tracked by Google please disable Javascript for this site. This site is perfectly usable without
Javascript.
Last modified:
March, 12, 2019