← Back to team overview

touch-packages team mailing list archive

[Bug 1393515] Re: browser allows browsing the phone filesystem

 

There are several options:
1. capture file:// and ignore it in the short-term, add confinement and content-hub later
2. add confinement and content-hub now
3. add content-hub now and confinement later
4. add confinement now and content-hub later
5. do nothing

'5' is probably out of the question at this point, since it is the
status quo and it is clear no one is happy with it. :)

'1' is an option as a band-aid, but it requires development work. It
isn't clear to me that capturing file contributes to using content-hub
later. This is possibly a short term fix.

'2' fixes everything all at once. This would require talking work away
from other areas and needs design input. This is a medium term fix.

'3' is similar to '1', but makes sure we are in alignment for future
engineering work. This is a medium term fix.

'4' has a similar affect to '1' in that it breaks file:// access, but
also covers any other access. It can be a short term fix and aligns with
future engineering work.

I believe '4' (this is bug #1356516) is the path forward in the short
term. It addresses the security and privacy concerns and aligns with
future engineering work. For convergence, content-hub integration will
be a requirement. I'll discuss this with the oxide team and report back.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to webbrowser-app in Ubuntu.
https://bugs.launchpad.net/bugs/1393515

Title:
  browser allows browsing the phone filesystem

Status in Canonical System Image:
  Confirmed
Status in webbrowser-app package in Ubuntu:
  Confirmed
Status in webbrowser-app package in Ubuntu RTM:
  Confirmed

Bug description:
  Using a URL like: file:/// gets you to the root of the phone
  filesystem ... i assume this is not actually desired since we even
  block the filemanager app to go higher up then $HOME without requiring
  a password.

  The webbrowser-app should either:
   * behave like the file-manager (see bug #1347010 for details)
   * file:/// should be disabled altogether on the phone
   * webbrowser-app should run confined which would force the use of
     content-hub by limiting file:/// access to those paths allowed by
     policy

To manage notifications about this bug go to:
https://bugs.launchpad.net/canonical-devices-system-image/+bug/1393515/+subscriptions


References