4

I read here that I should use separate security profiles for different sorts of things; accessing sensitive information, doing system administration vs. opening links from emails.

I know that different instances of Firefox can be run from specifying different profiles to start up the browser with. As long as these are limited to accessing a certain type of site; can they provide protection against application-layer attacks like XSS, and DNS Re-binding?

1 Answer 1

4

Each Firefox profile shares no data with the other profile, i.e. they are separate folders and no cookies, saved passwords, installed extensions etc get shared. The only thing which might shared application data outside the control of Firefox, i.e the Silverlight plugin is known to share data even between different browsers on the same system. Flash cookies etc are instead to a specific profile I think. This in effect makes using separate Firefox profiles a good way to separate sites which should never be able to interact inside the browser, like intranet sites and external sites or to protect online banking. It does not protect against DNS rebinding attacks since these are not based on interaction between two sites inside the browser.

To make sure that one does not inadvertently uses the wrong browser one could additionally setup a proxy.pac file for each of the browser profiles which restricts access further. But note that proxy.pac files work at the level of hostnames and not IP address, so it does not protect against external sites returning local IP addresses (i.e. attacker.example.com claiming to be at 127.0.0.1). To get also this problem resolved you need to use a DNS server which can filter the DNS response like dnswall. Such server also protects against DNS rebinding attacks.

4
  • Is this the proxy.pac we're talking about? auth0.com/blog/heads-up-https-is-not-enough-when-using-wpad/…
    – leeand00
    Commented Aug 8, 2016 at 13:05
  • 1
    @leeand00: proxy.pac is also used together with wpad but that's not the only use of it. wpad is used for automatic discovery of proxy.pac files but in this case you setup a proxy.pac file by hand. Commented Aug 8, 2016 at 13:49
  • yeah it looks to me as though if you connect to a network, in order to gain access to it, you would choose Auto-detect proxy settings for this network (in Firefox anyway) and then it would get the networks proxy.pac and this is where that security flaw comes from. Right?
    – leeand00
    Commented Aug 8, 2016 at 13:52
  • @leeand00: WPAD attack has nothing to do with the original question answered here. Please ask a new question instead. Commented Aug 8, 2016 at 14:13

You must log in to answer this question.

Not the answer you're looking for? Browse other questions tagged .