sessions manager extension
sessions manager extension
Is there anyway I could run this particular extension outside the sandbox?
all my saved sessions go away once sandbox contents are deleted.
all my saved sessions go away once sandbox contents are deleted.
If you mean: run Firefox sandboxed except for that extension, then no.
Why not just allow session information to be saved outside of the sandbox?
There's a setting at:
Sandbox Settings > Applications > Web Browser > Firefox
to allow session management information to be saved.
Just be sure that your Firefox Options say "Show my windows and tabs from last time", and (not so obviously) don't allow Privacy tab > "Clear history when Firefox closes" > Settings, to delete the "Browsing History".
Why not just allow session information to be saved outside of the sandbox?
There's a setting at:
Sandbox Settings > Applications > Web Browser > Firefox
to allow session management information to be saved.
Just be sure that your Firefox Options say "Show my windows and tabs from last time", and (not so obviously) don't allow Privacy tab > "Clear history when Firefox closes" > Settings, to delete the "Browsing History".
Paul
Win 10 Home 64-bit (w/admin rights) - Zone Alarm Pro Firewall, MalwareBytes Premium A/V, Cyberfox, Thunderbird
Sandboxie user since March 2007
Win 10 Home 64-bit (w/admin rights) - Zone Alarm Pro Firewall, MalwareBytes Premium A/V, Cyberfox, Thunderbird
Sandboxie user since March 2007
Sorry it's actually chromeGuest10 wrote:If you mean: run Firefox sandboxed except for that extension, then no.
Why not just allow session information to be saved outside of the sandbox?
There's a setting at:
Sandbox Settings > Applications > Web Browser > Firefox
to allow session management information to be saved.
Just be sure that your Firefox Options say "Show my windows and tabs from last time", and (not so obviously) don't allow Privacy tab > "Clear history when Firefox closes" > Settings, to delete the "Browsing History".
There seem to be two Session Manager extensions, so I'm not sure which one you use:
Session Manager (from tkaz.ec) <-- I tried this one. In my view, it needs a little work.
mghenlmbmjcpehccoangkdpagbcbkdpc
Session Manager (from tirokea)
bbcnbpafconjjigibnhbfmmgdbbkcjfi
You can probably allow direct access to the entire Chrome profile folder, or some checking might find out exactly which files need to be saved out of the sandbox if you state which one you use.
Session Manager (from tkaz.ec) <-- I tried this one. In my view, it needs a little work.
mghenlmbmjcpehccoangkdpagbcbkdpc
Session Manager (from tirokea)
bbcnbpafconjjigibnhbfmmgdbbkcjfi
You can probably allow direct access to the entire Chrome profile folder, or some checking might find out exactly which files need to be saved out of the sandbox if you state which one you use.
Paul
Win 10 Home 64-bit (w/admin rights) - Zone Alarm Pro Firewall, MalwareBytes Premium A/V, Cyberfox, Thunderbird
Sandboxie user since March 2007
Win 10 Home 64-bit (w/admin rights) - Zone Alarm Pro Firewall, MalwareBytes Premium A/V, Cyberfox, Thunderbird
Sandboxie user since March 2007
from tirokea<<<<<<<<Guest10 wrote:There seem to be two Session Manager extensions, so I'm not sure which one you use:
Session Manager (from tkaz.ec) <-- I tried this one. In my view, it needs a little work.
mghenlmbmjcpehccoangkdpagbcbkdpc
Session Manager (from tirokea)
bbcnbpafconjjigibnhbfmmgdbbkcjfi
You can probably allow direct access to the entire Chrome profile folder, or some checking might find out exactly which files need to be saved out of the sandbox if you state which one you use.
In some ways this is the better of the two.
I couldn't see how to modify the tabs that are in a saved sessions with this one, but I definitely had an easier time saving permanent (as opposed to temporary) sessions.
It appears that the only file that needs to be saved outside of the sandbox is the extension's file in the Local Storage folder:
chrome-extension_bbcnbpafconjjigibnhbfmmgdbbkcjfi_0.localstorage
There are several choices:
1) You could just allow this one file to be saved outside of the sandbox:
Sandbox Settings > Resource Access > File Access > Direct Access
"Add Program" button: chrome.exe
"Add" button: Navigate to and select the above file in the "...\Google\Chrome\User Data\Default\Local Storage" folder.
OK your way out.
2) You could use a wild card path to the file, and enter just the folder/file name:
Sandbox Settings > Resource Access > File Access > Direct Access
"Add Program" button: chrome.exe
"Edit/Add" button: *\Local Storage\chrome-extension_bbcnbpafconjjigibnhbfmmgdbbkcjfi_0.localstorage
OK your way out.
3) As a result of trying-out both extensions, it appears to me that allowing chrome.exe to have Direct Access to the entire "Local Storage" folder might be advantageous.
If other extensions also save their information in the Local Storage folder, then setting that folder in a Direct Access setting could make saving data from other extensions more successful, when sandboxed:
Sandbox Settings > Resource Access > File Access > Direct Access
"Add Program" button: chrome.exe
Either:
"Add" button: Navigate to and select the "Local Storage" folder in the unsandboxed Chrome profile
OK
Or,
"Edit/Add" button: *\Local Storage\*
OK
----
You may also be interested in a setting to allow Chrome to save words into it's custom dictionary file:
(none of Sandboxie's templates include this, including the template for direct access to the entire profile folder)
Sandbox Settings > Resource Access > File Access > Direct Access
"Add Program" button: chrome.exe
"Edit/Add" button: *\custom dictionary.txt
OK
(Obviously, this uses a wild card path, so it will work regardless of the actual path to the "Custom Dictionary.txt" file)
I couldn't see how to modify the tabs that are in a saved sessions with this one, but I definitely had an easier time saving permanent (as opposed to temporary) sessions.
It appears that the only file that needs to be saved outside of the sandbox is the extension's file in the Local Storage folder:
chrome-extension_bbcnbpafconjjigibnhbfmmgdbbkcjfi_0.localstorage
There are several choices:
1) You could just allow this one file to be saved outside of the sandbox:
Sandbox Settings > Resource Access > File Access > Direct Access
"Add Program" button: chrome.exe
"Add" button: Navigate to and select the above file in the "...\Google\Chrome\User Data\Default\Local Storage" folder.
OK your way out.
2) You could use a wild card path to the file, and enter just the folder/file name:
Sandbox Settings > Resource Access > File Access > Direct Access
"Add Program" button: chrome.exe
"Edit/Add" button: *\Local Storage\chrome-extension_bbcnbpafconjjigibnhbfmmgdbbkcjfi_0.localstorage
OK your way out.
3) As a result of trying-out both extensions, it appears to me that allowing chrome.exe to have Direct Access to the entire "Local Storage" folder might be advantageous.
If other extensions also save their information in the Local Storage folder, then setting that folder in a Direct Access setting could make saving data from other extensions more successful, when sandboxed:
Sandbox Settings > Resource Access > File Access > Direct Access
"Add Program" button: chrome.exe
Either:
"Add" button: Navigate to and select the "Local Storage" folder in the unsandboxed Chrome profile
OK
Or,
"Edit/Add" button: *\Local Storage\*
OK
----
You may also be interested in a setting to allow Chrome to save words into it's custom dictionary file:
(none of Sandboxie's templates include this, including the template for direct access to the entire profile folder)
Sandbox Settings > Resource Access > File Access > Direct Access
"Add Program" button: chrome.exe
"Edit/Add" button: *\custom dictionary.txt
OK
(Obviously, this uses a wild card path, so it will work regardless of the actual path to the "Custom Dictionary.txt" file)
Paul
Win 10 Home 64-bit (w/admin rights) - Zone Alarm Pro Firewall, MalwareBytes Premium A/V, Cyberfox, Thunderbird
Sandboxie user since March 2007
Win 10 Home 64-bit (w/admin rights) - Zone Alarm Pro Firewall, MalwareBytes Premium A/V, Cyberfox, Thunderbird
Sandboxie user since March 2007
Guest10 wrote:In some ways this is the better of the two.
I couldn't see how to modify the tabs that are in a saved sessions with this one, but I definitely had an easier time saving permanent (as opposed to temporary) sessions.
It appears that the only file that needs to be saved outside of the sandbox is the extension's file in the Local Storage folder:
chrome-extension_bbcnbpafconjjigibnhbfmmgdbbkcjfi_0.localstorage
There are several choices:
1) You could just allow this one file to be saved outside of the sandbox:
Sandbox Settings > Resource Access > File Access > Direct Access
"Add Program" button: chrome.exe
"Add" button: Navigate to and select the above file in the "...\Google\Chrome\User Data\Default\Local Storage" folder.
OK your way out.
2) You could use a wild card path to the file, and enter just the folder/file name:
Sandbox Settings > Resource Access > File Access > Direct Access
"Add Program" button: chrome.exe
"Edit/Add" button: *\Local Storage\chrome-extension_bbcnbpafconjjigibnhbfmmgdbbkcjfi_0.localstorage
OK your way out.
3) As a result of trying-out both extensions, it appears to me that allowing chrome.exe to have Direct Access to the entire "Local Storage" folder might be advantageous.
If other extensions also save their information in the Local Storage folder, then setting that folder in a Direct Access setting could make saving data from other extensions more successful, when sandboxed:
Sandbox Settings > Resource Access > File Access > Direct Access
"Add Program" button: chrome.exe
Either:
"Add" button: Navigate to and select the "Local Storage" folder in the unsandboxed Chrome profile
OK
Or,
"Edit/Add" button: *\Local Storage\*
OK
----
You may also be interested in a setting to allow Chrome to save words into it's custom dictionary file:
(none of Sandboxie's templates include this, including the template for direct access to the entire profile folder)
Sandbox Settings > Resource Access > File Access > Direct Access
"Add Program" button: chrome.exe
"Edit/Add" button: *\custom dictionary.txt
OK
(Obviously, this uses a wild card path, so it will work regardless of the actual path to the "Custom Dictionary.txt" file)
Awesome, #1 worked perfectly...now how do I undo it if I ever want to?
I tried but it won't let me....do I just remove the local storage directory?
Won't let you?Gator wrote:...now how do I undo it if I ever want to?
I tried but it won't let me....do I just remove the local storage directory?
All you have to do is go to:
Sandbox Settings > Resource Access > File Access > Direct Access
Choose "chrome.exe" from the pull-down box, if it isn't already shown there.
Then select the item:
...\Google\Chrome\User Data\Default\Local Storage\chrome-extension_bbcnbpafconjjigibnhbfmmgdbbkcjfi_0.localstorage
(however it may appear in the listing), and then click on the "Remove" button.
OK
Paul
Win 10 Home 64-bit (w/admin rights) - Zone Alarm Pro Firewall, MalwareBytes Premium A/V, Cyberfox, Thunderbird
Sandboxie user since March 2007
Win 10 Home 64-bit (w/admin rights) - Zone Alarm Pro Firewall, MalwareBytes Premium A/V, Cyberfox, Thunderbird
Sandboxie user since March 2007
Ahhh ok, thanksGuest10 wrote:Won't let you?Gator wrote:...now how do I undo it if I ever want to?
I tried but it won't let me....do I just remove the local storage directory?
All you have to do is go to:
Sandbox Settings > Resource Access > File Access > Direct Access
Choose "chrome.exe" from the pull-down box, if it isn't already shown there.
Then select the item:
...\Google\Chrome\User Data\Default\Local Storage\chrome-extension_bbcnbpafconjjigibnhbfmmgdbbkcjfi_0.localstorage
(however it may appear in the listing), and then click on the "Remove" button.
OK
Now this shouldn't effect sbie's security much should it?
Not at all. There's no way for any program except chrome.exe to make use of the setting, and even then, chrome.exe can only write to the local storage file with that exact name.Gator wrote:Now this shouldn't effect sbie's security much should it?
Paul
Win 10 Home 64-bit (w/admin rights) - Zone Alarm Pro Firewall, MalwareBytes Premium A/V, Cyberfox, Thunderbird
Sandboxie user since March 2007
Win 10 Home 64-bit (w/admin rights) - Zone Alarm Pro Firewall, MalwareBytes Premium A/V, Cyberfox, Thunderbird
Sandboxie user since March 2007
Guest10 wrote:Not at all. There's no way for any program except chrome.exe to make use of the setting, and even then, chrome.exe can only write to the local storage file with that exact name.Gator wrote:Now this shouldn't effect sbie's security much should it?
You've been very helpful and I appreciate it alot!
I assume that you mean direct access to the entire Local Storage folder, as opposed to direct access to just one of the files there.Guest036 wrote:Is it safe to allow extensions/Google Chrome direct access to the 'Local Storage' folder? Or can something malicious access my system via this folder?
In my opinion it's safe, but you can make it even safer by specifying that only chrome.exe can use the setting; and if you specify that the setting only applies to files that have a .localstorage file extension
Sandbox Settings > Resource Access > File Access > Direct Access
"Add Program" button: chrome.exe
"Edit/Add" button: *\Local Storage\*.localstorage
OK your way out.
Paul
Win 10 Home 64-bit (w/admin rights) - Zone Alarm Pro Firewall, MalwareBytes Premium A/V, Cyberfox, Thunderbird
Sandboxie user since March 2007
Win 10 Home 64-bit (w/admin rights) - Zone Alarm Pro Firewall, MalwareBytes Premium A/V, Cyberfox, Thunderbird
Sandboxie user since March 2007
Thank you for your reply.
Yes i have given access to that whole folder.
But thanks i have now changed it so only Chrome.exe has access to this folder (I didn't know you can specify a certain program) but i have restrictions active anyway so only Chrome.exe can run/start and access the internet for that sandbox
I guess i will have to add all the .localstorage/Journals so it's more specific as i do have other .localstorage files in the folder saved by websites which would be restricted.
New Question: Is it safe to allow 'dllhost.exe' and 'rundll32.exe' to run/start for chrome? As i keep getting popups for these
Yes i have given access to that whole folder.
But thanks i have now changed it so only Chrome.exe has access to this folder (I didn't know you can specify a certain program) but i have restrictions active anyway so only Chrome.exe can run/start and access the internet for that sandbox
I guess i will have to add all the .localstorage/Journals so it's more specific as i do have other .localstorage files in the folder saved by websites which would be restricted.
New Question: Is it safe to allow 'dllhost.exe' and 'rundll32.exe' to run/start for chrome? As i keep getting popups for these
Yes, that's quite common for sandboxed programs. I don't use Start/Run Restrictions for Chrome, but I have allowed dllhost.exe for Thunderbird, and rundll32.exe for Firefox.Guest036 wrote:New Question: Is it safe to allow 'dllhost.exe' and 'rundll32.exe' to run/start for chrome? As i keep getting popups for these
Paul
Win 10 Home 64-bit (w/admin rights) - Zone Alarm Pro Firewall, MalwareBytes Premium A/V, Cyberfox, Thunderbird
Sandboxie user since March 2007
Win 10 Home 64-bit (w/admin rights) - Zone Alarm Pro Firewall, MalwareBytes Premium A/V, Cyberfox, Thunderbird
Sandboxie user since March 2007
Who is online
Users browsing this forum: No registered users and 1 guest