I'm developing an application using Chrome Native Messaging that starts through a Chrome Extension.
My question is: How can I ensure that host application is really the same supplied by me?
I need to ensure the authenticity the application called by extension. I asked about this problem and people told me to sign host files and check its authenticity within extension. But if somebody changes the chrome application target in registry, would be possible start another different application.
Is there any way to get the path pointed ID supplied during extension connection recorded in the registry. If I had this path, I could validate the json file and ensure that real target is executing.
These problems refer to the same security problems faced by the NPAPI plugin, where it is not possible to determine the transaction's authenticity.
--
You received this message because you are subscribed to the Google Groups "Chromium-extensions" group.
To unsubscribe from this group and stop receiving emails from it, send an email to chromium-extens...@chromium.org.
To post to this group, send email to chromium-...@chromium.org.
Visit this group at http://groups.google.com/a/chromium.org/group/chromium-extensions/.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/chromium-extensions/d6983ab1-13a3-4d26-a438-5af7079dff6e%40chromium.org.
For more options, visit https://groups.google.com/a/chromium.org/d/optout.
The simple answer is that you can't. A determined attacker can always disable any mechanism used by two local applications (the extension and the native message host) on a system that they have local control of. You can implement all the encryption and signing between the two halves of the application that you want but it will not be 100% secure.
On Wed, Apr 8, 2015 at 10:55 AM Rodrigo Passos <barcel...@gmail.com> wrote:
--I'm developing an application using Chrome Native Messaging that starts through a Chrome Extension.
My question is: How can I ensure that host application is really the same supplied by me?
I need to ensure the authenticity the application called by extension. I asked about this problem and people told me to sign host files and check its authenticity within extension. But if somebody changes the chrome application target in registry, would be possible start another different application.
Is there any way to get the path pointed ID supplied during extension connection recorded in the registry. If I had this path, I could validate the json file and ensure that real target is executing.
These problems refer to the same security problems faced by the NPAPI plugin, where it is not possible to determine the transaction's authenticity.
You received this message because you are subscribed to the Google Groups "Chromium-extensions" group.
To unsubscribe from this group and stop receiving emails from it, send an email to chromium-extensions+unsub...@chromium.org.
--
You received this message because you are subscribed to the Google Groups "Chromium-extensions" group.
To unsubscribe from this group and stop receiving emails from it, send an email to chromium-extens...@chromium.org.
To post to this group, send email to chromium-...@chromium.org.
Visit this group at http://groups.google.com/a/chromium.org/group/chromium-extensions/.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/chromium-extensions/d6983ab1-13a3-4d26-a438-5af7079dff6e%40chromium.org.
For more options, visit https://groups.google.com/a/chromium.org/d/optout.
Meant to share this with the list:Alterations to the Windows registry can only be done by someone with admin-level access to the machine. If they have access to alter the registry they also have access to alter your extension. You can't defend against this.Rodrigo,The condition you state here: "But if somebody changes the chrome application target in registry, would be possible start another different application."
On Wed, Apr 8, 2015 at 12:55 PM, Rodrigo Passos <barcel...@gmail.com> wrote:
I'm developing an application using Chrome Native Messaging that starts through a Chrome Extension.
My question is: How can I ensure that host application is really the same supplied by me?
I need to ensure the authenticity the application called by extension. I asked about this problem and people told me to sign host files and check its authenticity within extension. But if somebody changes the chrome application target in registry, would be possible start another different application.
Is there any way to get the path pointed ID supplied during extension connection recorded in the registry. If I had this path, I could validate the json file and ensure that real target is executing.
These problems refer to the same security problems faced by the NPAPI plugin, where it is not possible to determine the transaction's authenticity.
--
You received this message because you are subscribed to the Google Groups "Chromium-extensions" group.
To unsubscribe from this group and stop receiving emails from it, send an email to chromium-extensions+unsub...@chromium.org.
To post to this group, send email to chromium-...@chromium.org.
Visit this group at http://groups.google.com/a/chromium.org/group/chromium-extensions/.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/chromium-extensions/d6983ab1-13a3-4d26-a438-5af7079dff6e%40chromium.org.
For more options, visit https://groups.google.com/a/chromium.org/d/optout.
To unsubscribe from this group and stop receiving emails from it, send an email to chromium-extens...@chromium.org.
To post to this group, send email to chromium-...@chromium.org.
Visit this group at http://groups.google.com/a/chromium.org/group/chromium-extensions/.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/chromium-extensions/24866439-b82f-4c4a-9bec-19295d830d5b%40chromium.org.
Yes and no. The sandbox is designed to protect the system from the extension not the other way around. Chrome does validate that the extension has not been modified since it was downloaded from the Chrome web store but again, this is a mitigation not a guarantee in the face of a local attacker. I can run a modified Chromium build that disables these checks.
If you assume that the local system is secure then the protections against unauthorized modifications to the system registry are enough. Chrome does validate that the extension trying to contact the native messaging host is listed in the manifest file referred to in the registry.
On Wed, Apr 8, 2015 at 11:14 AM Rodrigo Passos <barcel...@gmail.com> wrote:
But the Chrome extension doesn´t run in a sandbox? If I change something in the extension it break, or not?
Em quarta-feira, 8 de abril de 2015 15:02:58 UTC-3, Reilly Grant escreveu:The simple answer is that you can't. A determined attacker can always disable any mechanism used by two local applications (the extension and the native message host) on a system that they have local control of. You can implement all the encryption and signing between the two halves of the application that you want but it will not be 100% secure.On Wed, Apr 8, 2015 at 10:55 AM Rodrigo Passos <barcel...@gmail.com> wrote:
--I'm developing an application using Chrome Native Messaging that starts through a Chrome Extension.
My question is: How can I ensure that host application is really the same supplied by me?
I need to ensure the authenticity the application called by extension. I asked about this problem and people told me to sign host files and check its authenticity within extension. But if somebody changes the chrome application target in registry, would be possible start another different application.
Is there any way to get the path pointed ID supplied during extension connection recorded in the registry. If I had this path, I could validate the json file and ensure that real target is executing.
These problems refer to the same security problems faced by the NPAPI plugin, where it is not possible to determine the transaction's authenticity.
You received this message because you are subscribed to the Google Groups "Chromium-extensions" group.
To unsubscribe from this group and stop receiving emails from it, send an email to chromium-extensions+unsubscribe...@chromium.org.
To post to this group, send email to chromium-...@chromium.org.--
Visit this group at http://groups.google.com/a/chromium.org/group/chromium-extensions/.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/chromium-extensions/d6983ab1-13a3-4d26-a438-5af7079dff6e%40chromium.org.
For more options, visit https://groups.google.com/a/chromium.org/d/optout.
You received this message because you are subscribed to the Google Groups "Chromium-extensions" group.
To unsubscribe from this group and stop receiving emails from it, send an email to chromium-extensions+unsub...@chromium.org.
To post to this group, send email to chromium-...@chromium.org.
Visit this group at http://groups.google.com/a/chromium.org/group/chromium-extensions/.
Alterations to the Windows registry can only be done by someone with admin-level access to the machine.
The application installer must create registry key
HKEY_LOCAL_MACHINE\SOFTWARE\Google\Chrome\NativeMessagingHosts\com.my_company.my_application
or
HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\NativeMessagingHosts\com.my_company.my_application