Program Compatibility Templates [non-security programs]

Utilities designed for use with Sandboxie
APMichael
Posts: 161
Joined: Sun Sep 07, 2014 5:54 am
Location: Germany

Re: Program Compatibility Templates [non-security programs]

Post by APMichael » Thu Sep 14, 2017 12:45 pm

Updated settings for Firefox add-on uBlock Origin:

Code: Select all

OpenFilePath=firefox.exe,%AppData%\Mozilla\Firefox\Profiles\*\browser-extension-data\uBlock0@raymondhill.net\storage.js
OpenFilePath=firefox.exe,%AppData%\Mozilla\Firefox\Profiles\*\storage\default\moz-extension+++*\idb\1671402671ueBglaorcokt0SCeahc.*

Bertus
Posts: 38
Joined: Sun Dec 28, 2008 8:56 am

firefox quantum cookies direct access template fix

Post by Bertus » Sun Dec 03, 2017 4:19 pm

I always run firefox in a sandbox.For some sites I want to preserve the cookie.
In order to do this I enable the "Allow direct access to firefox cookies" setting but this doesn't seem to work with the new Firefox quantum.
To make it work I also have to create an OpenFilePath to the webappsstore.sqlite in the firefox profile folder.
My new "Allow direct access to firefox cookies" template:

[Template_Local_Firefox_Cookies_DirectAccess]
OpenFilePath=firefox.exe,%Tmpl.Firefox%\cookies*
OpenFilePath=firefox.exe,%Tmpl.Firefox%\webappsstore*
Tmpl.Title=Template_Local_Firefox_Cookies_DirectAccess
Tmpl.Class=Local

APMichael
Posts: 161
Joined: Sun Sep 07, 2014 5:54 am
Location: Germany

Re: Program Compatibility Templates [non-security programs]

Post by APMichael » Tue Jan 23, 2018 12:51 pm

Updated template for Firefox 58.0:

Code: Select all

[Template_Firefox_Phishing_DirectAccess]
Tmpl.Title=#4337,Firefox/Waterfox/Pale Moon
Tmpl.Class=WebBrowser
ProcessGroup=<FirefoxPrograms>,firefox.exe,waterfox.exe,palemoon.exe
OpenFilePath=<FirefoxPrograms>,%USERPROFILE%\*\blocklist*
OpenFilePath=<FirefoxPrograms>,%USERPROFILE%\*\cert*.db
OpenFilePath=<FirefoxPrograms>,%USERPROFILE%\*\safebrowsing*

C3CvUJugtI3eMv
Posts: 16
Joined: Thu Oct 29, 2015 11:44 am

Firefox application rule doesnt work anymore

Post by C3CvUJugtI3eMv » Tue May 29, 2018 3:55 am

Good morning. I am not sure is somebody already reported this issue.
But default application rule :
Application -> Web browser -> Firefox -> Allow direct access Firefox to passwords
dosn`t work anymore.
To fix it need to change default rule :

Code: Select all

OpenFilePath=firefox.exe,%Tmpl.Firefox%\key3.db
to :

Code: Select all

OpenFilePath=firefox.exe,%Tmpl.Firefox%\key4.db

Barb@Invincea
Sandboxie Support
Sandboxie Support
Posts: 2545
Joined: Mon Nov 07, 2016 3:10 pm

Re: Firefox application rule doesnt work anymore

Post by Barb@Invincea » Tue May 29, 2018 11:10 am

Hello C3CvUJugtI3eMv ,

Thanks for the update. We will look into it.

Merging the thread with the templates topic.

Regards,
Barb.-

Guest10
Posts: 5128
Joined: Sun Apr 27, 2008 5:24 pm
Location: Ohio, USA

My settings for chrome.exe phishing

Post by Guest10 » Sat Jul 14, 2018 10:43 am

The Chrome Phishing template in templates.ini, as it is now:

[Template_Chrome_Phishing_DirectAccess]
Tmpl.Title=#4337,Google Chrome
Tmpl.Class=WebBrowser
ProcessGroup=<ChromePrograms>,chrome.exe,dragon.exe,iron.exe,opera.exe,maxthon.exe,vivaldi.exe,neon.exe
OpenFilePath=<ChromePrograms>,%Local AppData%\Google\Chrome\User Data\Safe Browsing*
OpenFilePath=<ChromePrograms>,%Local AppData%\Google\Chrome\User Data\Certificate Revocation Lists


I seldom use Chrome, but I noticed that Chrome's "Safe Browsing" files were not being updated outside of the sandbox.
Also, I do not have a "Certificate Revocation Lists" folder, as listed in the last exception above.


I have added these settings to the configuration of my Chrome sandbox, to allow these items to be updated outside of the sandbox:

OpenFilePath=chrome.exe,%Local AppData%\Google\Chrome\User Data\Safe Browsing\
OpenFilePath=chrome.exe,%Local AppData%\Google\Chrome\User Data\CertificateRevocation\

NOTE: I have specified "chrome.exe" instead of "<ChromePrograms>" in my settings.
I cannot verify whether or not these settings would be correct, for users of the other browsers (dragon, iron, opera, etc) that are listed in the ProcessGroup line.
Paul
Win 10 Home 64-bit (w/admin rights) - Zone Alarm Pro Firewall, MalwareBytes Premium A/V, Firefox, Thunderbird
Sandboxie user since March 2007

Post Reply

Who is online

Users browsing this forum: No registered users and 1 guest