Skip to content

Scripts to ease the installation of warsaw ✌️security✌️ module

Notifications You must be signed in to change notification settings

leorochael/warsaw-banking

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

16 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Attempt to automate the build of an OCI container for running warsaw

warsaw is a spyware that is foisted by Brazillian banks upon Brazillian users of internet banking under the guise of a "security module".

This repository contains code to build and run a container in rootless mode

Installation

Prereqs

This repository requires buildah to build and podman to run.

It was tested in a machine that had fuse-overlayfs installed before first running buildah or podman.

Please follow the links above to install those tools.

It might be possible to build and run with other tools, but this hasn't been tested.

Build

Run:

make

Usage:

Run the container with:

./run.sh

Once you get to the container shell, run firefox with:

firefox --no-remote &

Saved files will be downloaded in the ~/Downloads folder. Move them to /tmp to share them with the host machine.

TODO:

  • Refactor the name warsaw-banking into a variable that can be overriden in Makefile, build.sh and run.sh
    • Perhaps rebuild run.sh after build.sh with the correct name.
  • Installation currently adds the locally generated Warsaw Certificate Authority to the firefox profile of the ubuntu user.
    • Find a way to avoid that, as it allows MitM attacks where this certificate can be used to impersonate other SSL sites.
    • Instead, automate creating the profile and appending the generated cert_override.txt in the ubuntu user's firefox profile during build.
  • Find a way to mount or export the Downloads folder from the container so it's easier to export PDF receipts, downloads and stuff.
    • This means finding a way of making the internal ubuntu user run as the same uid as the user running podman.
      • warsaw didn't like it when I tried running the container mapping the current user to ubuntu like this:
        • --uidmap=0:1:999 --uidmap=1000:0:1 --uidmap=1001:1000:64536
        • --gidmap=0:1:999 --gidmap=1000:0:1 --gidmap=1001:1000:64536
    • Or perhaps, make the host user share a group with ubuntu in the container, so no chowning is necessary.
    • A less satisfying alternative is to mount an external directory, chown the files to the ubuntu user at boot and chown to root at container shutdown.
    • Even less satisfying, but better than nothing, is to create a subdirectory on /tmp from which the host use can copy files to their own folder.
  • Create .desktop launcher and app indicator that shows warsaw is running, like pgadmin4 does.
  • Uninstall unnecessary packages (e.g. sshd, cron) during root/install.sh

About

Scripts to ease the installation of warsaw ✌️security✌️ module

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published