UBO (Firefox) and Sandboxie

Can anyone please tell me how to allow uBlock Origin to write/save changes to its filters through Sandboxie, when using Firefox.  I'm running the browser sandboxed, make my selections of items to block (using the Element Zapper tool), but of course when closing the sandbox those selections are gone.  I'd like to be able to make permanent changes...I had this ability using Adblock Plus, have switched to UBO, and definitely would like the same functionality.

Thank you!

  • Hi IntermediateUser,

    Have a look at the direct access options:
    Resource Access - File

    Using that, you can allow desired files/locations to bypass the sandbox. 

    Regards,

  • In reply to Barb@Sophos:

    Thank you for the reply.  Could you please tell me if this looks correct, as it doesn't seem to be working?  Several files within the folder are written/saved when blocking an item (un-sandboxed), so I would like to allow direct access to the entire folder from within the sandbox:

    %AppData%\Roaming\Mozilla\Firefox\Profiles\six9ka6u.default\storage\default\moz-extension+++8ab9d639-e869-423e-8316-d5f2984c5044^userContextId=4294967295

    This is in the Sandbox settings UI, under Resource Access-->File Access-->Direct Access.  Do I need to make a separate line for each file written, or create an * wildcard, or modify the .ini, or ???

    Thank you again.

  • In reply to IntermediateUser:

    Hi IntermediateUser,

    Here are some examples of OpenFilePath that contain wildcards, among other things:
    https://www.sandboxie.com/OpenFilePath

    Once you have identified the location you want to bypass, you need to add it to the direct access list. You can add the absolute path (if it doesn't change/have multiple targets), or a folder and use a wildcard. FYI %AppData% will direct you to Roaming already, so your location should be something like

    %AppData%\Mozilla\Firefox..... 

    Based on your last post, here's what I would do (remember that you are punching holes and bypassing the Sandbox when you do this, so continue at your own discretion) 
    %appdata%\Mozilla\Firefox\Profiles\six9ka6u.default\storage\default\*    

    That would allow everything under the "default" folder to be bypassed.  You want to make sure you have the right target before doing this.

    Regards,

  • In reply to Barb@Sophos:

    That seems to have done it.  The extension folder is now being updated when I block browser elements from within Sandboxie.  Thank you!

  • In reply to IntermediateUser:

    I would suggest using the following:

    %AppData%\Mozilla\Firefox\Profiles\six9ka6u.default\storage\default\moz-extension+++*\*

    Otherwise you allow the storage of data from websites (IndexedDB).