Am 05.02.2017 um 05:16 schrieb Shridhar Daithankar: > On Saturday 4 February 2017 7:28:31 AM IST sivmu wrote: >> As long as the application has access to the xwayland instance, which is >> by default the case when xwayland is available, it can influence all >> other applications that still use the x-protcol. > > Just to understand, if there are two applications using xwayland, under a > wayland session, will they be still able to look at each other's resources? > > If the answer is no, the security is equivalent to the wayland applications, > since xwayland instance is essentially a sandbox? > Not sure what you mean with resources. this point is about the insecurity of the X Windows System architecture, which basically assumes that all applications are to be trusted. There is no build in security, therefore failing modern threat models completly. This explains it pretty well I guess: https://theinvisiblethings.blogspot.de/2011/04/linux-security-circus-on-gui-isolation.html All of that is equally true for x-wayland, which is just a modified xserver run alongside a wayland instance to allow x applications to run on wayland compositors like weston. >> >> Only the input/output of applications using only the wayland protocol >> are somewhat safe from this attack vector. >> To fully close this risk, full adaption of wayland in all applications >> is necessary, because then you no longer need any xserver. > > Again, if a wayland application and a xwayland application are running side- > by-side, the xwayland application cannot of peek into the resources of wayland > application right? > If I am not mistaken it does not matter if an application is run on xwayland od directly on wayland, in regards to what it can capture. All applications can see input/putput of all other applications using the X Server Protocol, no matter what they themselfs are using. You can test this by running xinput on a terminal like in the linked article explained. No matter where you run it, you can capture the input of x applications. You can however not capture the input of wayland applications (at least not that easily) So if you want to avoid that other applications can snoop e.g. on your terminal input where you enter your root password, you need to use one that can work directly on wayland. Termite is a great terminal that supports wayland. Btw. to fully prevent keyloggin on wayland, you need to do more, e.g. by sandboxing, since there are ways to work around the security of wayland where the default linux security model is weaker then that of the wayland architecture. More info here: https://www.reddit.com/r/linux/comments/23mj49/wayland_is_not_immune_to_keyloggers/ I hope I did not mess up that explaination, if I did someone please hit me.
Attachment:
signature.asc
Description: OpenPGP digital signature