Re: Fedora development of Snap packages

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, 2016-06-15 at 10:54 +0200, Michael Stahl wrote:
> On 15.06.2016 08:24, Florian Weimer wrote:
> > 
> > On 06/15/2016 06:27 AM, Andrew Lutomirski wrote:
> > > 
> > > On Tue, Jun 14, 2016 at 9:07 PM, Florian Weimer <fweimer@redhat.c
> > > om> wrote:
> > > > 
> > > > On 06/15/2016 04:11 AM, Andrew Lutomirski wrote:
> > > > 
> > > > > 
> > > > > I *strongly* disagree here.  The xdg-app folks seem to be
> > > > > doing a
> > > > > pretty good job with their sandbox.  The kernel attack
> > > > > surface is
> > > > > reduced considerably, as is the attack surface against the
> > > > > user via
> > > > > ptrace and filesystem access.  If Wayland is available (which
> > > > > is
> > > > > should be!) then so is the attack surface against X.
> > > > 
> > > > What about the direct access to DRI device nodes?  Why isn't
> > > > this a problem
> > > > that reduces the effectiveness of the sandbox considerably?
> > > It's certainly a meaningful attack surface.  That being said, if
> > > it
> > > works well, it should be about as dangerous as Chromium's render
> > > sandbox, and the latter seems to work fairly well in
> > > practice.  I'm
> > > assuming that xdg-app grants access to render nodes, not to the
> > > legacy
> > > node.
> > I'm not sure what kind of sandboxing there is.  I was just able to
> > open 
> > ~/.ssh/id_rsa from a Flatpak application, and change
> > ~/.bash_profile 
> > (both outside the sandbox, obviously).
> > 
> > I couldn't find any relevant device nodes in the file system
> > namespace.
> currently Flatpak doesn't have sandboxing enabled by default, since
> substantial parts of the implementation of interfaces that allow the
> applications to access resources outside the sandbox in a secure way
> ("Portals") are missing.
> 
> the design of the sandbox is documented here:
> 
> https://github.com/flatpak/flatpak/wiki/Sandbox
> 
> article about a sandboxed application (which doesn't need Portals):
> 
> https://blogs.gnome.org/alexl/2015/02/17/first-fully-sandboxed-linux-
> desktop-app/
I'll just note that making proper portals from a sandboxed environment,
so that they are both secure & don't hinder application functionality.

I've hit this in a negative way on an Ubuntu Touch running tablet -
they also use sandboxing for apps there, but apparently the open-file
portal can only handle a single file at a time. This basically breaks
any app that needs to work with many files at once - for example
viewing images from a uSD card you just inserted in an image viewer
application - you would have to open the images one at a time...

I'm sure this is something Flatpack can handle in a better way. :)
> 
> --
> devel mailing list
> devel@xxxxxxxxxxxxxxxxxxxxxxx
> https://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject
> .org
--
devel mailing list
devel@xxxxxxxxxxxxxxxxxxxxxxx
https://lists.fedoraproject.org/admin/lists/devel@xxxxxxxxxxxxxxxxxxxxxxx




[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]
  Powered by Linux