Received: by 2002:a05:6a10:413:0:0:0:0 with SMTP id 19csp1047328pxp; Thu, 17 Mar 2022 01:23:35 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwWbNNZ1xUSFRQ/NHxPNDwrdrRF0HZYxWQF+quHFpffMeql2/N/UHGoMNgF6QtXg/qYt3Uo X-Received: by 2002:a17:906:c0c9:b0:6db:207:c41f with SMTP id bn9-20020a170906c0c900b006db0207c41fmr3358407ejb.292.1647505415276; Thu, 17 Mar 2022 01:23:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1647505415; cv=none; d=google.com; s=arc-20160816; b=BlIY/UEzWtK78AHSTFR2ECiZZ2HZNS1iiPH0Hs93Mz75dRNmpSHBBXyGhwp2xn3UAd 6K6WkECtuWVmL0fDFUevFy3MLoXmJ8cwEh3hoknMAexo96ooxbWCeOi+2WU8J2Xq66pu 9TLpRqyssgI2UPwUqSnvUquxZRywJRvukrPozbvG9Lp6++BkVXHpFlqYs8RLFDAYjfMH fpwwlhLJJgG+R9agY7s6pzhrWLp9cYStc8e7fl5l7qaPZ19vz58lEtEwgg2n+LECioyH /FCEZ05DabjYLU685pFWsCuvW/lR4sI57p3tlr5PnX2YB6K7THpe8tIC7Q3OGZKEpq38 rrZQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:reply-to:to:from:dkim-signature; bh=ycq4LbF1PWfJlrBd5yyUTj8qlI3BekPFuXr3a9iTEVg=; b=P0BmB4i+ShLnkJ6gn9erKSiGhjnR0jEAwwm2LaXselKOV6ZXf7uN/SZwpboWQbQLOM XvzF08rp188UnwQT/zjzZTcb8YXWKG56MyGXvWm3y6oWw1iTe1BU9GPaf6qzoivg+ual dNI62hrIyZ5AWA0Hw+vrDhXf99ngttJeNKT1EFwuqeo9Y488ICcyk8+jZF/8BsW92iRd /sKJRdrn0yEGZjxCZU++MHDNcaWuXiBlrAnJiq+QP+SNYIDq5hIgv5MdIApXXHT3Fq6r BCuHzVQwuxDH856sspeujzc6g0IwqpdLjwy1kp1tTynjE5y6ZYprbbUnLpNff6U+iuL0 cVBw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@coker.com.au header.s=2008 header.b=hBonfPBx; spf=pass (google.com: domain of selinux-refpolicy-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=selinux-refpolicy-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=coker.com.au Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id y67-20020a50bb49000000b00418c2b5bd98si914867ede.122.2022.03.17.01.23.27; Thu, 17 Mar 2022 01:23:35 -0700 (PDT) Received-SPF: pass (google.com: domain of selinux-refpolicy-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@coker.com.au header.s=2008 header.b=hBonfPBx; spf=pass (google.com: domain of selinux-refpolicy-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=selinux-refpolicy-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=coker.com.au Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230173AbiCQH3q (ORCPT + 23 others); Thu, 17 Mar 2022 03:29:46 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60026 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230261AbiCQH3l (ORCPT ); Thu, 17 Mar 2022 03:29:41 -0400 Received: from smtp.sws.net.au (smtp.sws.net.au [IPv6:2a01:4f8:201:1e6::dada:cafe]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3064C2BEC for ; Thu, 17 Mar 2022 00:28:17 -0700 (PDT) Received: from xev.coker.com.au (localhost [127.0.0.1]) by smtp.sws.net.au (Postfix) with ESMTP id A8AADFD2A for ; Thu, 17 Mar 2022 18:28:14 +1100 (AEDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=coker.com.au; s=2008; t=1647502095; bh=ycq4LbF1PWfJlrBd5yyUTj8qlI3BekPFuXr3a9iTEVg=; l=1996; h=From:To:Reply-To:Subject:Date:From; b=hBonfPBxYEkpCcAOZ91fbbfMkz6SGCdx+GNpEV2npirVK9IAZWxwX06JGFD9YPc2I CUSpG2FwVyIvu+rj4qOpVINvdc089kGVMWew27B/gSUmbJJtLzg5U6W5AXJAfyQo4l MYaaH4EPUsxQBAjTRgpccMC17OQ5bpy5a8b9DPWg= Received: by xev.coker.com.au (Postfix, from userid 1001) id E8A55177B073; Thu, 17 Mar 2022 18:28:09 +1100 (AEDT) From: Russell Coker To: selinux-refpolicy@vger.kernel.org Reply-To: russell@coker.com.au Subject: restricting desktop applications Date: Thu, 17 Mar 2022 18:28:09 +1100 Message-ID: <3420831.cqPokZtkmC@xev> MIME-Version: 1.0 Content-Transfer-Encoding: 7Bit Content-Type: text/plain; charset="us-ascii" X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: selinux-refpolicy@vger.kernel.org The policy for desktop applications keeps getting larger and more complex and doesn't seem likely to do much good. We have the xdg-desktop-portal package which is described as: xdg-desktop-portal provides a portal frontend service for Flatpak, Snap, and possibly other desktop containment/sandboxing frameworks. This service is made available to the sandboxed application, and provides mediated D-Bus interfaces for file access, URI opening, printing and similar desktop integration features. . The implementation of these interfaces is expected to require user confirmation before responding to the sandboxed application's requests. For example, when the sandboxed application ask to open a file, the portal implementation will open an "Open" dialog outside the sandbox, and will only make the selected file available to the sandboxed app if that dialog is confirmed. . xdg-desktop-portal is designed to be desktop-agnostic, and uses a desktop-environment-specific GUI backend such as xdg-desktop-portal-gtk to provide its functionality. This application is used by Chromium so that the app can run in a sandboxed manner. I think it would make sense to have more applications run in a sandboxed manner and use xdg-desktop-portal for their access to files outside their own sandbox. This would give the security benefits we aim to get from the SE Linux application policy but with greater restrictions (applications can't access each other's files without the user explicitely allowing it) and also providing those benefits to users who don't use SE Linux. It would also be possible for the sandbox supporting launcher to have SE Linux integration and use different MCS categories for the different applications or something. What I would like to see is regular desktop apps get some of the separation that Android apps get. What do you think? -- My Main Blog http://etbe.coker.com.au/ My Documents Blog http://doc.coker.com.au/