-
-
Notifications
You must be signed in to change notification settings - Fork 18
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Wayland security context #118
Comments
Hello @odomingao Yes, I looked in to in that in the past but it is not very simple to implement as it requires connecting to the wayland socket talking with the compositor using the wayland protocol. I am not aware if there is any simple CLI tool to create new wayland sockets with a given security context. |
From the corresponding firejail issues:
Relevant commits from recent integration into flatpak: flatpak/flatpak@f0e626a FelixPehla / run_with_wayland_security_context_v1: https://github.com/FelixPehla/run_with_wayland_security_context_v1 |
Keep in mind that screencapturing/-sharing specifically is often implemented via pipewire or portals, so only limiting permissions on the wayland socket is not enough in this case.
Kwin/KDE supports it too. Feel free to copy any parts of |
Thanks!
Are current portal implementations not secure, then? Can an app bypass the screensharing prompt and capture the screen anyway if it wants to? |
If the program is sandboxed by flatpak it can only access the portal interfaces it has permissions for. If access to portal (through DBus) is not restricted then it has access to everything, assuming the wayland compositor implements the functionality and makes it accessible to all clients. |
Highlighting the important part:
|
Hello. @rusty-snake, could you provide some guidance on how to get your project working on Hyprland, as they implemented the protocol in the most recent update? I apologize that this thread isn't the most suitable place to discuss this, but I couldn't find any way to reach you and I don't know how to create an issue on sr.ht if that's even possible. I get:
|
It's not from me, it's from @WhyNotHugo. Tickets/Mailing/Chat on the sourcehut repo seem to be disabled. |
@odomingao That error indicates that the compositor isn't exposing the |
Nothing is "disabled"; I'd just forgotten to put links in the README. Updated now. |
Thanks everyone. Just to give a quick update, I've been able to get this working quite easily now that Hyprland implements the protocol in a tagged release, using Hugo's way-secure. Step 1 create the socket (on compositor login)
Step 3 ensure that [wayland] is not enabled Will take sometime for me to fix all of my profiles accordingly, but so far it has worked perfectly for me. Will edit this postt if/when something breaks. |
Description
I learned that there's a wayland protocol that sandbox managers can implement to tell the compositor that the application being launched is sandboxed and therefore certain privileged protocols should be disabled inside of it, such as screencopy. Currently, this is implemented by sway and maybe (hopefully) Hyprland will decide to implement it as well.
Could this be supported by bubblejail in the future?
Thank you.
The text was updated successfully, but these errors were encountered: