-
Notifications
You must be signed in to change notification settings - Fork 570
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Wiki: Restrict D-Bus #3349
Comments
Looks very nice. :) |
Regarding Of course, this vulnerability is not exclusive to Notifications. It seems filtering by name is not sufficient for services which expose objects with different level of sensitivity over multiple bus names. This may be something to consider when extracting D-Bus filter rules from flatpak manifests. In theory, any Regarding |
The most names/interfaces have the same name only |
I don't think there is a one-to-one(-to-one) mapping between names, interfaces and object paths. For example, It is just a mess: bus names correspond to applications, not services, and an application can expose both privileged and non-privileged services (which is probably in itself a bad idea, but that's what we got). The closest we get to specifying a particular service is the interface, but you still get cookie-cutters like Object paths a weird, too. You would think The case you mention might be reasonably common, although looking through the session bus with QDBusViewer, more applications don't follow it than those which do. So I am unsure whether even something like |
@kris7t what about an own option for specifying allowed interfaces on a name, that is ignored if there is no
|
https://github.com/netblue30/firejail/wiki/Restrict-D-Bus
The text was updated successfully, but these errors were encountered: