Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow privileged snaps to access sensitive protocols #201

Open
Saviq opened this issue Sep 20, 2024 · 2 comments
Open

Allow privileged snaps to access sensitive protocols #201

Saviq opened this issue Sep 20, 2024 · 2 comments
Labels
enhancement New feature or request triaged Triage into JIRA to plan it in

Comments

@Saviq
Copy link
Collaborator

Saviq commented Sep 20, 2024

There are valid reasons to allow external snaps to e.g. capture screenshots, or provide input methods.

It's currently only possible to globally enable those protocols, opening up for attacks.

We need a way to allow privileged (e.g. through snap interface connections) snaps to access those, and for the device operator to decide.

Applying apparmor labels is what we always thought can be the mediation layer here.

@Saviq Saviq added enhancement New feature or request triaged Triage into JIRA to plan it in labels Sep 20, 2024
@AlanGriffiths
Copy link
Contributor

One thing we've talked about in the past is sourcing the auth_model content from a configuration file managed by a snap option.

@Saviq
Copy link
Collaborator Author

Saviq commented Sep 20, 2024

One thing we've talked about in the past is sourcing the auth_model content from a configuration file managed by a snap option.

IMO we should try and focus on snap interfaces, that gives a more integrated story (e.g. autoconnections, brand/dedicated store assertions).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request triaged Triage into JIRA to plan it in
Projects
None yet
Development

No branches or pull requests

2 participants