<div dir="ltr"><div dir="ltr">On Fri, 28 Feb 2020 at 20:33, Winnie Poon <<a href="mailto:winniepoon_home@hotmail.com">winniepoon_home@hotmail.com</a>> wrote:<br></div><div class="gmail_quote"><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
<div dir="ltr">
<div style="font-family:Calibri,Helvetica,sans-serif;font-size:12pt;color:rgb(0,0,0)">
Hi all,</div>
<div style="font-family:Calibri,Helvetica,sans-serif;font-size:12pt;color:rgb(0,0,0)">
<br>
</div>
<div style="font-family:Calibri,Helvetica,sans-serif;font-size:12pt;color:rgb(0,0,0)">
i must be missing something so please help to clear my confusion.</div>
<div style="font-family:Calibri,Helvetica,sans-serif;font-size:12pt;color:rgb(0,0,0)">
<br>
</div>
<div style="font-family:Calibri,Helvetica,sans-serif;font-size:12pt;color:rgb(0,0,0)">
What's the point of packaging an app as flatpak app with restricted permissions, when users can easily open up any permissions by doing :<br>
<br>
flatpak run --filesystem=host ....<br>
<br>
or use override to permanently override an app's permissions.</div>
<div style="font-family:Calibri,Helvetica,sans-serif;font-size:12pt;color:rgb(0,0,0)">
<br></div></div></blockquote><div><br></div><div>That's the *user's prerogative*. In other words: the user must consent to opening up the sandbox on their own system, for a specific application.</div><div><br></div><div>Additionally, the override isn't really permanent, and can be revoked at any time by the user themselves.<br></div><div> </div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div dir="ltr"><div style="font-family:Calibri,Helvetica,sans-serif;font-size:12pt;color:rgb(0,0,0)">
</div>
<div style="font-family:Calibri,Helvetica,sans-serif;font-size:12pt;color:rgb(0,0,0)">
So we package an app in a nice bubble wrap, give it to user and user can remove the whole bubble wrap? or can the user?</div>
<div style="font-family:Calibri,Helvetica,sans-serif;font-size:12pt;color:rgb(0,0,0)">
<br></div></div></blockquote><div><br></div><div>No, the application will still run into a separate user namespace and a file system sandbox for its own run time, but the rules for accessing resources—like user files, network interfaces, or IPC methods—can be relaxed at the user's request.<br></div><div> </div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div dir="ltr"><div style="font-family:Calibri,Helvetica,sans-serif;font-size:12pt;color:rgb(0,0,0)">
</div>
<div style="font-family:Calibri,Helvetica,sans-serif;font-size:12pt;color:rgb(0,0,0)">
For snap, seems like they have something called a "developer mode", does flatpak has something like that so a "regular" user cannot easily override the permissions?<br></div></div></blockquote><div><br></div><div>That's really not what Snap's "developer mode" is… <br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div dir="ltr"><div style="font-family:Calibri,Helvetica,sans-serif;font-size:12pt;color:rgb(0,0,0)">
</div>
<div style="font-family:Calibri,Helvetica,sans-serif;font-size:12pt;color:rgb(0,0,0)">
<pre>--------------------------<br>Developer mode<br>Sometimes it is helpful when developing a snap to not have to worry about the security sandbox in order to <br>focus on developing the snap. To support this, snappy allows installing the snap in developer mode <br>which puts the security policy in complain mode (where violations against security policy are logged, <br>but permitted). <br>For example:<span></span>sudo snap install --devmode <snap></pre>
-------------------------------------------<br>
</div>
<div style="font-family:Calibri,Helvetica,sans-serif;font-size:12pt;color:rgb(0,0,0)">
<br></div></div></blockquote><div><br></div><div>If the restrictions are lifted and replaced with a logged version, then the sandbox is, effectively, removed. Additionally, Snap's sandbox is different from Flatpak's, being based on a Linux kernel security module that restricts access to the kernel's interfaces.<br></div><div><br></div><div>In any case, it would be more helpful if you explained us what are you trying to achieve. Why are you worried about users lifting the sandbox restrictions on their own systems?<br></div><div><br></div><div>Ciao,</div><div> Emmanuele.</div><div><br></div></div>-- <br><div dir="ltr" class="gmail_signature"><a href="https://www.bassi.io" target="_blank">https://www.bassi.io</a><br>[@] ebassi [@<a href="http://gmail.com" target="_blank">gmail.com</a>]</div></div>