Reduce kernel attack surface with stricter system call filter #36
Notifications
Due Date
No due date set.
Depends on
Reference: rosa/hakurei#36
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
The current system call filter is kept compatible with Flatpak, with sections made configurable. This is a block list, which is considered fundamentally less secure than an allow list. Additionally, it opens up a great amount of attack surface and fails to block many obviously dubious kernel APIs that are generally never used by desktop applications. This is remedied by various project-specific extensions to the filter, made configurable at runtime.
Current plans are to introduce additional filter sections as need for them arise, and transition to an allow list in the long term, with a configuration option to fall back to Flatpak-compatible filter sections. This ticket aims to keep track of progress regarding allowed system calls, and the compatibility test suite.