this post was submitted on 20 Oct 2023
46 points (74.5% liked)

Linux

46819 readers
1136 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS
 
  • Are you using Flatpaks?
  • Are you trusting Flathub?
  • Do you bother about the sandboxing and security?
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 58 points 10 months ago* (last edited 10 months ago) (4 children)

I expect the Flatpak sandbox to protect my ~/ from getting cluttered by applications, not to protect me from any actually malicious software. The post's premise seems misguided.

[–] [email protected] 23 points 10 months ago* (last edited 10 months ago) (2 children)

YES. I don't understand this delusion people keep perpetuating. Flatpak has a MILD form of container sandboxing. For a real security sandbox we have Firejails or Bubble wrap.

Flatpak is, at it's core, a software development and distribution packaging format. NOT a security implementation.

[–] [email protected] 16 points 10 months ago* (last edited 9 months ago) (1 children)

[This comment has been deleted by an automated system]

[–] [email protected] 2 points 10 months ago* (last edited 10 months ago) (1 children)

I always check my flatpak settings post install before running the app and adjust permissions according to need. I mean it does offer more security to me since it's user installed, I can granularly update permissions and control more or less where and what is can touch.

Alternatives to this are SELinux,AppArmour and firejails which are slightly more inconvenient to use.

To me that is mostly secure,or secure enough.

Well and then there's some immutable distros which might help overall.

Edit: paragraphs

[–] [email protected] 3 points 10 months ago* (last edited 9 months ago)

[This comment has been deleted by an automated system]

[–] [email protected] 4 points 10 months ago (1 children)

If we admit that then an app store where anyone can create an account and upload software becomes extremely problematic. This is especially true wherein clients autoupgrade very quickly.

Step one. Legit package a popular app Step two. Wait for substantial uptake Step three. Mix in some ad or malware and watch a tens of thousands get instantly owned.

[–] [email protected] 3 points 10 months ago (1 children)

Anybody can become a community packager for Debian, Fedora, etc.

[–] [email protected] 1 points 10 months ago (1 children)

Anyone can't become a packager in 30 seconds in an automated process that they can' t repeat the 47th time they transmit malware.

[–] [email protected] 2 points 10 months ago

The process is identical.

You show up with a package. It gets a basic review. You are granted commit access to your package. You can push changes.

There is slightly more oversight in that another mentor often also has commit access but they can’t and don’t review everything.

[–] [email protected] 6 points 10 months ago

Yeah, Flatpak was never meant to be a security mechanism. It is a convenient way to add security to userland though.

[–] [email protected] 1 points 10 months ago* (last edited 10 months ago) (1 children)

In addition to own new code, bundled copies of libraries in packages introduces net new attack surface which isn't patched via the regular distribution security patch process. The image decoding lib that allows remote code execution now exists in flatpaks independently from the one in /lib. Every flatpak vendor that contains it has to build and ship their own patched version of it. This is even more valid for any other libraries flatpaks include that don't exist on the system. The most widely used Linux OSes come with security patching processes, expectations and sometimes guarantees. This new attack surface breaks those and the solution is security sandboxing. This approach has been proven in mobile app packaging and distribution systems. Android is a great example where apps are not trusted by default and vulnerable ones rarely cause collateral damage on otherwise up-to-date Android systems. This is an objective problem with the out-of-band distribution model allowed by flatpak and snap or any similar system, whether you care about it or not personally. It's a well understood tradeoff in software development. It has to be addressed as adoption grows or we risk reducing Linux security to the levels of Windows where apps regularly bundle dependencies with no sandboxing whatsoever.

[–] [email protected] 4 points 10 months ago (1 children)

Every Flatpak vendor

So who's that? Flathub and Fedora, the latter of who automate the Flatpak builds from distro packages anyway.

If you're using a smaller distro which is not backed by a huge security team then this is probably an advantage of using Flatpak, not a negative.

[–] [email protected] 1 points 10 months ago (2 children)

Can the Fedora Flatpaks be browsed and downloaded for other distros?

[–] [email protected] 2 points 10 months ago

Yes. All Flatpak apps can be used on any distro.

I'm using the Fedora Flatpak Firefox on Debian, because Fedora's Flatpak runtime supports Kerberos authentication, the Flathub runtime doesn't.

[–] [email protected] 1 points 10 months ago

All Flatpaks are portable. There is no reason to use their repo usually though as Flathub often has more up to date, featureful, or upstream maintained versions instead.