Circumventing Ubuntu Snap confinement
Apr. 21st, 2016 06:31 pm![[personal profile]](https://www.dreamwidth.org/img/silk/identity/user.png)
Ubuntu 16.04 was released today, with one of the highlights being the new Snap package format. Snaps are intended to make it easier to distribute applications for Ubuntu - they include their dependencies rather than relying on the archive, they can be updated on a schedule that's separate from the distribution itself and they're confined by a strong security policy that makes it impossible for an app to steal your data.
At least, that's what Canonical assert. It's true in a sense - if you're using Snap packages on Mir (ie, Ubuntu mobile) then there's a genuine improvement in security. But if you're using X11 (ie, Ubuntu desktop) it's horribly, awfully misleading. Any Snap package you install is completely capable of copying all your private data to wherever it wants with very little difficulty.
The problem here is the X11 windowing system. X has no real concept of different levels of application trust. Any application can register to receive keystrokes from any other application. Any application can inject fake key events into the input stream. An application that is otherwise confined by strong security policies can simply type into another window. An application that has no access to any of your private data can wait until your session is idle, open an unconfined terminal and then use curl to send your data to a remote site. As long as Ubuntu desktop still uses X11, the Snap format provides you with very little meaningful security. Mir and Wayland both fix this, which is why Wayland is a prerequisite for the sandboxed xdg-app design.
I've produced a quick proof of concept of this. Grab XEvilTeddy from git, install Snapcraft (it's in 16.04), snapcraft snap, sudo snap install xevilteddy*.snap, /snap/bin/xevilteddy.xteddy . An adorable teddy bear! How cute. Now open Firefox and start typing, then check back in your terminal window. Oh no! All my secrets. Open another terminal window and give it focus. Oh no! An injected command that could instead have been a curl session that uploaded your private SSH keys to somewhere that's not going to respect your privacy.
The Snap format provides a lot of underlying technology that is a great step towards being able to protect systems against untrustworthy third-party applications, and once Ubuntu shifts to using Mir by default it'll be much better than the status quo. But right now the protections it provides are easily circumvented, and it's disingenuous to claim that it currently gives desktop users any real security.
At least, that's what Canonical assert. It's true in a sense - if you're using Snap packages on Mir (ie, Ubuntu mobile) then there's a genuine improvement in security. But if you're using X11 (ie, Ubuntu desktop) it's horribly, awfully misleading. Any Snap package you install is completely capable of copying all your private data to wherever it wants with very little difficulty.
The problem here is the X11 windowing system. X has no real concept of different levels of application trust. Any application can register to receive keystrokes from any other application. Any application can inject fake key events into the input stream. An application that is otherwise confined by strong security policies can simply type into another window. An application that has no access to any of your private data can wait until your session is idle, open an unconfined terminal and then use curl to send your data to a remote site. As long as Ubuntu desktop still uses X11, the Snap format provides you with very little meaningful security. Mir and Wayland both fix this, which is why Wayland is a prerequisite for the sandboxed xdg-app design.
I've produced a quick proof of concept of this. Grab XEvilTeddy from git, install Snapcraft (it's in 16.04), snapcraft snap, sudo snap install xevilteddy*.snap, /snap/bin/xevilteddy.xteddy . An adorable teddy bear! How cute. Now open Firefox and start typing, then check back in your terminal window. Oh no! All my secrets. Open another terminal window and give it focus. Oh no! An injected command that could instead have been a curl session that uploaded your private SSH keys to somewhere that's not going to respect your privacy.
The Snap format provides a lot of underlying technology that is a great step towards being able to protect systems against untrustworthy third-party applications, and once Ubuntu shifts to using Mir by default it'll be much better than the status quo. But right now the protections it provides are easily circumvented, and it's disingenuous to claim that it currently gives desktop users any real security.
no subject
Date: 2016-04-22 03:58 am (UTC)no subject
Date: 2016-04-22 04:06 am (UTC)no subject
Date: 2016-04-22 05:44 am (UTC)"Your snap has now been uploaded to the store, and is now undergoing an automated review. You'll be emailed when the review has completed, at which time you can visit the MyApps site and publish your snap!"
I suppose bypassed with
" Note that if you uploaded a new version for an already-published snap, your update will be automatically published."
no subject
Date: 2016-04-22 08:51 am (UTC)while all uploads are always automatically reviewed, the first publishing is a manual step to make sure you don't put something live by accident.
no subject
Date: 2016-04-24 07:55 am (UTC)no subject
Date: 2016-04-24 05:01 pm (UTC)no subject
Date: 2016-04-22 06:13 am (UTC)no subject
Date: 2016-04-22 11:51 am (UTC)no subject
Date: 2016-04-22 07:35 pm (UTC)wasted reading
Date: 2016-05-02 02:43 am (UTC)running click on x is no different. its merely a new format waiting for mir which will fix this old x problem. its also a wonderful concept i intend to implement with tcl scripts.
and im not even evil or teddy..
Re: wasted reading
Date: 2016-05-02 03:08 pm (UTC)What is new news is that canonical claims (linked under the word "claim" in this post) "snap applications are isolated from the rest of the system. Users can install a snap without having to worry whether it will have an impact on their other apps or their system". This is misleading. So thank you, Matthew, for bringing attention to this!
XSM
Date: 2016-04-22 04:42 am (UTC)no subject
Date: 2016-04-22 08:31 am (UTC)no subject
Date: 2016-04-22 11:35 am (UTC)no subject
Date: 2016-04-22 01:09 pm (UTC)no subject
Date: 2016-04-22 08:48 am (UTC)no subject
Date: 2016-04-22 09:08 am (UTC)(b) saying "X is secure" when you mean "The next release of X which will be out in six months (or two years, if you only consider LTS) will be secure" is not misleading?
no subject
Date: 2016-04-22 09:39 am (UTC)no subject
Date: 2016-04-22 10:30 am (UTC)xteddy: Cannot connect to X server :0
Any clues? Running fresh updated install of 16.04 on virtualbox.
no subject
Date: 2016-04-22 10:37 am (UTC)xteddy: malloc.c:2395: sysmalloc: Assertion `(old_top == initial_top (av) && old_size == 0) || ((unsigned long) (old_size) >= MINSIZE && prev_inuse (old_top) && ((unsigned long) old_end & (pagesize - 1)) == 0)' failed.
Aborted (core dumped)
The Horror!
Date: 2016-04-22 11:18 am (UTC)Y'know, unless snapd runs the equivalent of `xauth generate $DISPLAY . untrusted` before it runs the application itself.
Re: The Horror!
Date: 2016-04-22 01:52 pm (UTC)"The security mechanisms in snap packages allow us to open up the platform for much faster iteration across all of our flavours as snap applications are isolated from the rest of the system. Users can install a snap without having to worry whether it will have an impact on their other apps or their system."
Re: The Horror!
Date: 2016-04-24 05:24 am (UTC)Canonical never claimed the benchmark of or the highest level of security.
It doesn't matter if i win by 1 point or 100 points winning is still winning.
like wise even 1% more secure is still technically more secure.
Re: The Horror!
Date: 2016-04-24 03:12 pm (UTC)Does that marketing speak sound like Canonical is limiting their claim in any way?
Sure doesn't to me.
Re: The Horror!
Date: 2016-04-22 02:57 pm (UTC)The former can have backdoors, of course, but at least there is some kind of control. Because the packages are built from source code, backdoors can be identified, hopefully. The security level will be even better when reproducible builds are in place.
Snap and xdg-app seem to a way to distribute untrusted, maybe even proprietary, programs to otherwise free systems. No idea, why one would want that, but some of their security improvements are very good, e.g. sandboxing, no maintainer scripts...
Re: The Horror!
Date: 2016-04-23 12:44 am (UTC)There's nothing wrong with it. Its called democracy.
Re: The Horror!
Date: 2016-04-23 07:09 am (UTC)Re: The Horror!
Date: 2016-04-26 02:23 pm (UTC)bad system call
Date: 2016-04-22 01:54 pm (UTC)/snap/bin/xevilteddy.xteddy
I didn't see any teddy bear, instead it displayed an error message.
bad system call
I didn't see any keystroke information in the terminal after typing in firefox.
Re: bad system call
Date: 2016-04-22 02:01 pm (UTC)sudo apt-get install git
git clone https://github.com/mjg59/xevilteddy
cd xevilteddy/
sudo apt-get install snacraft
sudo apt-get install libxtst-dev
snapcraft snap
sudo snap install xevilteddy_0.1*.snap
/snap/bin/xevilteddy.xteddy
no subject
Date: 2016-04-22 07:52 pm (UTC)There once was a B2 X, if memory serves...
Date: 2016-04-23 11:27 am (UTC)The category stuff would work well with SELinux, and I'd use it today if I could. The levels (Secret, Top Secret, etc) less so.
--dave collier-brown
davecb@spamcop.net
no subject
Date: 2016-04-24 07:57 am (UTC)Extra security risk?
Date: 2016-05-07 04:41 pm (UTC)AppArmor / SELinux
Date: 2023-07-16 09:22 pm (UTC)Can we save the day combining Snap with AppArmor/SELinux?