On 30/06/2021 14:30, Michael Catanzaro wrote:
Well that's required for anything not present in the runtime.

That's why I prefer classic RPM packages over Flatpaks.

I use Flatpaks only for proprietary software like Steam (with a lot of permission hardening overrides).

I believe hardening flags are added in by flatpak-builder. I think they somehow come from the runtime, though I'm not sure exactly how. (Anybody know?)

Yes, but some developers think they are smarter than runtime maintainers and explicitly explicitly ignore them. I've previously reported such incidents.

However, for most Fedora editions, it's also irrelevant, because RPMs are 
entirely unsandboxed and banning poorly-sandboxed flatpak applications doesn't 
make sense when you can just install completely unsandboxed RPM applications.

Flatpak is being advertised as a safe and secure environment for running desktop applications.

Flatpak with access to user's home directory can do everything: change Flatpak policies, add/remove Flatpak repositories, override security permissions, etc.

I think Flatpaks with --filesystem=host or --filesystem=home should be banned too. Flathub admins don't consider this a security breach.

--
Sincerely,
  Vitaly Zaitsev (vit...@easycoding.org)
_______________________________________________
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure

Reply via email to