Hi Rodrigo, 

On Sat, 20 Jul 2024 16:34:47 +0200
Rodrigo Arias <[email protected]> wrote:

> >+   if (unveil("/home", "rwc") == -1) {  
> 
> We may want to constraint this a bit further, so a malicious actor 
> cannot read anything from /home/.config. Maybe only /home/.dillo and
> the downloads directory would be suitable?

Absolutely, that was my initial intention, but just wanted to keep the
example patch as simple as possible. There are a number of things in
$HOME which we probably don't want the browser having access to. 

> >+   if (pledge("stdio rpath wpath cpath inet unix dns tty proc
> >prot_exec",  
> 
> Does this work with plugins, when the dpid daemon is not running?, as
> I believe it has to fork and exec the dpid program. 

I started with a mindset of "whats the bare minimum of permissions we
can get away with". But its clear that we would need "exec" as well for
full functionality.

At some point I may try to submit an improved patch to the OpenBSD ports
maintainers. Unfortunately that won't do much for users of Linux and
other systems. 

-Alex
_______________________________________________
Dillo-dev mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to