freedomofpress / securedrop-client

a Qt-based GUI for SecureDrop journalists 📰🗞️
GNU Affero General Public License v3.0
41 stars 39 forks source link

Improve hardening of SecureDrop applications via Linux-native capabilities #1940

Open eloquence opened 3 years ago

eloquence commented 3 years ago

Identified as a medium severity finding in the December 2020 Workstation audit report (TOB-SDW-026), the auditors recommend hardening the applications to leverage Linux native isolation and sandboxing capabilities:

In the near term, we should enable to No new privileges flag to the applications we develop for the workstation: securedrop-client, securedrop-log and securedrop-export.

We can test for the presence these capabilities by inspecting /proc/<pid>/status and observing flag status, eg: No New Privs: 1, and then open a follow-up to track broader, more complete sandboxing, through the use of something like LXC, gVisor or other sandboxing frameworks.

[Original issue description by @emkll]

rocodes commented 7 months ago

backlog pruning: