[rfc][icedtea-web] Temporary permissions

Jiri Vanek jvanek at redhat.com
Mon Mar 24 16:18:08 UTC 2014


On 03/24/2014 04:55 PM, Andrew Azores wrote:
> Hi,
>
> This patch adds new menu items to the new popup menu where PolicyEditor can be launched. These new
> items make it possible to run the current applet sandboxed, but with some additional permissions
> added, without having to actually launch PolicyEditor and configure the permissions. These
> permissions are also temporary, as opposed to making a custom policy, which persists until you
> remove the policy.
>
> Right now the permission set defined is just the sum of the permissions PolicyEditor can grant via
> its checkboxes, and the two options added are No File Access and No Network Access, which are just
> that full set minus a few. I'd appreciate input on what other temporary permission options could be
> made available.

Only Sound
Only clipboard

  ? .. jsut ideas :)

Generally I would like to have combinations, which allows to me most of freedom, but protectme 
aginst gratest evils
  - fiel accees
  - network
  - system.exec and simialr calls (yaaaaaaah!!)

and ege sets of above
  - no fiel accees nor networl
  - network nor system exec
  - system.exec nor fileacces
  - non of those three

....
agian - jsut ideas....

>
> Anyone have ideas on making the popup menu disappear nicely, rather than adding a setVisible call on
> it to every action listener we have? And I suppose it should also be forced to disappear when the
> dialog is disposed as well. What's the best practice for that?

You can try lostfocus (it is actually window inside) or on MouseExited). Each have its pross and cons...



>
> Thanks,
>
> --
> Andrew A
>

This is extra cool :)
>
> temporary-permissions.patch
>
>
> diff --git a/netx/net/sourceforge/jnlp/resources/Messages.properties b/netx/net/sourceforge/jnlp/resources/Messages.properties
> --- a/netx/net/sourceforge/jnlp/resources/Messages.properties
> +++ b/netx/net/sourceforge/jnlp/resources/Messages.properties
> @@ -302,6 +302,8 @@ SAuthenticationPrompt=The {0} server at
>   SJNLPFileIsNotSigned=This application contains a digital signature in which the launching JNLP file is not signed.
>   SAppletTitle=Applet title: {0}
>   STrustedOnlyAttributeFailure=This application specifies Trusted-only as True in its Manifest. {0} and requests permission level: {1}. This is not allowed.
> +STempPermNoFile=No file access
> +STempPermNoNetwork=No network access
>
>   # Security - used for the More Information dialog
>   SBadKeyUsage=Resources contain entries whose signer certificate's KeyUsage extension doesn't allow code signing.
> diff --git a/netx/net/sourceforge/jnlp/security/Permissions.java b/netx/net/sourceforge/jnlp/security/Permissions.java
> new file mode 100644
> --- /dev/null
> +++ b/netx/net/sourceforge/jnlp/security/Permissions.java
> @@ -0,0 +1,24 @@
> +package net.sourceforge.jnlp.security;
> +
> +import java.awt.AWTPermission;
> +import java.io.FilePermission;
> +import java.net.SocketPermission;
> +import java.security.Permission;
> +import java.util.PropertyPermission;
> +
> +import javax.sound.sampled.AudioPermission;
> +
> +public class Permissions {
> +
> +    public static final Permission READ_LOCAL_FILES = new FilePermission("${user.home}${/}*", "read");
> +    public static final Permission WRITE_LOCAL_FILES = new FilePermission("${user.home}${/}*", "write");
> +    public static final Permission READ_TMP_FILES = new FilePermission("${java.io.tmpdir}${/}*", "read");
> +    public static final Permission WRITE_TMP_FILES = new FilePermission("${java.io.tmpdir}${/}*", "write");
> +    public static final Permission READ_PROPERTIES = new PropertyPermission("*", "read");
> +    public static final Permission WRITE_PROPERTIES = new PropertyPermission("*", "write");
> +    public static final Permission NETWORK_ACCESS = new SocketPermission("*", "listen,connect,accept,resolve");
> +    public static final Permission CLIPBOARD_ACCESS = new AWTPermission("accessClipboard");
> +    public static final Permission PRINT_DOCUMENTS = new RuntimePermission("queuePrintJob");
> +    public static final Permission PLAY_AUDIO = new AudioPermission("play");

Arent those already deffineded? I think I saw them.. or something really simialr. Cant it be reused?
> +
> +}
> diff --git a/netx/net/sourceforge/jnlp/security/SecurityDialog.java b/netx/net/sourceforge/jnlp/security/SecurityDialog.java
> --- a/netx/net/sourceforge/jnlp/security/SecurityDialog.java


snip
> +
> +        final JMenuItem noFileAccess = new JMenuItem(R("STempPermNoFile"));
> +        noFileAccess.addActionListener(new TemporaryPermissionsListener(
> +                Permissions.NETWORK_ACCESS, Permissions.READ_PROPERTIES, Permissions.WRITE_PROPERTIES,
> +                Permissions.CLIPBOARD_ACCESS, Permissions.PLAY_AUDIO, Permissions.PRINT_DOCUMENTS));
> +        policyMenu.add(noFileAccess);
> +
> +        final JMenuItem noNetworkAccess = new JMenuItem(R("STempPermNoNetwork"));
> +        noNetworkAccess.addActionListener(new TemporaryPermissionsListener(
> +                Permissions.READ_LOCAL_FILES, Permissions.WRITE_LOCAL_FILES,
> +                Permissions.READ_TMP_FILES, Permissions.WRITE_TMP_FILES,
> +                Permissions.READ_PROPERTIES, Permissions.WRITE_PROPERTIES,
> +                Permissions.CLIPBOARD_ACCESS, Permissions.PLAY_AUDIO, Permissions.PRINT_DOCUMENTS));
> +        policyMenu.add(noNetworkAccess);
> +
>           policyMenu.setSize(policyMenu.getMinimumSize());


Cant this be a bit more beter? I do not isnists, but imho tehre should be some Interface "privledge 
provider"
  With (now) two  implementations - Offline, NoFileAcces ...

What do you think? Maybe something like this would be doable also for the policies as they flew into 
ITW, isnt there somthing like that?


J.



More information about the distro-pkg-dev mailing list