From antoine at nagafix.co.uk Wed Mar 6 12:07:34 2024 From: antoine at nagafix.co.uk (Antoine Martin) Date: Wed, 6 Mar 2024 19:07:34 +0700 Subject: [winswitch] -nolisten local In-Reply-To: References: <0e632b76-7425-43bd-986f-4f85ac9e1cb8@nagafix.co.uk> Message-ID: <10193358-b53c-4421-8b0b-17b434079982@nagafix.co.uk> On 20/02/2024 23:49, Vin?cius dos Santos Oliveira wrote: > Em ter., 20 de fev. de 2024 ?s 05:28, Antoine Martin via shifter-users > escreveu: >> On 14/02/2024 23:30, Vin?cius dos Santos Oliveira via shifter-users wrote: >>> How to make xpra add -nolisten local to Xorg invocation? >> You can just add it to your Xvfb command line in /etc/xpra, see: >> https://github.com/Xpra-org/xpra/blob/a3a51067e61d710d1f63b48e4bbffa66ff71ab83/fs/etc/xpra/conf.d/55_server_x11.conf.in#L32-L41 > > Does xpra depend on the X11 abstract socket? No it does not. > If not, why have it on as > the default? Isn't it just the same as -nolisten tcp? Comparing "tcp" and "asbtract sockets" is quite strange. > I don't quite understand xpra's codebase. I tried to add -nolisten > local after these two lines to adjust the default: > > * https://github.com/Xpra-org/xpra/blob/05001bba3cd32b3ad9d24cccdac4f2911b0b26e3/xpra/scripts/config.py#L127 > * https://github.com/Xpra-org/xpra/blob/05001bba3cd32b3ad9d24cccdac4f2911b0b26e3/xpra/scripts/config.py#L147 > > However it doesn't work. Does it always use the files in /etc/xpra > that you mentioned? Why would you modify the source code instead of the configuration files? >> Incidentally, xpra v6 supports abstract sockets: >> https://github.com/Xpra-org/xpra/issues/4098 >> Which you can turn off with --bind=noabstract > > This is an extra abstract socket not related to X11 socket, right? Correct, these sockets are used by xpra itself. This is fully documented - no need to read any source code: https://github.com/Xpra-org/xpra/tree/master/docs/Network >> The default is to use peercred to filter connections. > > This won't work for Linux containers using unprivileged user > namespaces. For unprivileged user namespaces you can only use/map your > own UID so every container will have the same UID even if you're > trying to create containers isolated from each other. Unprivileged > user namespaces can't configure network stacks so you either disable > the network completely or every container shares the same network > namespace (and the same abstract UNIX socket addressing space). Yes, some container setups come with constraints and limitations. That is to be expected. > These container limitations can be partially overcome by SUID helpers > (e.g. newuidmap and slirp4netns). However it doesn't mean that > peercreds alone for this purpose are safe. Enabling abstract sockets > indiscriminately isn't safe. Users wishing to make use of the abstract > UNIX sockets can proceed to do so only after careful planning taking > the interactions of the system as a whole into consideration to make > sure the feature will be safe. No, we do not remove features simply because they may be misused in some context. If we did, there would be very little left. You've inadvertently made the case for abstract sockets. They allow for a different type of network connection, one that does not require a shared filesystem address, or a bind mount. This can actually be useful with containers. One would expect those who use containers for isolation to understand the implications and limitations of unprivileged user namespaces. Please add further comments to your (rejected) PR: https://github.com/Xpra-org/xpra/pull/4154 Cheers, Antoine > -- > Vin?cius dos Santos Oliveira > https://vinipsmaker.github.io/ From totaam at xpra.org Mon Mar 18 14:37:40 2024 From: totaam at xpra.org (Antoine Martin) Date: Mon, 18 Mar 2024 21:37:40 +0700 Subject: [winswitch] [ANNOUNCE] Xpra LTS 3.1.7 Message-ID: <76d9ffb8-05a5-4576-a089-4c7fab7a5f56@xpra.org> Hi, Here is one more "final" release from the old LTS branch due to the large number of major bug fixes. There are no MacOS builds for this branch, use 5.x instead. Updating is strongly recommended for those still using the 3.1.x LTS branch. For more details, please see: https://github.com/Xpra-org/xpra/releases/tag/v3.1.7 Downloads: https://github.com/Xpra-org/xpra/wiki/Download Cheers, Antoine From totaam at xpra.org Fri Mar 29 11:43:11 2024 From: totaam at xpra.org (Antoine Martin) Date: Fri, 29 Mar 2024 18:43:11 +0700 Subject: [winswitch] [ANNOUNCE] xpra-html5 v12 Message-ID: <593a9a94-27d0-4bca-89d7-ea31dd367843@xpra.org> Hi, This new release of the xpra-html5 client only contains a few fixes and some cleanups. There is no urgency to update if you were not affected. For more details, please see: https://github.com/Xpra-org/xpra-html5/releases/tag/v12 Cheers, Antoine