(In reply to Steve Dodier-Lazaro from comment #11) > The distinction between exec/non-exec bits is pretty irrelevant until > sandboxing is fully deployed, to be honest. We cannot both provide security > *and* a good UX for locally installed apps and .desktop files on the Desktop > for now, so I'm tempted to go with good UX and revisit the decision later.
I disagree about “pretty irrelevant”. In a secure world you'd have complete W^X and thus would refuse to execute anything where the user has write access. But even doing that road, it looks logical (at least to me) to refuse to execute user stuff with no explicit execute permission. > > Some pseudo-code: > 1a. Make a safe-list of directories with all of PATH, > /usr/local/share/applications, /usr/share/applications, > ~/.local/share/applications/, ~/Desktop I don't think anything under $HOME should be really safe (even in $PATH). > 1b. Remove XDG_DOWNLOADS_DIR from the safe-list (to keep users who download > to Desktop a bit safer) It seems that browsers now also set some extended attributes on downloaded files, so it might be interesting to support that (but I don't have any pointer here). -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1327791 Title: Security warning about just created Xubuntu desktop shortcut To manage notifications about this bug go to: https://bugs.launchpad.net/thunar/+bug/1327791/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs