LWN: Comments on "The status of Wayland security" https://lwn.net/Articles/589147/ This is a special feed containing comments posted to the individual LWN article titled "The status of Wayland security". en-us Tue, 07 Oct 2025 13:51:14 +0000 Tue, 07 Oct 2025 13:51:14 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net Audio security? https://lwn.net/Articles/590801/ https://lwn.net/Articles/590801/ eean <div class="FormattedComment"> I do have a two seat system, but I share one sound card/speakers so security isn't really an issue. Or at least I don't see how it is.<br> <p> --system for sure isn't a prereq for properly handling a normal multiseat setup where there's one sound card per seat (though I'm not sure if Linux is multiseat aware enough to do it in practice.) But ideally you would just have one pulseaudio process per sound card and it would just work.<br> <p> So what is your use case?<br> <p> <font class="QuotedText">&gt; On a tangent: Is there a plan for being able to securely mix *audio* from mutually mistrusting applications?</font><br> <p> Isn't this a separate question from having only one sound server/system? Or are you assuming processes of the same user trust each other? The equivalent to the Wayland issue described would be PulseAudio granting special permission to access the mic or be pavucontrol.<br> <p> <p> </div> Sat, 15 Mar 2014 07:46:18 +0000 Audio security? https://lwn.net/Articles/590659/ https://lwn.net/Articles/590659/ idupree <div class="FormattedComment"> On a tangent: Is there a plan for being able to securely mix *audio* from mutually mistrusting applications? PulseAudio and JACK both avow that securely mixing audio from multiple users is a non-goal:<br> <p> `pulseaudio --system`: <a href="http://www.freedesktop.org/wiki/Software/PulseAudio/Documentation/User/WhatIsWrongWithSystemWide/">http://www.freedesktop.org/wiki/Software/PulseAudio/Docum...</a><br> <p> JACK_PROMISCUOUS_SERVER: see e.g. <a href="https://wiki.archlinux.org/index.php/JACK_Audio_Connection_Kit#Jack_for_a_multi-user_system">https://wiki.archlinux.org/index.php/JACK_Audio_Connectio...</a><br> </div> Fri, 14 Mar 2014 04:39:07 +0000 The status of Wayland security https://lwn.net/Articles/590580/ https://lwn.net/Articles/590580/ nybble41 <div class="FormattedComment"> <font class="QuotedText">&gt; a screen locker needs no user input at all, it should only put pretty graphics on screen</font><br> <p> I suppose that would depend on what you mean by "screen locker". I would define the screen locker as the program responsible for authenticating the user and unlocking the screen. Regardless of whether that task is built into the same binary as the compositor or outsourced to a privileged helper program, the "screen saver" portion could be left to an unprivileged process with no access to user input. There may well be good reason--privilege separate, flexibility, customization--to separate the authentication part from the compositor. That doesn't mean the purely decorative portion of the lock screen stack needs to be similarly privileged.<br> </div> Thu, 13 Mar 2014 17:58:37 +0000 The status of Wayland security https://lwn.net/Articles/590577/ https://lwn.net/Articles/590577/ dgm <div class="FormattedComment"> In fact, I believe that for Wayland the best route will be exactly opposite: a screen locker needs no user input at all, it should only put pretty graphics on screen. Let the compositor lock the screen and ask for user input.<br> </div> Thu, 13 Mar 2014 17:14:18 +0000 The status of Wayland security https://lwn.net/Articles/590565/ https://lwn.net/Articles/590565/ raven667 <div class="FormattedComment"> I think the hair being split here is that the input security is a property that falls out as a consequence of switching to a private desktop (and that switching being robust) and is not a special property of the password-accepting application window and is not happening "in-band" of the users desktop.<br> <p> I think this approach to work around key loggers has merit but only so far as the OS commits to it, and the user can identify when they are being phished, any password dialogs which happen in-band of the users desktop reduce the effectiveness of this design, even in Windows the local users password is accepted in dialogs, when changing privileged settings for example, that doesn't require a SAK to initiate the dialog.<br> </div> Thu, 13 Mar 2014 16:29:29 +0000 The status of Wayland security https://lwn.net/Articles/590561/ https://lwn.net/Articles/590561/ tialaramex <div class="FormattedComment"> Hmm.<br> <p> Ctrl-Alt-Del is a SAK (Secure Attention Key)<br> <p> Linux implements a SAK but it is rarely used for anything relevant here<br> <p> However, the first thing that happens when you press the SAK in Windows is that it summons a separate desktop, and that means it captures all input. So I don't think Windows is behaving so differently as you think in this regard.<br> </div> Thu, 13 Mar 2014 15:58:57 +0000 The status of Wayland security https://lwn.net/Articles/590501/ https://lwn.net/Articles/590501/ SLi <div class="FormattedComment"> "Screen lockers need to capture all input" seems true only to the extent they are implemented in the same crappy way as they are currently in X.<br> <p> Treating a screen locker as "just another client" that just happens to capture all input is a hack that works to an extent as long as you don't want to do anything too unusual. It also opens surprising attack routes.<br> <p> In my opinion screen locking is perhaps the one thing that Windows does right. In a multi-user environment, the user needs to be able to be sure he's typing his password into a genuine login prompt, not something that merely resembles it. Windows solves this by using a keyboard shortcut that cannot be captured by (non-privileged) programs, namely ctrl-alt-del. After pressing ctrl-alt-del you can be absolutely sure you are talking to an admin-sanctioned part of the OS installation.<br> </div> Thu, 13 Mar 2014 10:31:17 +0000