← Back to context

Comment by drtgh

4 days ago

Nowadays I think packages should turn to portable applications isolated within their own directories. Those directories would have an standard libraries directory that the application would use.

Latter, if desired, the system, could override those libraries with another ones (newer compatible or patched), more thinking is needed about this. The key, from the process point of view, would to limit the access of such process to their own directories and some very limited system only local services by default,

And to extend this permissions, each binary in such directory would need to be in companion of a permissions request file that would require the approbation from the user or the system defaults patterns (each distro would have a point of view I guess), in the aim of improve process isolation and system, drivers, services access permissions.

This would need also restructure the console philosophy, how can manage the processes, and so on, that would need a big restructuration.

I mean, anyway people is duplicating space with containers trying to isolate process, remark in trying.

I know this is unrealistic due the deep change it would suppose, so consider I'm just thinking out loud.

PS: If you answer it already exists with AppArmor, SELinux, etc, then you did not understood the root of the issue with such modules.

Honestly the first half of that is just describing NixOS

  • The second half is more or less Android. iOS isn't terribly different in that respect either.

    • Some basic permissions like Android, but the rest would need to be lower level, more like the configuration file of a firewall with intrusion detection system, let say, to use io_uring needing explicit permissions, the access to some memory regions, and so on.