Is Ubuntu's Snap Packaging Really Secure?

The recent release of Ubuntu 16.04 LTS has brought a number of new features, one of which we covered was the inclusion of ZFS. Another feature that many people have been talking about is the Snap package format. But according to one of the developers of CoreOS, the Snap packages are not as safe as the claim.

What are Snap Packages?

Snap packages are inspired by containers. This new package format allows developers to issue updates for applications running on Ubuntu Long-Term-Support (LTS) releases. This gives users the option to run a stable operating system, but keep their applications updated. This is accomplished by including all of the application’s dependencies in the same package. This prevents the program from breaking when a dependency updates.

Another advantage of Snap packages is that the applications are isolated from the rest of the system. This means that if you change something with a Snap package, it will not affect the rest of the system. It also prevents other applications from accessing your private information, which makes it harder for hackers to get your data.

But Wait…

According to Matthew Garrett, Snap can’t quite deliver on the last promise. Garret works as a Linux kernel developer and security developer at CoreOS, so he should know what he’s talking about.

According to Garret, “Any Snap package you install is completely capable of copying all your private data to wherever it wants with very little difficulty.”

ZDnet reported:

“To prove his point, he built a proof-of-concept attack package in Snap, which first shows an “adorable” teddy bear and then logs keystrokes from Firefox and could be used to steal private SSH keys. The PoC actually injects a harmless command, but could be tweaked to include a cURL session to steal SSH keys.”

But wait a little more…

Is it really that Snap has security flaws? Apparently not so.

Garret himself said that this problem was caused by the X11 window system and did not affect mobile devices that use Mir. So, it is the flaw in X11 that does it. It’s not Snap itself.

how X11 trusts applications is a well-known security risk. Snap doesn’t change X11’s trust model, so the fact that applications can see what other applications are doing isn’t a weakness in the new package format, but rather X11’s.

Garrett is just actually trying to show that when Canonical is all praises for Snap and its security; Snap applications are not fully sandboxed. They are as risky as any other binaries.

Keeping the fact in mind that Ubuntu 16.04 still uses X11 display, and not Mir, downloadingย and installing Snap packages from unknown sources might be harmful. But that’s the case with any other packaging, isn’t it?

In related articles, you should check out how to use Snap packages in Ubuntu 16.04. And do let us know of your views on Snap and its security.

About the author
John Paul Wohlscheid

John Paul Wohlscheid

My name is John Paul Wohlscheid. I'm an aspiring mystery writer who loves to play with technology, especially Linux. You can catch up with me at: http://johnpaulwohlscheid.work/

Become a Better Linux User

With the FOSS Weekly Newsletter, you learn useful Linux tips, discover applications, explore new distros and stay updated with the latest from Linux world

It's FOSS

Great! Youโ€™ve successfully signed up.

Welcome back! You've successfully signed in.

You've successfully subscribed to It's FOSS.

Success! Check your email for magic link to sign-in.

Success! Your billing info has been updated.

Your billing was not updated.