A utility to run X11 (or just X) applications in a rudimentary sandbox ('sunaba' from Japanese) to limit access to your files and X11 events (especially keyboard input.) The 'sandbox' consists of:
- A separate local user account under which the X11 application will be run, restricting access to your user files (assuming appropriate permissions are in place)
- A separate X session created and rendered into a window within your running X display using
Xephyr
, preventing the sandboxed X application from snooping on X11 events in the parent X session & display
IMPORTANT: this does not guarantee access is prevented outside the sandbox user & display, but should be at least marginally safer.
This is based on a script by Milosz Galazka (see Internet Archive's Wayback Machine archive) and ported to OpenBSD.
For those using Xsunaba under OpenBSD, some X11 applications in ports utilize the pledge(2) & unveil(2) functions to further restrict access to the filesystem.
- OpenBSD
- X11 (preferably running xenodm(1))
- doas(1)
- Xephyr(1)
- xauth(1)
- openssl(1)
To install Xsunaba
, the manual page, create the xsunaba
user, and update your /etc/doas.conf
to allow your user to run applications in the sandbox without a password:
$ doas make install USER="$USER"
If you don't yet have an /etc/doas.conf
, one will be created for you, but you will need explicitly specify your username when running make install
as root
(replacing <username>
with your username):
# make install USER=<username>
Prefix your X11 application command with Xsunaba
, for example:
Xsunaba chrome --incognito &
Xsunaba firefox --private-window &
Note: Xsunaba
will automatically apply window geometry hacks to fit to the Xephyr
display for the following X11 applications: chrome
, and firefox
.
The following environment variables may be set to change Xsunaba
's behavior:
VERBOSE
: Set totrue
to show verbose output. Default:false
.XSUNABA_DISPLAY
: Set a custom display number (incl. leading colon) to startXephyr
displays at. Default::32
.XSUNABA_USER
: Set a username to run X11 application as. Default:xsunaba
.WIDTH
: Set a customXephyr
display width in pixels. Default:1024
.HEIGHT
: Set a customXephyr
display height in pixels. Default:768
.
If you would like your sandbox user to have a different username than xsunaba
or would like to create multiple sandbox users, you can create them
as follows (replacing <sandbox_user>
with your preferred sandbox username):
doas make install-user XSUNABA_USER=<sandbox_user>
doas make install-doas XSUNABA_USER=<sandbox_user> USER=$USER
You can then execute Xsunaba
with your custom sandbox user, for example (replacing <sandbox_user>
):
XSUNABA_USER=<sandbox_user> Xsunaba firefox --private-window &
#### Shared Files
If you want to share some files beween your user and the `xsunaba` user, it is suggested that you create a directory owned by the `xsunaba` user and grant group access to it to your user's group (generally the same as your user's name). It is best to only move specific files into and out of this shared directory as needed, not permanently store data in it, as any X11 application run using `Xsunaba` will have access to it.
*IMPORTANT:* This will weaken the security of your sandbox!
#### Audio
By default, X11 applications executed in the Xsunaba sandbox will not have access to play or record audio for privacy reasons. Per the ['Authentication' section in sndio(7)](https://man.openbsd.org/sndio#Authentication), one can copy their `~/.sndio/cookie` file to the `xsunaba` user to allow it to access [sndiod(8)](https://man.openbsd.org/sndiod) simultaneously:
doas -u xsunaba mkdir -p ~xsunaba/.sndio doas cp $HOME/.sndio/cookie ~xsunaba/.sndio/ doas chown xsunaba:xsunaba ~xsunaba/.sndio/cookie doas chmod 600 ~xsunaba/.sndio/cookie
The Makefile also provides an `install-sndio-cookie` target to automate this:
doas make install-sndio-cookie USER=$USER
*IMPORTANT:* If you have enabled audio recording in the OpenBSD kernel using [sysctl(8)](https://man.openbsd.org/sysctl) or [sysctl.conf(5)](https://man.openbsd.org/sysctl.conf) (`kern.audio.record=1`), applications run in the sandbox will be able to access your microphone.
## LICENSE
Released under the [MIT License](LICENSE) by permission.