diff --git a/deepin-devicemanager-server/deepin-devicecontrol/org.deepin.devicecontrol.conf b/deepin-devicemanager-server/deepin-devicecontrol/org.deepin.devicecontrol.conf index b7c47402..c01ecbbc 100644 --- a/deepin-devicemanager-server/deepin-devicecontrol/org.deepin.devicecontrol.conf +++ b/deepin-devicemanager-server/deepin-devicecontrol/org.deepin.devicecontrol.conf @@ -9,16 +9,16 @@ This configuration implements method-level permission separation: - Default policy: DENY all access - - Only whitelisted read-only methods are allowed for all users - - Dangerous methods (aptUpdate, installDriver, disableInDevice, etc.) - require authentication via Polkit + - Only whitelisted methods (used by frontend) are allowed, but require Polkit auth + - Methods not used by frontend are NOT whitelisted (security by minimal exposure) IMPORTANT: When adding new DBus methods to this service: - 1. For read-only/query methods: Add them to the whitelist below - 2. For privileged/modify methods: Do NOT add to whitelist (require Polkit auth) - 3. Test both security scenarios before merging + 1. Verify the method is actually used by the frontend code + 2. Add only actively used methods to the whitelist below + 3. All whitelisted methods require Polkit authentication + 4. Unused methods remain unwhitelisted to reduce attack surface - Last updated: 2026-05-07 (VPLUS-2026-34718 security fix) + Last updated: 2026-05-09 (VPLUS-2026-34718 security fix - whitelist frontend methods only) --> @@ -30,7 +30,7 @@ - + + send_member="isNetworkWakeup"/> + + send_member="isDriverPackage"/> + + + send_member="enable"/> + send_member="enableKeyboard"/> + send_member="enablePrinter"/> + + send_member="setWakeupMachine"/> + send_member="setNetworkWake"/> + + + + + + + + + +