Skip to content

binder: Introduce server pre-authorization #12127

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Draft
wants to merge 26 commits into
base: master
Choose a base branch
from

Conversation

jdcormie
Copy link
Member

@jdcormie jdcormie commented Jun 3, 2025

Android users can be tricked into installing a malicious app with the same package name as a legitimate on-device server. That's why we don't send calls to a server until it has been authorized by an appropriate SecurityPolicy. But merely binding to an unauthorized server can enable "keep-alive" and "background activity launch" abuse, even if security policy ultimately causes the grpc connection to fail. Pre-authorization is especially important when the server's address is not fixed in advance but discovered by PackageManager lookup.

@kannanjgithub
Copy link
Contributor

I need to read up on what Binder Transport for Android is all about before I can review this PR. It will take a little while.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants