Classic confinement request for cybertection-guardbot
Category:
Select “store-requests” → “classic-confinement”
Post body:
**Snap name:** cybertection-guardbot
**Publisher:** cybertection (cybertection@cybertection.net)
**Store link:** https://snapcraft.io/cybertection-guardbot
**Revision requesting classic:** 24 (version 21.0)
**Technical justification for classic confinement:**
Cybertection Guardbot is a VPN and antivirus security application that requires classic confinement for the following technical reasons:
1. **VPN Management with pkexec:** The application uses `pkexec` to execute `wg-quick` commands with elevated privileges to configure WireGuard VPN tunnels. Strict confinement blocks the PolicyKit D-Bus communication channel required for pkexec authentication dialogs to function.
2. **Network Interface Control:** The app needs to create and manage the `wg0` network interface via `wg-quick up/down` commands, which requires direct access to the host system’s networking stack and `/etc/wireguard/` configuration files. Strict confinement prevents this level of network control.
3. **System-level Security Monitoring:** The antivirus component needs to scan system files and processes across the entire filesystem, not just within the snap’s confined environment. This requires unrestricted filesystem access to detect malware in user directories and system paths.
**Why strict confinement won’t work:**
We attempted strict confinement with the `network-control` plug, but this is insufficient because:
- `pkexec` requires access to the host’s PolicyKit service over D-Bus
- WireGuard configuration requires write access to `/etc/wireguard/`
- Both are blocked even with `network-control` in strict mode
Version 21.0 (revision 24) has been submitted and is currently rejected pending this classic confinement approval.
Thank you for your consideration.