Package: unbound
Version: 1.17.0-1
Severity: normal
Tags: patch

Dear Maintainer,

   * What led up to the situation?
I wanted to configure a static IPv6 address in unbound, but that is not
(always) available when booting the system. Therefor I enabled
ip-transparent in the server section.

   * What exactly did you do (or not do) that was effective (or
     ineffective)?

When I enabled 'ip-transparent: yes' in the server section, apparmor
blocked some capabilities when restarting unbound.

Jan 19 13:37:20 kernel: audit: type=1400 audit(1674131840.250:65): 
apparmor="DENIED" operation="capable" profile="unbound" pid=1072585 
comm="unbound" capability=13  capname="net_raw"
Jan 19 13:37:20 kernel: audit: type=1400 audit(1674131840.250:66): 
apparmor="DENIED" operation="capable" profile="unbound" pid=1072585 
comm="unbound" capability=12  capname="net_admin"


   * What outcome did you expect instead?

I would have expected that unbound would not be blocked by apparmor and
would be able to use the ip-transparent option without issue.


-- System Information:
Debian Release: bookworm/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 6.0.0-4-amd64 (SMP w/4 CPU threads; PREEMPT)
Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US:en
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages unbound depends on:
ii  adduser                    3.130
ii  init-system-helpers        1.65.2
ii  libc6                      2.36-8
ii  libevent-2.1-7             2.1.12-stable-5+b1
ii  libnghttp2-14              1.51.0-1
ii  libprotobuf-c1             1.4.1-1+b1
ii  libpython3.10              3.10.9-1
ii  libssl3                    3.0.7-1
ii  libsystemd0                252.4-1
ii  lsb-base                   11.5
ii  sysvinit-utils [lsb-base]  3.06-2

Versions of packages unbound recommends:
ii  dns-root-data  2023010101

Versions of packages unbound suggests:
ii  apparmor  3.0.8-1
ii  openssl   3.0.7-1

-- no debconf information

Content-Type: multipart/mixed; boundary="===============4881449298252092416=="
MIME-Version: 1.0
From: TigerP <debian-tig...@tigerp.net>
To: Debian Bug Tracking System <sub...@bugs.debian.org>
Subject: ip-transparent: yes is blocked by apparmor
Bcc: TigerP <debian-tig...@tigerp.net>
Message-ID: 
<167413411988.1072823.1845641849211757387.report...@melaine.andor.aybara.org>
X-Mailer: reportbug 11.6.0
Date: Thu, 19 Jan 2023 14:15:19 +0100

This is a multi-part MIME message sent by reportbug.


--===============4881449298252092416==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

Package: unbound
Version: 1.17.0-1
Severity: normal
Tags: patch

Dear Maintainer,

   * What led up to the situation?
I wanted to configure a static IPv6 address in unbound, but that is not 
(always) available when booting the system. Therefor I enabled ip-transparent 
in the server section.

   * What exactly did you do (or not do) that was effective (or
     ineffective)?

When I enabled 'ip-transparent: yes' in the server section, apparmor blocked 
some capabilities when restarting unbound.

Jan 19 13:37:20 kernel: audit: type=1400 audit(1674131840.250:65): 
apparmor="DENIED" operation="capable" profile="unbound" pid=1072585 
comm="unbound" capability=13  capname="net_raw"
Jan 19 13:37:20 kernel: audit: type=1400 audit(1674131840.250:66): 
apparmor="DENIED" operation="capable" profile="unbound" pid=1072585 
comm="unbound" capability=12  capname="net_admin"


   * What outcome did you expect instead?

I would have expected that unbound would not be blocked by apparmor and would 
be able to use the ip-transparent option without issue.


-- System Information:
Debian Release: bookworm/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 6.0.0-4-amd64 (SMP w/4 CPU threads; PREEMPT)
Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US:en
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages unbound depends on:
ii  adduser                    3.130
ii  init-system-helpers        1.65.2
ii  libc6                      2.36-8
ii  libevent-2.1-7             2.1.12-stable-5+b1
ii  libnghttp2-14              1.51.0-1
ii  libprotobuf-c1             1.4.1-1+b1
ii  libpython3.10              3.10.9-1
ii  libssl3                    3.0.7-1
ii  libsystemd0                252.4-1
ii  lsb-base                   11.5
ii  sysvinit-utils [lsb-base]  3.06-2

Versions of packages unbound recommends:
ii  dns-root-data  2023010101

Versions of packages unbound suggests:
ii  apparmor  3.0.8-1
ii  openssl   3.0.7-1

-- no debconf information

--===============4881449298252092416==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment; 
filename="unbound_apparmor_ip-transparancy.patch"

--- usr.sbin.unbound.orig       2023-01-19 14:12:38.624603236 +0100
+++ usr.sbin.unbound    2023-01-19 14:13:55.721989871 +0100
@@ -21,6 +21,9 @@
   capability setuid,
   capability sys_chroot,
   capability sys_resource,
+  # Added for ip-transparancy option
+  capability net_raw,
+  capability net_admin,
 
   # root hints from dns-data-root
   /usr/share/dns/root.* r,

--===============4881449298252092416==--

Reply via email to