@paride: RE: aa-notify

aa-notify does not require the desktop-security-center snap. The
desktop-security-center snap is required for permissions prompting which
is a different feature, that is only available to snaps atm*.

aa-notify is after the fact updating of the profile similar to using aa-
logprof. It is tailing the log file looking for denials. Which it then
sends a desktop notification for. Clicking allow on the notification
should pop-up a password request, and if that is granted it will use the
same backend as aa-genprof/logprof to add the entry to the profile,
which is saved to disk and then the apparmor_parser is kicked off to
replace the profile by giving it the updated profile files.

This after the fact update, will live update a running
application/service however, unless the application/service may not try
to access the file in question again until it is restarted, eg. say it
tries to access a config file, and is denied so the service uses some
internal defaults and starts running. It won't try to access the config
file again until it is restarted, or at least told to reread its config.

Can I get some clarification on what you mean by temporary. It sounds to
me like the profile is never updated, and that openvpn never gets
permission to access the file. Am I correct or is there a window where
openvpn gets access.

When you click allow do you get a window pop-up that asks for your
password, to update the apparmor profile permissions?


* permissions prompting is similar to aa-notify on the surface, but it uses an 
entirely different mechanism. First instead of after the fact it happen before 
the request gets denied. The kernel suspends the application, and sends an 
upcall to the system snapd daemon. That daemon routes the message to the users 
session, where a desktop agent prompts the user, and sends the response back to 
the system snapd daemon which handles updating the snaps apparmor policy.

The desktop-security-center snap, provides the gui configuration
interface for the feature. It has the toggle that tells snapd to enable
permission prompting, and allows the user to delete the rules that they
have added (but not the base apparmor profile). In fact beyond the
desktop-security-center being required to enable the feature, it isn't
actually needed for the feature to function.

-- 
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gnome-control-center in Ubuntu.
https://bugs.launchpad.net/bugs/2098930

Title:
  openvpn profile doesn't allow access to files on home dir

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/2098930/+subscriptions


-- 
desktop-bugs mailing list
desktop-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/desktop-bugs

Reply via email to