[apparmor] [Bug 1609439] [NEW] Firefox profile has too much access

2016-08-03 Thread Vincas Dargis
Public bug reported: usr.bin.firefox in Kubuntu 16.04.1 profile has some fine grained rules defined concerning home directory, such as: owner @{HOME}/ r, ... owner @{HOME}/.{firefox,mozilla}/ rw, owner @{HOME}/.{firefox,mozilla}/** rw, owner @{HOME}/.{firefox,mozilla}/**/*.{db,parentloc

[apparmor] [Bug 1609439] Re: Firefox profile has too much access

2016-08-03 Thread Vincas Dargis
** Attachment added: "apparmor_parser_-p.txt" https://bugs.launchpad.net/apparmor-profiles/+bug/1609439/+attachment/4713228/+files/apparmor_parser_-p.txt -- You received this bug notification because you are a member of AppArmor Developers, which is subscribed to AppArmor Profiles. https://bu

[apparmor] [Bug 1609439] Re: Firefox profile has too much access

2016-08-05 Thread Vincas Dargis
explicit real = explicit read, sorry for typo. -- You received this bug notification because you are a member of AppArmor Developers, which is subscribed to AppArmor Profiles. https://bugs.launchpad.net/bugs/1609439 Title: Firefox profile has too much access Status in AppArmor Profiles: Ne

[apparmor] [Bug 1609439] Re: Firefox profile has too much access

2016-08-05 Thread Vincas Dargis
Thanks Simon, now I did some changes in "user-files": # Allow read to all files user has DAC access to and write access to all # files owned by the user in $HOME. @{HOME}/ r, #Changed by me, do not allow free access to whole home! #@{HOME}/** r, #owner @{HOME}/** w, # For uploading

[apparmor] Making AppArmor work with audit's ausearch

2016-11-27 Thread Vincas Dargis
Hi, Some (quite) time ago I've asked Audit developers about issue that ausearch fails to "grep" AppArmor events from audit log. For example, "ausearch -m AVC" does not return anything while "apparmor="DENIED"" messages are in the log. Actually, even "ausearch -m ALL" does not contain any AppArm

[apparmor] understanding apparmor_parser debug output

2017-03-31 Thread Vincas Dargis
Hi, I'm on Kubuntu 16.04 with Apparmor 2.10.95-0ubuntu2.6 and Linux 4.8.0-34-generic (HWE) usr.bin.skype profile has such lines: deny @{HOME}/.fontconfig/ w, deny @{HOME}/.fontconfig/*.cache-*.TMP* w, When I run: apparmor_parser -Q -d /etc/apparmor.d/usr.bin.skype These lines are print

Re: [apparmor] understanding apparmor_parser debug output

2017-03-31 Thread Vincas Dargis
2017.04.01 02:55, John Johansen rašė: The denied info is stored as a separate flag, and I would say it is a bug that debug is not outputing it. Should I report it in the Launchpad? Or it's good enough to get you noted here? Overall, I would say auditing profiles is far to hard at the moment

Re: [apparmor] understanding apparmor_parser debug output

2017-04-04 Thread Vincas Dargis
2017.04.04 00:50, Seth Arnold rašė: Hello Vincas, this is already in Launchpad, https://bugs.launchpad.net/apparmor/+bug/1675596 Thanks, subscribed! -- AppArmor mailing list AppArmor@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/apparmor

[apparmor] About 4.7 upstream kernel patches

2017-04-04 Thread Vincas Dargis
Hi, There is email about upstreaming AppArmor patches to 4.7 [0]. I discovered that Debian's 4.9 kernel still does not have network rules, and I can't find stuff from "basic networking rules" patch even in 4.11 [1]. So my question is, what's status of these patches, when they will be actually av

Re: [apparmor] About 4.7 upstream kernel patches

2017-04-05 Thread Vincas Dargis
2017.04.05 12:32, John Johansen rašė: hopefully 4.13 should have the core of the development changes, though it might not have everything the ubuntu kernel has. What exactly lands by then will depend on upstream feedback Does this includes network rules or not necessary..? My original question

[apparmor] [patch] Fix user-download abstraction for non-latin file names

2017-04-17 Thread Vincas Dargis
Hello, I have noticed that abstractions/user-download profile allows to download into home directory, while protecting dot files: owner @{HOME}/[a-zA-Z0-9]* rwl, Though it fails for files with non-latin symbols, tested with /usr/bin/tee copied to /usr/local/bin/testtee with minimal

[apparmor] [patch] Fix user-download abstraction for non-latin file names (take #2)

2017-06-07 Thread Vincas Dargis
Hello, Some time ago I've sent tiny patch [0], but received no comments. Maybe it got lost..? It had patch as attachment, maybe that's the problem? I am resubmitting original message with inline patch this time: --- I have noticed that abstractions/user-download profile allows to download int

[apparmor] [patch] update usr.sbin.traceroute profile for TCP mode

2017-06-11 Thread Vincas Dargis
Hi, Running `sudo traceroute -T 8.8.8.8` (with TCP SYN mode, root perms. are needed) on Ubuntu 17.04 will produce DENIED messages: type=AVC msg=audit(1497186803.543:335): apparmor="DENIED" operation="open" profile="/usr/{sbin/traceroute,bin/traceroute.db}" name="/proc/sys/net/ipv4/tcp_ecn" pi

Re: [apparmor] [patch] update usr.sbin.traceroute profile for TCP mode

2017-06-11 Thread Vincas Dargis
2017.06.11 16:45, Christian Boltz rašė: Is capability net_admin really needed (as in "traceroute breaks without it") or does it work without it? If so, a deny capability net_admin, rule might be an option. It does seems to work fine with `deny capability net_admin,`. With denies enabled, str

Re: [apparmor] [patch] update usr.sbin.traceroute profile for TCP mode

2017-06-15 Thread Vincas Dargis
2017.06.11 16:45, Christian Boltz rašė: If so, a deny capability net_admin, rule might be an option. Should I repost full patch with this deny added? -- AppArmor mailing list AppArmor@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/apparmor

Re: [apparmor] [patch] Fix user-download abstraction for non-latin file names (take #2)

2017-06-19 Thread Vincas Dargis
2017.06.19 14:56, intrigeri rašė: In my experience, merge requests on Launchpad work better than email wrt. tracking and not forgetting proposed changes in the AppArmor world. Thanks. Do you have quick link on how to get started with Launchpad merge requests? -- AppArmor mailing list AppArm

Re: [apparmor] [patch] Fix user-download abstraction for non-latin file names (take #2)

2017-06-22 Thread Vincas Dargis
2017.06.22 11:06, intrigeri rašė: https://wiki.debian.org/AppArmor/Contribute/Upstream Thanks, that's pretty good article! -- AppArmor mailing list AppArmor@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/apparmor

Re: [apparmor] [patch] Fix user-download abstraction for non-latin file names (take #2)

2017-06-24 Thread Vincas Dargis
2017.06.22 21:02, intrigeri rašė: Vincas Dargis: 2017.06.22 11:06, intrigeri rašė: https://wiki.debian.org/AppArmor/Contribute/Upstream Thanks, that's pretty good article! Indeed :) Kudos to Ulrike who produced all this doc during her outreachy project a couple years ago, and then s

[apparmor] [Merge] lp:~talkless/apparmor/fix_user_download_nonlatin into lp:apparmor

2017-06-24 Thread Vincas Dargis
Vincas Dargis has proposed merging lp:~talkless/apparmor/fix_user_download_nonlatin into lp:apparmor. Requested reviews: AppArmor Developers (apparmor-dev) For more details, see: https://code.launchpad.net/~talkless/apparmor/fix_user_download_nonlatin/+merge/326259 I have noticed that

[apparmor] [Merge] lp:~talkless/apparmor/fix_traceroute_tcp into lp:apparmor

2017-06-24 Thread Vincas Dargis
Vincas Dargis has proposed merging lp:~talkless/apparmor/fix_traceroute_tcp into lp:apparmor. Requested reviews: AppArmor Developers (apparmor-dev) For more details, see: https://code.launchpad.net/~talkless/apparmor/fix_traceroute_tcp/+merge/326260 Running `sudo traceroute -T 8.8.8.8` (with

Re: [apparmor] apparmor 2.x series kernel patches

2017-06-25 Thread Vincas Dargis
2017.06.25 10:52, John Johansen wrote: The apparmor 2.8 series out of tree kernel patches are now available in the bzr tree for the 4.11 and 4.12 kernels I see this commit: UBUNTU: SAUCE: AppArmor: basic networking rules Thank you very much! \o/ -- AppArmor mailing list AppArmor@lists.ubunt

Re: [apparmor] Bug#865206: apparmor: Should apparmor abstractions allow flatpak directories?

2017-07-01 Thread Vincas Dargis
2017.07.01 00:56, John Johansen wrote: For a tighter policy where enumerating other application etc is not allowed then we would want to block access. I don't think we can do that well with applications like firefox until support for delegation lands. Interesting, what is this mentioned "delega

Re: [apparmor] [Merge] lp:~talkless/apparmor/fix_user_download_nonlatin into lp:apparmor

2017-07-01 Thread Vincas Dargis
Yes in fact I just recently noticed same problem in user-write. Do I have to uncommit and force push these two changes (for user-download and user-write) in single commit? Or can I just add one more commit? -- https://code.launchpad.net/~talkless/apparmor/fix_user_download_nonlatin/+merge/32625

Re: [apparmor] Bug#865206: apparmor: Should apparmor abstractions allow flatpak directories?

2017-07-02 Thread Vincas Dargis
2017.07.02 02:41, John Johansen wrote: Delegation will allow an application to delegate some of its authority (permissions) to other confined task. So for example an external file picker could be used to allow the user to choose files, and then delegate that access to firefox, so that the firefo

[apparmor] [Merge] lp:~talkless/apparmor/fix_user_download_nonlatin into lp:apparmor

2017-07-02 Thread Vincas Dargis
The proposal to merge lp:~talkless/apparmor/fix_user_download_nonlatin into lp:apparmor has been updated. Description changed to: abstractions/user-download and abstractions/user-write profiles allows to download into home directory, while protecting dot files: owner @{HOME}/[a-zA-Z0-9]*

Re: [apparmor] [Merge] lp:~talkless/apparmor/fix_traceroute_tcp into lp:apparmor

2017-07-03 Thread Vincas Dargis
1. Done. 2. I have just reproduced it on: Ubuntu 17.04 and 17.10 (Alpha) on Virtual Box (Host is Kubuntu 16.04). Ubuntu 17.04 LiveCD on my physical machine. I, too, *cannot* reproduce it on Debian Sid for some unknown reason. strace shows failed calls on Ubuntu: setsockopt(4, SOL_SOCKET, SO_RCV

Re: [apparmor] [Merge] lp:~talkless/apparmor/fix_traceroute_tcp into lp:apparmor

2017-07-04 Thread Vincas Dargis
About net_admin: Christian Boltz suggested that [0]: > I'd like to avoid it" Abuout Debian/Ubuntu: > I suspect that traceroute does just the same on Debian *but* some AppArmor > mediation only supported in the Ubuntu kernel blocks it there. Maybe.. though `strace` does not show these calls on

Re: [apparmor] [Merge] lp:~talkless/apparmor/fix_traceroute_tcp into lp:apparmor

2017-07-04 Thread Vincas Dargis
I've sent message to traceroute-devel: https://sourceforge.net/p/traceroute/mailman/message/35927395/ -- https://code.launchpad.net/~talkless/apparmor/fix_traceroute_tcp/+merge/326260 Your team AppArmor Developers is requested to review the proposed merge of lp:~talkless/apparmor/fix_traceroute_t

Re: [apparmor] [Merge] lp:~talkless/apparmor/fix_traceroute_tcp into lp:apparmor

2017-07-06 Thread Vincas Dargis
Interestingly, traceroute developer does not recall [0] changing these values... Could it be Ubuntu-specific patch? [0] https://sourceforge.net/p/traceroute/mailman/message/35927818/ -- https://code.launchpad.net/~talkless/apparmor/fix_traceroute_tcp/+merge/326260 Your team AppArmor Developers i

Re: [apparmor] [Merge] lp:~talkless/apparmor/fix_traceroute_tcp into lp:apparmor

2017-07-11 Thread Vincas Dargis
I've registered Ubuntu traceroute issue: https://bugs.launchpad.net/ubuntu/+source/traceroute/+bug/1703649 -- https://code.launchpad.net/~talkless/apparmor/fix_traceroute_tcp/+merge/326260 Your team AppArmor Developers is requested to review the proposed merge of lp:~talkless/apparmor/fix_tracero

[apparmor] [Bug 1706870] [NEW] usr.bin.thunderbird denies on Debian

2017-07-27 Thread Vincas Dargis
Public bug reported: After update on Debian 8 Jessie usr.bin.thunderbird appeared, and now now I see some DENIED messages (same on Debian Unstable): type=AVC msg=audit(1501048134.907:8589): apparmor="DENIED" operation="file_mprotect" profile="thunderbird//lsb_release" name="/usr/bin/python2.7"

[apparmor] Request to merge two small merge requests

2017-08-09 Thread Vincas Dargis
Hi, Two merge requests are reviewed by intrigeri (thanks!) and could potentially be merged: https://code.launchpad.net/~talkless/apparmor/fix_traceroute_tcp/+merge/326260 https://code.launchpad.net/~talkless/apparmor/fix_user_download_nonlatin/+merge/326259 -- AppArmor mailing list AppArmor@

[apparmor] [Bug 1706870] Re: usr.bin.thunderbird denies on Debian

2017-09-03 Thread Vincas Dargis
Oh so it's another profile... This bug be reported for Thunderbird then? -- You received this bug notification because you are a member of AppArmor Developers, which is subscribed to AppArmor Profiles. https://bugs.launchpad.net/bugs/1706870 Title: usr.bin.thunderbird denies on Debian Status

[apparmor] [Bug 1117804] Re: ausearch doesn't show AppArmor denial messages

2017-09-03 Thread Vincas Dargis
IMHO we have to ask John Johansen about this, he's working on kernel side. -- You received this bug notification because you are a member of AppArmor Developers, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1117804 Title: ausearch doesn't show AppArmor denial messages

Re: [apparmor] [Merge] ~u-d/apparmor-profiles:thunderbird/launcher into apparmor-profiles:master

2017-09-14 Thread Vincas Dargis
Sorry for off-topic, but could you elaborate this: > tl;dr I'm not sure this is actually a problem, even with merged /usr. So what are the AppArmor guidelines for these merge/separate usr exactly? -- https://code.launchpad.net/~u-d/apparmor-profiles/+git/apparmor-profiles/+merge/320276 Your tea

[apparmor] [Merge] lp:~talkless/apparmor/gnome_abstraction_thumbnail_cache into lp:apparmor

2017-09-16 Thread Vincas Dargis
Vincas Dargis has proposed merging lp:~talkless/apparmor/gnome_abstraction_thumbnail_cache into lp:apparmor. Requested reviews: AppArmor Developers (apparmor-dev) For more details, see: https://code.launchpad.net/~talkless/apparmor/gnome_abstraction_thumbnail_cache/+merge/330883 I have

[apparmor] [Merge] lp:~talkless/apparmor/abstractions_fonts_mmap into lp:apparmor

2017-09-16 Thread Vincas Dargis
The proposal to merge lp:~talkless/apparmor/abstractions_fonts_mmap into lp:apparmor has been updated. Description changed to: I have discovered that application (skypeforlinux) might want to mmap fonts, and I am proposing to allow it: type=AVC msg=audit(1505568463.561:482): apparmor="DENIED"

[apparmor] [Merge] lp:~talkless/apparmor/abstractions_fonts_mmap into lp:apparmor

2017-09-16 Thread Vincas Dargis
Vincas Dargis has proposed merging lp:~talkless/apparmor/abstractions_fonts_mmap into lp:apparmor. Requested reviews: intrigeri (intrigeri) AppArmor Developers (apparmor-dev) For more details, see: https://code.launchpad.net/~talkless/apparmor/abstractions_fonts_mmap/+merge/330884 I have

Re: [apparmor] [Merge] lp:~talkless/apparmor/gnome_abstraction_thumbnail_cache into lp:apparmor

2017-09-19 Thread Vincas Dargis
Oh, I thought "m" is also used simply for memory mapped files for performance. Skype 5 looks like it's electron-style web-app, so maybe that's what Chromium does? I have tried to write in Skype forums, but I keep getting some kind nonsese error "Message must be 6 to 6 characters long." I w

Re: [apparmor] [Merge] ~sdeziel/apparmor-profiles/+git/apparmor-profiles:thunderbird-icedove-debian into apparmor-profiles:master

2017-09-22 Thread Vincas Dargis
> and use @{pid} and @{pids} accordingly These work in kernel? -- https://code.launchpad.net/~sdeziel/apparmor-profiles/+git/apparmor-profiles/+merge/330183 Your team AppArmor Developers is subscribed to branch apparmor-profiles:master. -- AppArmor mailing list AppArmor@lists.ubuntu.com Modify

Re: [apparmor] [Merge] ~sdeziel/apparmor-profiles/+git/apparmor-profiles:thunderbird-icedove-debian into apparmor-profiles:master

2017-09-22 Thread Vincas Dargis
OK so we should use it for the future. Got it, thanks. -- https://code.launchpad.net/~sdeziel/apparmor-profiles/+git/apparmor-profiles/+merge/330183 Your team AppArmor Developers is subscribed to branch apparmor-profiles:master. -- AppArmor mailing list AppArmor@lists.ubuntu.com Modify settings

Re: [apparmor] [Merge] lp:~talkless/apparmor/gnome_abstraction_thumbnail_cache into lp:apparmor

2017-09-23 Thread Vincas Dargis
I believe this is Elector webapp containers bug. I tried to create quick-and-dirty Atom IDE profile, and found these interesting mmaps: /dev/shm/.org.chromium.Chromium.* mrw, /usr/share/atom/*.bin mr, /usr/share/atom/*.pak mr, /usr/share/atom/*.so mr, /usr/share/atom/icudtl.dat mr, /u

Re: [apparmor] [Merge] lp:~talkless/apparmor/gnome_abstraction_thumbnail_cache into lp:apparmor

2017-09-23 Thread Vincas Dargis
I've created Electron bug report: https://github.com/electron/electron/issues/10589 -- https://code.launchpad.net/~talkless/apparmor/gnome_abstraction_thumbnail_cache/+merge/330883 Your team AppArmor Developers is requested to review the proposed merge of lp:~talkless/apparmor/gnome_abstraction_

[apparmor] [Merge] lp:~talkless/apparmor/seven_digit_pid into lp:apparmor

2017-09-30 Thread Vincas Dargis
Vincas Dargis has proposed merging lp:~talkless/apparmor/seven_digit_pid into lp:apparmor. Requested reviews: AppArmor Developers (apparmor-dev) Related bugs: Bug #1717714 in AppArmor: "@{pid} variable broken on systems with pid_max more than 6 digits" https://bugs.launchpad.ne

[apparmor] [Bug 1706870] Re: usr.bin.thunderbird denies on Debian

2017-09-30 Thread Vincas Dargis
** Bug watch added: Debian Bug tracker #877324 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877324 ** Changed in: thunderbird (Debian) Importance: Undecided => Unknown ** Changed in: thunderbird (Debian) Status: New => Unknown ** Changed in: thunderbird (Debian) Remote watch:

[apparmor] [Merge] ~talkless/apparmor-profiles:thunderbird-mozilla-java-plugins into apparmor-profiles:master

2017-09-30 Thread Vincas Dargis
Vincas Dargis has proposed merging ~talkless/apparmor-profiles:thunderbird-mozilla-java-plugins into apparmor-profiles:master. Requested reviews: simon123 (simon-deziel) AppArmor Developers (apparmor-dev) For more details, see: https://code.launchpad.net/~talkless/apparmor-profiles/+git

[apparmor] [Bug 1706870] Re: usr.bin.thunderbird denies on Debian

2017-09-30 Thread Vincas Dargis
** Merge proposal linked: https://code.launchpad.net/~talkless/apparmor-profiles/+git/apparmor-profiles/+merge/331617 -- You received this bug notification because you are a member of AppArmor Developers, which is subscribed to AppArmor Profiles. https://bugs.launchpad.net/bugs/1706870 Title

Re: [apparmor] [Merge] ~talkless/apparmor-profiles:thunderbird-mozilla-java-plugins into apparmor-profiles:master

2017-09-30 Thread Vincas Dargis
> LGTM but would you mind making those rules "rm" to make the read access > explicit. Done. -- https://code.launchpad.net/~talkless/apparmor-profiles/+git/apparmor-profiles/+merge/331617 Your team AppArmor Developers is requested to review the proposed merge of ~talkless/apparmor-profiles:thunde

[apparmor] Wat's up with "Pux" qualifier?

2017-10-01 Thread Vincas Dargis
Hi, I have reported bug [0] that `usr.bin.totem` containing `Pux` rule produces `aa-logprof` error: ``` ERROR: permission contains unknown character(s) Pux ``` Though `apparmor_parser` itself does not emit any errors or warnings. I can't find `Pux` in `man apparmor.d`, though it's mentioned i

Re: [apparmor] Wat's up with "Pux" qualifier?

2017-10-02 Thread Vincas Dargis
On 2017.10.02 02:19, John Johansen wrote: I believe it was a deliberate decision by the author to not support the confusing syntax of mixed characters. The parser's support is much older and has not been patched to conform with the above mentioned decision, ideally it should be reporting that the

Re: [apparmor] Wat's up with "Pux" qualifier?

2017-10-03 Thread Vincas Dargis
On 2017.10.03 02:17, Christian Boltz wrote: I guess I could create bug / feature request against apparmor_parser, about emitting warning when `Pux` is used in profile. Yes, please do. Done. https://bugs.launchpad.net/apparmor/+bug/1721071 -- AppArmor mailing list AppArmor@lists.ubuntu.com

Re: [apparmor] [Merge] ~intrigeri/apparmor-profiles/+git/apparmor-profiles:gnome-3.26 into apparmor-profiles:master

2017-10-04 Thread Vincas Dargis
`Pux` should be updated to `pux`, as discussed in https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877255#10 -- https://code.launchpad.net/~intrigeri/apparmor-profiles/+git/apparmor-profiles/+merge/331058 Your team AppArmor Developers is requested to review the proposed merge of ~intrigeri/appa

Re: [apparmor] Enabling AppArmor by default in Debian sprint: Oct. 23-27

2017-10-05 Thread Vincas Dargis
On 2017.10.04 19:53, intrigeri wrote: Wrt. the "enabling AppArmor by default in Debian" project/experiment, I'll have a sprint on October 23-27. I generally have 1, 2 hours max for contributions on work days, so I'll dedicate them for AppArmor only. -- AppArmor mailing list AppArmor@lists.ub

[apparmor] About duplicate AVC audit entries

2017-10-05 Thread Vincas Dargis
Hi, I have just tried 4.14 kernel on Debian, and noticed some.. strange (at least for me) lines: type=AVC msg=audit(1507226290.397:616): apparmor="ALLOWED" operation="file_perm" profile="/usr/sbin/avahi-daemon" pid=526 comm="avahi-daemon" family="unix" sock_type="stream" protocol=0 requested_m

Re: [apparmor] About duplicate AVC audit entries

2017-10-07 Thread Vincas Dargis
On 2017.10.05 22:14, John Johansen wrote: The ordering of apparmor rules with respect to other kernel messages can also be slightly out of expected order if you are using rsyslog etc instead of auditd, because the apparmor messages go through the audit subsystem and its messaging can get reordere

[apparmor] [Merge] ~talkless/apparmor-profiles:gnome-3.26 into apparmor-profiles:master

2017-10-11 Thread Vincas Dargis
Vincas Dargis has proposed merging ~talkless/apparmor-profiles:gnome-3.26 into apparmor-profiles:master. Requested reviews: intrigeri (intrigeri) AppArmor Developers (apparmor-dev) For more details, see: https://code.launchpad.net/~talkless/apparmor-profiles/+git/apparmor-profiles/+merge

Re: [apparmor] [Merge] ~intrigeri/apparmor-profiles/+git/apparmor-profiles:gnome-3.26 into apparmor-profiles:master

2017-10-11 Thread Vincas Dargis
This MR is outdated, new one is prepared with fixed `pux`: https://code.launchpad.net/~talkless/apparmor-profiles/+git/apparmor-profiles/+merge/332143 -- https://code.launchpad.net/~intrigeri/apparmor-profiles/+git/apparmor-profiles/+merge/331058 Your team AppArmor Developers is requested to revie

Re: [apparmor] [Merge] ~talkless/apparmor-profiles:thunderbird-mozilla-java-plugins into apparmor-profiles:master

2017-10-23 Thread Vincas Dargis
OK I'm on it. -- https://code.launchpad.net/~talkless/apparmor-profiles/+git/apparmor-profiles/+merge/331617 Your team AppArmor Developers is requested to review the proposed merge of ~talkless/apparmor-profiles:thunderbird-mozilla-java-plugins into apparmor-profiles:master. -- AppArmor mailin

Re: [apparmor] [Merge] ~talkless/apparmor-profiles:thunderbird-mozilla-java-plugins into apparmor-profiles:master

2017-10-23 Thread Vincas Dargis
> I see that abstractions/ubuntu-browsers.d/java has something about > IcedTeaPlugin.so + other potentially useful stuff like access to > /{,var/}run/user/*/icedteaplugin-*/, that I suspect we'll need for Thunderbird > as well sooner or later. So how about including this abstraction instead? Done,

Re: [apparmor] [Merge] ~talkless/apparmor-profiles:gnome-3.26 into apparmor-profiles:master

2017-10-25 Thread Vincas Dargis
Closing because superseded by https://code.launchpad.net/~intrigeri/apparmor-profiles/+git/apparmor-profiles/+merge/332769 -- https://code.launchpad.net/~talkless/apparmor-profiles/+git/apparmor-profiles/+merge/332143 Your team AppArmor Developers is requested to review the proposed merge of ~ta

Re: [apparmor] [Merge] ~intrigeri/apparmor-profiles/+git/apparmor-profiles:gnome-3.26 into apparmor-profiles:master

2017-10-25 Thread Vincas Dargis
Just discovered on clean Debian Sid GNOME that totem needs to create .cache/totem on first ever run: type=AVC msg=audit(1508956935.986:171): apparmor="DENIED" operation="mkdir" profile="/usr/bin/totem" name="/home/vincas/.cache/totem/" pid=2046 comm="totem" requested_mask="c" denied_mask="c" fs

[apparmor] [Merge] ~talkless/apparmor-profiles:fix-thunderbird-attachements into apparmor-profiles:master

2017-10-26 Thread Vincas Dargis
Vincas Dargis has proposed merging ~talkless/apparmor-profiles:fix-thunderbird-attachements into apparmor-profiles:master. Requested reviews: AppArmor Developers (apparmor-dev) For more details, see: https://code.launchpad.net/~talkless/apparmor-profiles/+git/apparmor-profiles/+merge/332870

[apparmor] [Merge] ~talkless/apparmor-profiles:fix-thunderbird-attachements into apparmor-profiles:master

2017-10-26 Thread Vincas Dargis
The proposal to merge ~talkless/apparmor-profiles:fix-thunderbird-attachements into apparmor-profiles:master has been updated. Description changed to: This is modified (no sbin, less explicit) intrigeri patch [0][1] for fixing Debian bug #855346 [2] that disallows Thunderbird users with AppArmo

Re: [apparmor] [Merge] ~talkless/apparmor-profiles:fix-thunderbird-attachements into apparmor-profiles:master

2017-10-26 Thread Vincas Dargis
On 2017.10.26 20:10, Simon Déziel wrote: > I've been running without the mmap rules for a while and haven't seen any > problem. As for the sanitized_helper rules, it works as expected where helper > apps get contained by the thunderbird//sanitized_helper profile (even if they > have their own pr

Re: [apparmor] [Merge] ~intrigeri/apparmor-profiles/+git/apparmor-profiles:gnome-3.26 into apparmor-profiles:master

2017-10-26 Thread Vincas Dargis
What about Debian Stable? Is this bwrap needed there and will these fixes land in Stable? Will it work with PUx there? -- https://code.launchpad.net/~intrigeri/apparmor-profiles/+git/apparmor-profiles/+merge/332769 Your team AppArmor Developers is subscribed to branch apparmor-profiles:master. -

Re: [apparmor] [Bug 1727993] Re: Thunderbird profile should transition to Evince/Totem profiles when running them to open attachments

2017-10-27 Thread Vincas Dargis
On 2017.10.27 16:03, Jamie Strandboge wrote: I commented in the other bug, but will repeat myself here: "Note that this is rather tricky. If the user disabled the evince profile, using Px means that the exec will fail with 'profile not found'. There is no way to specify 'use P if it exists, other

Re: [apparmor] [Merge] ~talkless/apparmor-profiles:fix-thunderbird-attachements into apparmor-profiles:master

2017-10-27 Thread Vincas Dargis
On 2017.10.26 23:03, Simon Déziel wrote: > @Vincas, I just noticed that you added simon123 as reviewer. Despite the > similarity in name it is not me as I go by the LP ID sdeziel. > Oh, sorry for that. -- https://code.launchpad.net/~talkless/apparmor-profiles/+git/apparmor-profiles/+merge/3328

[apparmor] [Merge] lp:~talkless/apparmor/apparmor into lp:apparmor

2017-10-30 Thread Vincas Dargis
Vincas Dargis has proposed merging lp:~talkless/apparmor/apparmor into lp:apparmor. Requested reviews: AppArmor Developers (apparmor-dev) For more details, see: https://code.launchpad.net/~talkless/apparmor/apparmor/+merge/333003 When testing Apache confinement using phpsysinfo as example

[apparmor] [Merge] lp:~talkless/apparmor/apparmor into lp:apparmor

2017-10-30 Thread Vincas Dargis
The proposal to merge lp:~talkless/apparmor/apparmor into lp:apparmor has been updated. Description changed to: When testing Apache confinement on Debian Sid using phpsysinfo as example provided, I discovered multiple denies, which are fixed in this MR. Denies in question: type=AVC msg=audit(

Re: [apparmor] [Merge] ~sdeziel/apparmor-profiles/+git/apparmor-profiles:thunderbird-bug-880425 into apparmor-profiles:master

2017-11-01 Thread Vincas Dargis
Review: Approve I agree that this inherited file is bogus and can be denied. -- https://code.launchpad.net/~sdeziel/apparmor-profiles/+git/apparmor-profiles/+merge/333081 Your team AppArmor Developers is subscribed to branch apparmor-profiles:master. -- AppArmor mailing list AppArmor@lists.ubun

[apparmor] Understanding child profiles and file_inherit

2017-11-05 Thread Vincas Dargis
Hi, While developing `usr.bin.skypeforlinux` (for the new Skype version, it's an Electron app) profile on Ubuntu 17.10 VM, I have discovered file_inherit denies which I would like to understand with your help. `usr.bin.skypeforlinux` profile has these lines to allow executing `/usr/bin/locale

Re: [apparmor] Understanding child profiles and file_inherit

2017-11-05 Thread Vincas Dargis
On 2017.11.05 13:10, intrigeri wrote: Is it possible to deny all of these file_inherit somehow? Probably, with a wide deny rule such as (/**). It it possible to select file_inherit only? I mean, this will not allow even mmap executable itself, and it would deny all these file rules in , woul

Re: [apparmor] Understanding child profiles and file_inherit

2017-11-12 Thread Vincas Dargis
On 2017.11.12 16:16, intrigeri wrote: Sorry, I have no good solution to propose. Either you need to explicitly deny each inherited file. Or you can deny everything ("deny /**") and then add exceptions for what locale really needs to access, Doesn't deny overrides everything what is allowed? Not

[apparmor] RFC: using variables to make profiles more flexible

2017-12-03 Thread Vincas Dargis
Hi, There is a Thunderbird bug [0] about profile not allowing to read `.thunderbird` for outside of $HOME. Currently, Thunderbird profile [1] has quite a few rules for `.thunderbird`: ``` # per-user thunderbird configuration owner @{HOME}/.{icedove,thunderbird}/ rw, owner @{HOME}/.{icedo

Re: [apparmor] RFC: using variables to make profiles more flexible

2017-12-03 Thread Vincas Dargis
On 2017-12-03 13:04, intrigeri wrote: Vincas Dargis: To wrap this up, I am suggesting to apply this guideline and refactor current profiles (and consider it while writing new ones), to use variables and some sort of tunables include, like directory: Looks great to me! What about actual

Re: [apparmor] RFC: using variables to make profiles more flexible

2017-12-03 Thread Vincas Dargis
On 2017-12-03 14:05, intrigeri wrote:> So this seems to be yet another use case for a directive like #include_if_exists (or #include -, to reuse systemd Yeas, I had this idea too, that having `#try_include` or `#include_if_exists` would be really useful. Maybe we could discuss the interface

Re: [apparmor] RFC: using variables to make profiles more flexible

2017-12-04 Thread Vincas Dargis
On 2017-12-04 19:53, John Johansen wrote: On 12/03/2017 04:05 AM, intrigeri wrote: At first glance I would essentially apply the same path structure as what we do for top-level profiles: * `tunables/usr.bin.thunderbird`, shipped by the package, has the default settings Oh, I missed that

Re: [apparmor] RFC: using variables to make profiles more flexible

2017-12-04 Thread Vincas Dargis
On 2017-12-04 20:04, John Johansen wrote:>> This would allow user to extend `@{totem_extra_read_dirs}` for his own use case, maybe ever overwrite (is this possible?) with `=` instead of `+=`, if he does not like access to default media/mnt/opt/srv paths. sorry no overwriting is currently not s

Re: [apparmor] RFC: using variables to make profiles more flexible

2017-12-05 Thread Vincas Dargis
On 2017-12-03 13:04, intrigeri wrote: Looks great to me! Well.. looks like we have a show-stopper: https://bugs.launchpad.net/apparmor/+bug/1331856 -- AppArmor mailing list AppArmor@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/apparmor

[apparmor] RFC: handling xdg-open and similar helpers

2018-01-21 Thread Vincas Dargis
Hi, I have some WIP AppArmor profiles for applications that uses `xdg-open` to open link or attachment. For example, `usr.bin.dragon` profile (KDE multimedia player) has this line [0]: ``` /usr/bin/xdg-open Cx -> sanitized_helper, ``` Aaand.. I don't like it. Dragon only needs to open browse

Re: [apparmor] RFC: handling xdg-open and similar helpers

2018-01-25 Thread Vincas Dargis
On 1/25/18 9:31 AM, John Johansen wrote: On 01/21/2018 08:27 AM, Vincas Dargis wrote: Hi, I have some WIP AppArmor profiles for applications that uses `xdg-open` to open link or attachment. For example, `usr.bin.dragon` profile (KDE multimedia player) has this line [0]: ``` /usr/bin/xdg

Re: [apparmor] RFC: handling xdg-open and similar helpers

2018-01-26 Thread Vincas Dargis
Or maybe there are, or going to be implemented, some other alternatives? Maybe upcoming delegation could offer different approach? delegation could help some but we really need to finish with the better control over env var scrubbing, relying on the secure exec flag in glibc isn't enough in s

Re: [apparmor] RFC: handling xdg-open and similar helpers

2018-01-26 Thread Vincas Dargis
On 1/26/18 10:06 AM, intrigeri wrote: John Johansen: On 01/25/2018 12:46 PM, Simon McVittie wrote: On Thu, 25 Jan 2018 at 11:29:26 -0800, John Johansen wrote: On 01/25/2018 10:15 AM, Vincas Dargis wrote: Even if environment scrubbing would work, should it still allow execute xdg-open

[apparmor] Note: NVIDIA drivers are mapping user-writable files by default

2018-02-04 Thread Vincas Dargis
Hi, I would like to share some info about particular DENIED messages that happen on the machines with NVIDIA graphics hardware and proprietary divers. This does not happen with integrated Intel chips. You might have seen these kind of denies: ``` type=AVC msg=audit(1517738575.272:418): appar

Re: [apparmor] Note: NVIDIA drivers are mapping user-writable files by default

2018-02-06 Thread Vincas Dargis
On 2/5/18 11:06 PM, Jamie Strandboge wrote: Now the question for AppArmor side of affairs, I see two questions: Q1: What's the deal with these /home/vincas/#12976887 paths? Sysdig fails to show events for that kind of paths (or I fail to catch them). Is is some sort of failure from Linux/AppArmo

Re: [apparmor] Note: NVIDIA drivers are mapping user-writable files by default

2018-02-08 Thread Vincas Dargis
On 2/6/18 9:25 PM, Jamie Strandboge wrote: Anyway, do we _really_ want to allow mmap on writable files..? Not usually, but in the case of actual shared memory files, there isn't another choice atm. Some day we'll mediate shared memory with non-file rules[1]. There is a choice to deny it. Sinc

Re: [apparmor] Note: NVIDIA drivers are mapping user-writable files by default

2018-02-11 Thread Vincas Dargis
On 2/8/18 11:25 PM, Jamie Strandboge wrote: There is a choice to deny it. Of course. My point was that an nvidia user of the profiled application is going to expect 3d acceleration from the drivers so a profile that is meant to work with nvidia should do that (but see below where I respond to y

Re: [apparmor] RFC: handling xdg-open and similar helpers

2018-02-11 Thread Vincas Dargis
On 1/25/18 9:31 AM, John Johansen wrote: Dragon only needs to open browser (for clicking "Help -> Report a bug") and email client (when clicking translator's email button in About dialog), and that's it. So I figure that a more secure approach (by limiting allowed target applications to open s

Re: [apparmor] Note: NVIDIA drivers are mapping user-writable files by default

2018-02-16 Thread Vincas Dargis
On 2/11/18 11:38 PM, John Johansen wrote: On 02/11/2018 02:42 AM, Vincas Dargis wrote: So to wrap up, plan would be: 1. Move `abstactions/nvidia` content into `nvidia-strict`. `nvidia-strict` should have comment that it does not provide some NVIDIA optimizations and some `deny` rules are

Re: [apparmor] Note: NVIDIA drivers are mapping user-writable files by default

2018-02-16 Thread Vincas Dargis
On 2/16/18 9:33 PM, John Johansen wrote: On 02/16/2018 06:44 AM, Vincas Dargis wrote: Could you give example how this tunable + conditional would look like? see below Would this be per-machine or per policy decision (probably the latter)? it could be setup either way, it would depend on

Re: [apparmor] Note: NVIDIA drivers are mapping user-writable files by default

2018-02-16 Thread Vincas Dargis
On 2/16/18 10:19 PM, John Johansen wrote: On 02/16/2018 12:09 PM, Vincas Dargis wrote: $ cat abstractions/nvidia if defined $nvidia_strict {   if not $nvidia_strict {     # allow possibly unsafe NVIDIA optimizations, see .     owner @{HOME}/#[0-9]* rwm,     owner @{HOME}/.glvnd[0-9]* rwm

Re: [apparmor] Note: NVIDIA drivers are mapping user-writable files by default

2018-02-17 Thread Vincas Dargis
On 2/17/18 12:12 AM, John Johansen wrote: On 02/16/2018 12:50 PM, Vincas Dargis wrote: If we stick to this conditionals approach, I believe we are targeting fix for this NVIDIA issue in no earlier than AppArmor 3.1 I guess? This being said, can (and should) we do anything "now", fo

Re: [apparmor] Note: NVIDIA drivers are mapping user-writable files by default

2018-02-17 Thread Vincas Dargis
On 2/17/18 8:07 PM, John Johansen wrote: So the idea is to wait for 3.0 (BETA?) to implement this long-topic NVIDIA issue then? That would be really nice way, I guess, to fix this in one go, instead of "temporar-stuff-and-real-fix-later". No the beta won't be a few weeks, I plan to kick out t

Re: [apparmor] Note: NVIDIA drivers are mapping user-writable files by default

2018-02-18 Thread Vincas Dargis
On 2/17/18 8:54 PM, John Johansen wrote: On 02/17/2018 10:11 AM, Vincas Dargis wrote: That would be fast... I will need to research how to run latest AppArmor or my (virtual?) machine to work on thought. As long as you don't need a new libapparmor (you shouldn't for these patche

Re: [apparmor] RFC: handling xdg-open and similar helpers

2018-03-20 Thread Vincas Dargis
On 3/19/18 1:37 PM, intrigeri wrote: As you can see, I have included `ubuntu-helpers` so that `abstractions/ubuntu-browsers` could work (as it needs sanitized_helper). At least I imagined it should. I suspect you need to include abstractions/ubuntu-helpers in the xdg_open profile. I believe

Re: [apparmor] new rule qualifier "quiet" or "noaudit"

2018-04-05 Thread Vincas Dargis
On 4/3/18 1:48 AM, John Johansen wrote: Please vote for 1) quiet. quiet w /foo/bar/**, 2) noaudit noaudit w /foo/bar/**, 3) other please leave your suggestion. +1 for quiet. "quiet" word is already widely used in CLI utilities, so it's kinda natural fit. At the same time we

[apparmor] [RFC] How to handle multiple opencl implementations?

2018-05-03 Thread Vincas Dargis
Hi, Story begins with Debian user reporting issue that LibreOffice is denied access to OpenCL related files [0]. To fix that I've started to build opencl abstraction. While doing so, I've discovered that there are quite a few implementations. At least: * POCL (for CPU only I believe) * Inte

Re: [apparmor] [RFC] How to handle multiple opencl implementations?

2018-05-09 Thread Vincas Dargis
On 5/9/18 5:05 PM, Jamie Strandboge wrote: On Tue, 2018-05-08 at 23:09 -0700, John Johansen wrote: On top of each of the opencl-XXX abstractions I think it would be worth having a generic opencl abstraction that includes the various sub-abstractions, its wide now but the intent will be to tight

Re: [apparmor] [RFC] How to handle multiple opencl implementations?

2018-05-10 Thread Vincas Dargis
On 5/9/18 9:24 PM, Jamie Strandboge wrote: On Wed, 2018-05-09 at 19:55 +0300, Vincas Dargis wrote: So: A. we have additional opencl-common? B. we don't care too much yet and expect generic `opencl` abstraction to be used with all implementations included by default _and_ common rules i

Re: [apparmor] Firefox 60 sys_admin capability

2018-05-18 Thread Vincas Dargis
On 5/18/18 6:25 PM, Malte Gell wrote: Hi there, I just upgraded from Firefox 52 to version 60. I start Firefox always with the profile manager. Now, FF 60 asks for sys_admin capability. Unless I know why, I´m reluctant to grant them Does anyone have a clue why FF 60 needs sys_admin capabil

  1   2   >