[Bug 724829] New: install AppArmor by default (again)
https://bugzilla.novell.com/show_bug.cgi?id=724829 https://bugzilla.novell.com/show_bug.cgi?id=724829#c0 Summary: install AppArmor by default (again) Classification: openSUSE Product: openSUSE 12.1 Version: Factory Platform: Other OS/Version: Other Status: NEW Severity: Normal Priority: P5 - None Component: Patterns AssignedTo: coolo@suse.com ReportedBy: suse-beta@cboltz.de QAContact: qa@suse.de Found By: Beta-Customer Blocker: --- Several people, including some maintainers of packages with an AppArmor profile, requested on the opensuse-factory ML to install AppArmor by default (again). The reason for not installing AppArmor by default was (IIRC) mostly that wasn't really maintained and some profiles were incomplete and accidently blocked something. Both things are solved in the meantime (better don't ask how many evenings I spent on the AppArmor package...). Please re-add AppArmor to the default installation. -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.
https://bugzilla.novell.com/show_bug.cgi?id=724829 https://bugzilla.novell.com/show_bug.cgi?id=724829#c Stephan Kulow <coolo@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- AssignedTo|coolo@suse.com |speilicke@suse.com -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.
https://bugzilla.novell.com/show_bug.cgi?id=724829 https://bugzilla.novell.com/show_bug.cgi?id=724829#c1 Sascha Peilicke <speilicke@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |NEEDINFO InfoProvider| |suse-beta@cboltz.de --- Comment #1 from Sascha Peilicke <speilicke@suse.com> 2011-10-21 09:09:14 UTC --- But what's the use-case in enabling it by default? I don't mean servers, but I suspect the vast majority of openSUSE installations to be laptops and workstations. Why would I care that all cmdline-mailers are appropriately confined? As a user, I would be interested in mostly Firefox, Flash and Adobe. It was thought that 'power-users' or admins that want this functionality can enable it easily, IMO but we don't want to bug joe user with that. If this is only 'bout convenience for the sysadmin, I'd say no. We shouldn't enable another daemon just because we can, we already have plenty ;-) Don't you disable half of the default set that doesn't cater your needs, too?. On the other hand, does that tray applet work again? -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.
https://bugzilla.novell.com/show_bug.cgi?id=724829 https://bugzilla.novell.com/show_bug.cgi?id=724829#c2 --- Comment #2 from Ludwig Nussel <lnussel@suse.com> 2011-10-21 11:24:09 CEST --- apparmor would also be useful for services the user does not care about but which are run by default, e.g. avahi and various dbus services. They'd obviously need profiles though for aa to make sense of course. -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.
https://bugzilla.novell.com/show_bug.cgi?id=724829 https://bugzilla.novell.com/show_bug.cgi?id=724829#c3 Christian Boltz <suse-beta@cboltz.de> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEEDINFO |NEW InfoProvider|suse-beta@cboltz.de | --- Comment #3 from Christian Boltz <suse-beta@cboltz.de> 2011-10-21 14:09:34 CEST --- My system is far from a default installation, so I don't know exactly which daemons are running by default nowadays. You'll have to compare the list of daemons running by default with the profiles in /etc/apparmor.d/ yourself ;-)
From the things Ludwig mentioned: usr.sbin.avahi-daemon has a profile. usr.sbin.nscd and usr.sbin.ntpd are also things that are started by default IIRC and are protetected by AppArmor.
Of course I use all profiles that are installed by default on my system and everything works - so AppArmor won't "bug joe user with that" ;-) It just sits in the background and adds some additional security. The desktop notification works (it's not a tray applet/icon anymore - it uses /usr/bin/notify-send). You can start it with sudo /usr/sbin/aa-notify -p --display $DISPLAY BTW: the usr.sbin.smbd profile is now even automatically updated based on your shares in smb.conf. Now to the more interesting[tm] things you asked: The problem with firefox and acroread is that they have "save as..." and "open..." in their file menu. This means that I'd have to give them read and write permissions to (more or less) the whole filesystem, which makes having a profile quite pointless. The only thing that would be possible without restricting users would be a set of deny rules where I could blacklist read access to ~/.gnupg and ~/.ssh - but such a blacklist would never be complete. To make the firefox profile really secure, a restriction like "downloads can only be stored in ~/Downloads/" would be needed. That's exactly what the firefox profile in /etc/apparmor/profiles/extras/ does, and it's also the reason why this profile isn't enabled by default. Flash could be easier because it doesn't have "save as..." and "open..." - but I'm not sure at which point between browser and flash a profile could attach. (Does flash run as a standalone process? What's the name of the binary?) -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.
https://bugzilla.novell.com/show_bug.cgi?id=724829 https://bugzilla.novell.com/show_bug.cgi?id=724829#c4 --- Comment #4 from Sascha Peilicke <speilicke@suse.com> 2011-11-14 14:49:39 UTC --- If $FOO would be helpful when $CONDITION is met, we should wait for $CONDITION to happen. Enabling by default means maintaining it, means updating profiles once application behavior changes. This usually includes bug reports of 'broken' apps first. Maybe the majority of confined services don't change that much, but I would like to see a real assessment of AppArmor before we pretend it adds any value. Even if we have some profiles, are we really sure they actually do what they're supposed to do (i.e. catch all security-relevant cases) or is this just a it-feels-safer (tm) solution? Has it been proven that AppArmor itself isn't subject to security issues? Are there reported cases where it really defeated a security breach? -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.
https://bugzilla.novell.com/show_bug.cgi?id=724829 https://bugzilla.novell.com/show_bug.cgi?id=724829#c5 Christian Boltz <suse-beta@cboltz.de> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |NEEDINFO InfoProvider| |security-team@suse.de --- Comment #5 from Christian Boltz <suse-beta@cboltz.de> 2011-11-14 21:58:32 CET --- (In reply to comment #4)
If $FOO would be helpful when $CONDITION is met, we should wait for $CONDITION to happen. Enabling by default means maintaining it,
guess what I'm doing since some months ;-) and I'm also well-known on the upstream mailinglist since years - money quote (from february 2007): ----------
"Quite low" is 1 in 4 billion. Murphy could make me believe you saw it once, but not twice. You could plausibly see it in a stress test rig This _is_ Christian :) he has a knack for finding bugs no one else can.. [> Crispin Cowan and Seth Arnold in apparmor-general]
means updating profiles once application behavior changes. This usually includes bug reports of 'broken' apps first.
I'm using AppArmor on my systems (desktop + some web/mail servers) myself, so there are good chances that I notice it quite fast if a profile needs to be updated.
Maybe the majority of confined services don't change that much, but I would like to see a real assessment of AppArmor before we pretend it adds any value.
Understandable, even if I wonder why nobody asked in the last years ;-) AppArmor is included (and was enabled) since how many years now?
Even if we have some profiles, are we really sure they actually do what they're supposed to do (i.e. catch all security-relevant cases) or is this just a it-feels-safer (tm) solution?
Show me something that makes a system 100% safe, please ;-) If you had written "catch _nearly_ all security-relevant cases", I'd say yes. Upstream is very picky before accepting profile patches (and ask why a change/additional permission is needed if it isn't obvious), therefore I'm sure the profiles don't allow more than they should allow.
Has it been proven that AppArmor itself isn't subject to security issues? Are
The only issue I'm aware of is bug 717209 (fixed in 12.1 by newer upstream kernel), but the impact is very limited - it crashes the current task (which is obviously misbehaving when writing garbage to /proc, so you could even call it a feature ;-)) and triggers a crash dump (if enabled).
there reported cases where it really defeated a security breach?
Counter-question: are there reported cases where your firewall really defeated a security breach? (In theory all applications/daemons are secure, so why would you need a firewall?) The "problem" with such questions is that you will get the answer _after_ something went wrong. Security tools are like a fire insurance - hopefully you'll never need it, but if you don't have one and your house burns down, you'll have a really big problem... Back to the original question: That's something the security team can probably answer better. I'll needinfo them... -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.
https://bugzilla.novell.com/show_bug.cgi?id=724829 https://bugzilla.novell.com/show_bug.cgi?id=724829#c6 Ludwig Nussel <lnussel@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEEDINFO |NEW InfoProvider|security-team@suse.de | --- Comment #6 from Ludwig Nussel <lnussel@suse.com> 2011-11-15 15:54:06 CET --- Apparmor helps in cases where the confined application suddenly tries to access files it doesn't need during normal operation. Such as trying to exec /bin/sh due to trying to mount an attack. I can not present bold real world success stories but then I am not a marketing guy trying to sell Apparmor. I am confident that a process confined in an appropriate profile presents at least additional barriers to attackers that give us time until we are able to release real fixes. Similar to how we use other defensive measurements like ASLR, stack protector etc. Like any piece of software Apparmor is not immune to bugs. It's not broken by design though. Also, Apparmor cannot defend against too permissive/broken or simply missing profiles of course. In order to make it useful in the default installation Apparmor of course needs to ship with profiles that actually apply to services in the default installation. -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.
https://bugzilla.novell.com/show_bug.cgi?id=724829 https://bugzilla.novell.com/show_bug.cgi?id=724829#c8 Stephan Kulow <coolo@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Priority|P5 - None |P3 - Medium Status|NEW |ASSIGNED Component|Patterns |Patterns Product|openSUSE 12.1 |openSUSE 12.2 Target Milestone|--- |Milestone 1 --- Comment #8 from Stephan Kulow <coolo@suse.com> 2012-07-10 15:06:32 CEST --- once we have larger live media, we can talk about it. after 12.2 -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.
https://bugzilla.novell.com/show_bug.cgi?id=724829 https://bugzilla.novell.com/show_bug.cgi?id=724829#c9 Stephan Kulow <coolo@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|ASSIGNED |RESOLVED Resolution| |FIXED --- Comment #9 from Stephan Kulow <coolo@suse.com> 2013-09-27 11:33:53 CEST --- damn it, I was under the impression that this is long fixed? at least my factory installation uses apparmor again. Good thing I noticed before RC1, so we have a good chance to find some blockers -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.
https://bugzilla.novell.com/show_bug.cgi?id=724829 https://bugzilla.novell.com/show_bug.cgi?id=724829#c10 --- Comment #10 from Bernhard Wiedemann <bwiedemann@suse.com> 2013-09-27 20:00:51 CEST --- This is an autogenerated message for OBS integration: This bug (724829) was mentioned in https://build.opensuse.org/request/show/201180 Factory / patterns-openSUSE -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.
https://bugzilla.novell.com/show_bug.cgi?id=724829 https://bugzilla.novell.com/show_bug.cgi?id=724829#c11 --- Comment #11 from Bernhard Wiedemann <bwiedemann@suse.com> 2013-09-27 23:00:46 CEST --- This is an autogenerated message for OBS integration: This bug (724829) was mentioned in https://build.opensuse.org/request/show/201228 Factory / patterns-openSUSE -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.
participants (1)
-
bugzilla_noreply@novell.com