On Mon, Apr 24, 2006 at 11:16:25AM -0400, Joshua Brindle wrote:apparmor-profiles-2.0.tar.gz available on the novell forge.
To make this much more real, the /usr/sbin/named policy that ships with apparmor has the following line:
Ships with AppArmor where? On SuSE?
So you are currently not protecting this access vector and it was said pretty clearly that this patch wouldn't make it into mainline. I don't understand how you intend to address this. Are people running different distros out of luck with regard to Apparmor?/** r,
Thats right, named can read any file on the system, I suppose this is because the policy relies on named being chrooted. So if for any reason named doesn't chroot its been granted read access on the entire filesystem. If I'm misunderstanding this policy please correct me but I believe this shows the problem very loudly and clearly.
The d_path changes for absolute path mediation for chroot are not yet in any SuSE release. Nor are they reflected in any developed profiles (yet).
Another direction is a new security_chroot hook together with appropriate CLONE_FS tracking (inside AppArmor) to force chrooting confined tasks into a subprofile (similar to change hat). We are evaluating the options based on feedback here and from other places. Hence the RFC.Thats fine, what about private namespaces, which are better than chroots anyway in terms of flexibility. Are you going to be able to specify the precise namespace that an app may use in order to use these policies?
I hope this helps