On Wed, 01 Nov 2017 08:04:37 +0100 intrig...@debian.org wrote:
> So I propose we do this:
> 
> --- a/debian/systemd/tor@default.service
> +++ b/debian/systemd/tor@default.service
> @@ -20,7 +20,7 @@ Restart=on-failure
>  LimitNOFILE=65536
>  
>  # Hardening
> -AppArmorProfile=system_tor
> +AppArmorProfile=-system_tor
>  NoNewPrivileges=yes
>  PrivateTmp=yes
>  PrivateDevices=yes

I confirm that with this change tor starts normally without apparmor installed.

Note that I still see in syslog (if that's relevant):
kernel: [   22.193677] audit: type=1400 audit(1509560952.793:2): 
apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 
profile="unconfined" name="system_tor" pid=542 comm="(tor)"

I also tested it with "security=dac" on the kernel command line without getting 
the above syslog entry (of course).

Thanks,
Viktor

Reply via email to