Re: [apparmor] [PATCH 08/10] From 69da7ad9b8007d33bbf4ffe4474f03e81e13eaa6 Mon Sep 17 00:00:00 2001 From: John Johansen john.johan...@canonical.com Date: Sat, 3 Nov 2012 08:19:52 -0700 Subject: [PAT

2013-07-25 Thread Seth Arnold
...@canonical.com Acked-by: Seth Arnold seth.arn...@canonical.com --- parser/parser_policy.c | 68 -- 1 file changed, 68 deletions(-) diff --git a/parser/parser_policy.c b/parser/parser_policy.c index f147be7..76a65c8 100644 --- a/parser

Re: [apparmor] [PATCH 10/10] use libapparmor's find mountpoint fn to find the interface

2013-07-25 Thread Seth Arnold
On Sun, Jul 21, 2013 at 10:32:53PM -0700, John Johansen wrote: Drop support for the old subdomainfs mountpoint and use the fn exported by libapparmor. Signed-off-by: John Johansen john.johan...@canonical.com Acked-by: Seth Arnold seth.arn...@canonical.com --- parser/Makefile | 3

Re: [apparmor] [parser patch] fix apparmor cache tempfile location to use passed arg

2013-07-25 Thread Seth Arnold
-off-by: Steve Beattie sbeat...@ubuntu.com Acked-by: Seth Arnold seth.arn...@canonical.com Thanks --- parser/parser_main.c | 12 +++- 1 file changed, 7 insertions(+), 5 deletions(-) Index: b/parser/parser_main.c

Re: [apparmor] [PATCH 01/10] clean up the lexer

2013-07-24 Thread Seth Arnold
On Sun, Jul 21, 2013 at 10:32:44PM -0700, John Johansen wrote: - Make indenting consistent - Move common match + fn patterns into a single shared entry with mulitstate headers - add names table to convert lexer state #s to state names used in the code - Create/use macros for common patterns

Re: [apparmor] Where should the new aa-exec live in packaging

2013-07-24 Thread Seth Arnold
On Wed, Jul 24, 2013 at 09:26:43AM -0700, John Johansen wrote: So we have a binary (C based) version of aa-exec that just needs a little more revision before we land it. One of the things we need to decide is which package to put it in. We could modify the utils packaging to handle binary

Re: [apparmor] [PATCH 02/10] From 071e0ba1669cf330c22fb5bcb9de2a1db0d12a84 Mon Sep 17 00:00:00 2001 From: John Johansen john.johan...@canonical.com Date: Sat, 27 Oct 2012 04:48:52 -0700 Subject: [PA

2013-07-24 Thread Seth Arnold
On Sun, Jul 21, 2013 at 10:32:45PM -0700, John Johansen wrote: Signed-off-by: John Johansen john.johan...@canonical.com Wow, another awesome looking cleanup. Some comments inline. --- parser/parser.h | 6 ++ parser/parser_yacc.y | 191

Re: [apparmor] [PATCH 03/10] From a3f0ccf618c2016ce5fbaa0fe35d4f194fbefd2b Mon Sep 17 00:00:00 2001 From: John Johansen john.johan...@canonical.com Date: Sat, 27 Oct 2012 04:49:23 -0700 Subject: [PA

2013-07-24 Thread Seth Arnold
On Sun, Jul 21, 2013 at 10:32:46PM -0700, John Johansen wrote: let allow be used as a prefix in place of deny. Allow is the default and is implicit so it is not needed but some user keep tripping over it, and it makes the language more symmetric eg. /foo rw, allow /foo rw,

Re: [apparmor] [PATCH 04/10] From 34e17974b97355313e84feb74e92e5e3a91ef5e9 Mon Sep 17 00:00:00 2001 From: John Johansen john.johan...@canonical.com Date: Sat, 27 Oct 2012 04:50:11 -0700 Subject: [PA

2013-07-24 Thread Seth Arnold
On Sun, Jul 21, 2013 at 10:32:47PM -0700, John Johansen wrote: Refactor policydb entry processing so that post_process_policydb_ents is just a driver for rule specific routines. Signed-off-by: John Johansen john.johan...@canonical.com Acked-by: Seth Arnold seth.arn...@canonical.com Thanks

Re: [apparmor] [PATCH 05/10] From 030feaef9487e90fcd8ce3c1d7e97bf85ef1b320 Mon Sep 17 00:00:00 2001 From: John Johansen john.johan...@canonical.com Date: Sat, 27 Oct 2012 04:51:19 -0700 Subject: [PA

2013-07-24 Thread Seth Arnold
On Sun, Jul 21, 2013 at 10:32:48PM -0700, John Johansen wrote: Remove use of AARE_DFA as the alternate pcre matching engine was removed years ago. Signed-off-by: John Johansen john.johan...@canonical.com Acked-by: Seth Arnold seth.arn...@canonical.com Wow, keep these cleanups coming

Re: [apparmor] [PATCH] export set of capabilities supported by the apparmor module

2013-07-23 Thread Seth Arnold
This exports the set of capability names as generated by the kernel so that the policy compiler can support capability names as keywords dynamically when the kernel picks up new capabilities. Signed-off-by: John Johansen john.johan...@canonical.com Acked-by: Seth Arnold seth.arn...@canonical.com

Re: [apparmor] lightdm-guest-session profile: some issues.

2013-07-22 Thread Seth Arnold
On Mon, Jul 22, 2013 at 06:52:12PM +0200, Daniel Curtis wrote: Hi I would like to ask what happened with the *lightdm-guest-session * profile from */etc/apparmor.d/* directory? If I remember correctly, this profile contains a lot of policies, rules etc. Now it looks like this: #

Re: [apparmor] C based aa-exec

2013-07-11 Thread Seth Arnold
On Thu, Jul 11, 2013 at 03:53:05PM -0700, John Johansen wrote: So this is a C based version of aa-exec to replace the perl version. I like it better already... but... :) --- /* * Copyright (C) 2013 Canonical Ltd. * * This program is free software; you can redistribute it and/or

Re: [apparmor] IPC syntax - again

2013-07-10 Thread Seth Arnold
On Wed, Jul 10, 2013 at 01:35:35PM +0200, Ángel González wrote: Replying to differenet mails: now what of abstract sockets? They are the same as unix domain but begin with \0. We could use this notation or chose an alternate way of expressing it. network unix name=\0foo, or maybe

Re: [apparmor] apparmor policy versioning

2013-07-10 Thread Seth Arnold
On Wed, Jul 10, 2013 at 02:18:22PM -0700, John Johansen wrote: So it turns out we are going to need to support policy versioning (Christian can gloat now). The question because how we support it I'm pretty sure I've seen a matrix somewhere that described the different mediation semantics and

Re: [apparmor] [PATCH] aa-easyprof updates

2013-07-09 Thread Seth Arnold
On Sat, Jul 06, 2013 at 12:37:20PM -0500, Jamie Strandboge wrote: There's a race condition here; well, maybe not -race-, but self.template is updated before the sanity checks are performed. If either of those exceptions gets ignored in callers, the template is set to unsafe values.

Re: [apparmor] [Branch ~apparmor-dev/apparmor/master] Rev 2136: Kshitij Gupta found and fixed a problem with Glob and Glob w/ Ext behavior

2013-07-08 Thread Seth Arnold
and 2.8: Acked-by: Seth Arnold seth.arn...@canonical.com === modified file 'utils/Immunix/AppArmor.pm' --- utils/Immunix/AppArmor.pm 2013-07-05 21:12:08 + +++ utils/Immunix/AppArmor.pm 2013-07-09 00:31:23 + @@ -3879,8 +3879,8 @@ $newpath =~ s

Re: [apparmor] [Patch] Bug 888077 - aliases being partially applied

2013-07-08 Thread Seth Arnold
On Mon, Jul 08, 2013 at 02:06:42AM -0700, John Johansen wrote: Below is a mostly complete patch for https://bugs.launchpad.net/apparmor/+bug/888077 It is currently missing support for link and mount rules. This patch is done against the 2.8 branch, and the question is, is this something we

Re: [apparmor] [PATCH 1/3] Add new fontconfig configuration snippets path to the fonts abstraction.

2013-07-07 Thread Seth Arnold
Wilk jw...@debian.org on Debian bug #714843. Acked-by: Seth Arnold seth.arn...@canonical.com --- profiles/apparmor.d/abstractions/fonts | 1 + 1 file changed, 1 insertion(+) diff --git a/profiles/apparmor.d/abstractions/fonts b/profiles/apparmor.d/abstractions/fonts index d76b69f..f3b7f32

Re: [apparmor] [PATCH 2/3] Add fonts location within /usr/share/javascript to the fonts abstraction.

2013-07-07 Thread Seth Arnold
On Sat, Jul 06, 2013 at 10:47:45AM +0200, intrigeri+deb...@boum.org wrote: From: intrigeri intrig...@boum.org Debian sid's fonts-mathjax ships fonts in /usr/share/javascript/mathjax/fonts, that are now used by default by fontconfig-enabled software. Acked-by: Seth Arnold seth.arn

Re: [apparmor] Minimum versions of tools

2013-07-07 Thread Seth Arnold
On Sun, Jul 07, 2013 at 02:25:28PM +0200, Christian Boltz wrote: It makes sense, even if it sounds slightly funny to explicitely mention a perl version from 2007 ;-) Hey, I still think of Perl 5.004 as The New Perl. :) Thanks signature.asc Description: Digital signature -- AppArmor mailing

Re: [apparmor] [PATCH] aa-easyprof updates

2013-07-05 Thread Seth Arnold
On Mon, Jul 01, 2013 at 05:15:07PM -0500, Jamie Strandboge wrote: +def set_template(self, template, allow_abs_path=True): '''Set current template''' self.template = template +if ../ in template: +raise AppArmorException('template %s contains ../

[apparmor] [Bug 1180230] Re: glob in aa-genprof repeats same option

2013-07-05 Thread Seth Arnold
Here's the current Perl versions in Debian / Ubuntu world: Ubuntu packages: lucid: 5.10.1-8ubuntu2.3, Pocket: updates, Component: main precise: 5.14.2-6ubuntu2.3, Pocket: updates, Component: main quantal: 5.14.2-13ubuntu0.2, Pocket: updates, Component: main raring: 5.14.2-21, Pocket: release,

[apparmor] [Bug 1180230] Re: glob in aa-genprof repeats same option

2013-07-05 Thread Seth Arnold
I've checked this into trunk. I'm not sure about checking it into 2.8 though, since it introduces a requirement for Perl = 5.10.1 via the ~~ operator: http://stackoverflow.com/a/3095066/377270 ** Changed in: apparmor Assignee: Kshitij Gupta (kgupta8592) = AppArmor Developers (apparmor-dev)

[apparmor] Minimum versions of tools

2013-07-05 Thread Seth Arnold
Steve pointed out that I should document the Perl 5.10.1 minimum version dependency introduced by Kshitij's de-dup patch. I took the opportunity to broadly sketch our dependencies in our top-level README. Thoughts? Thanks Signed-off-by: Seth Arnold seth.arn...@canonical.com === modified file

Re: [apparmor] IPC syntax - again

2013-07-05 Thread Seth Arnold
On Sun, Jun 30, 2013 at 03:07:38AM -0700, John Johansen wrote: You've very nearly convinced me that for the various forms of on-machine IPC pairing does not make a lot of sense and the automatic label mechanism is a better fit. Ha! I haven't convinced my self. That is I know we can do

Re: [apparmor] [PATCH] aa-easyprof updates

2013-07-05 Thread Seth Arnold
On Mon, Jul 01, 2013 at 05:15:07PM -0500, Jamie Strandboge wrote: @@ -428,6 +546,7 @@ s = %s# No read paths specified % prefix if len(read_path) 0: s = %s# Specified read permissions % (prefix) +read_path.sort() for i in read_path:

Re: [apparmor] IPC syntax - again

2013-07-03 Thread Seth Arnold
I wrote a long detailed response to your questions but realized after a while that I was relying on some pretty huge assumptions on how the LSM networking hooks interact with the secmark hooks. So, rather than send a long email based on probably incorrect assumptions, I figured I better address

Re: [apparmor] [patch] backport python3 compability patch to 2.8 branch

2013-07-02 Thread Seth Arnold
acked-by statement, if possible. :) I'm sorry for letting this slip my mind. For 2.8, Acked-by: Seth Arnold seth.arn...@canonical.com signature.asc Description: Digital signature -- AppArmor mailing list AppArmor@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com

Re: [apparmor] IPC syntax - again

2013-06-28 Thread Seth Arnold
Impressive email, thanks. I can't begin to address all the open questions you raised, but we have to start somewhere, so here's my stab at what I felt was most important: Pairing You've very nearly convinced me that for the various forms of on-machine IPC pairing does not make a lot of sense

Re: [apparmor] [RFC] libapparmor: Don't expose a value-result param in aa_getpeercon_raw()

2013-06-25 Thread Seth Arnold
On Tue, Jun 25, 2013 at 01:19:17PM -0700, Tyler Hicks wrote: Unify aa_getprocattr_raw() and aa_getpeercon_raw() function prototypes by hiding the len value-result parameter. Signed-off-by: Tyler Hicks tyhi...@canonical.com Cc: Seth Arnold seth.arn...@canonical.com Cc: John Johansen

Re: [apparmor] [PATCH 2/7] libapparmor: fix return value of aa_getpeercon_raw

2013-06-25 Thread Seth Arnold
On Sun, Jun 23, 2013 at 04:23:14PM -0700, Tyler Hicks wrote: From: John Johansen john.johan...@canonical.com Return the total size of the security context on success as documented. Signed-off-by: John Johansen john.johan...@canonical.com Acked-by: Seth Arnold seth.arn...@canonical.com

Re: [apparmor] Using r, w, m, c altogether

2013-06-25 Thread Seth Arnold
On Wed, Jun 26, 2013 at 07:54:46AM +0800, Aaron Lewis wrote: Hi, Looks like I can use rwmc altogether, am I wrong? owner @{HOME}/.config/google-googletalkplugin/{**,} rwmc, I can't see 'c' support in our current parser source code, not can I get this to work in a test profile: $ echo /t {

Re: [apparmor] [PATCH 1/7] libapparmor: Safeguard aa_getpeercon buffer reallocation

2013-06-24 Thread Seth Arnold
On Sun, Jun 23, 2013 at 04:23:13PM -0700, Tyler Hicks wrote: From: John Johansen john.johan...@canonical.com Protect against bugs in AppArmor's getsockopt() LSM hook from sending aa_getpeercon() into an infinite loop. Signed-off-by: John Johansen john.johan...@canonical.com Acked-by: Seth

Re: [apparmor] [PATCH 5/7] libapparmor: Make aa_getpeercon_raw() similar to aa_getprocattr_raw()

2013-06-24 Thread Seth Arnold
On Sun, Jun 23, 2013 at 04:23:17PM -0700, Tyler Hicks wrote: The parameter names are slightly different in the two functions. Rename buffer to buf and rename size to len to make the two function prototypes look similar. Signed-off-by: Tyler Hicks tyhi...@canonical.com Acked-by: Seth Arnold

Re: [apparmor] [PATCH 4/7] libapparmor: Parse mode from confinement string in getpeercon functions

2013-06-24 Thread Seth Arnold
On Sun, Jun 23, 2013 at 04:23:16PM -0700, Tyler Hicks wrote: The functions that return the confinement information of a peer socket connection should parse and return the mode like the task-based functions. Signed-off-by: Tyler Hicks tyhi...@canonical.com Acked-by: Seth Arnold seth.arn

Re: [apparmor] [Merge] lp:~kensington/apparmor/apparmor into lp:apparmor

2013-06-20 Thread Seth Arnold
The hu linguas is missing a couple of key shortcuts, which can cause aa-logprof to fail: PromptUser: Érvénytelen gyorsbillentyű a következőhöz: 'Igen' (Invalid shortcut to following: 'Yes'). -- This looks good to me, Acked-By: Seth Arnold seth.arn...@canonical.com https

Re: [apparmor] [opensuse-project] Google Summer of Code'13 accepted student

2013-06-12 Thread Seth Arnold
On Wed, Jun 12, 2013 at 10:55:50AM -0700, John Johansen wrote: Till then, can someone help me out with the use case for the write function of the profile tools? I'm not sure if I'm thinking in the appropriate way. How are users expected to modify the config files? I can understand reading

Re: [apparmor] DBus rule syntax for subject and peer components

2013-06-12 Thread Seth Arnold
On Wed, Jun 12, 2013 at 03:42:34PM -0500, Jamie Strandboge wrote: So, here's a first shot at Proposal #4: [...] /usr/bin/gnome-screensaver { # Ignore file and accessibility bus access for this excercise file, dbus bus=accessibility, # sarnold I think we could remove this

Re: [apparmor] DBus rule syntax for subject and peer components

2013-06-11 Thread Seth Arnold
On Mon, Jun 10, 2013 at 06:44:13PM -0700, Tyler Hicks wrote: To start us off, here's the profile using the current DBus syntax. It is complex, but it uses all of the DBus accesses (send, receive, and acquire) and it is representative of what a real profile may look like. Thanks for this. These

Re: [apparmor] [PATCH] Move poppler cMap rule to fonts abstraction

2013-05-30 Thread Seth Arnold
. Imho it would make sense to move the rule from gnome to the fonts abstraction. gnome includes fonts so there shouldn't be any regression. Cheers, Felix Looks good to me, Thanks Acked-by: Seth Arnold seth.arn...@canonical.com === modified file 'profiles/apparmor.d/abstractions/fonts

Re: [apparmor] [opensuse-project] Google Summer of Code'13 accepted student

2013-05-30 Thread Seth Arnold
On Thu, May 30, 2013 at 08:31:31PM +0200, Christian Boltz wrote: Correct - the only missing part is support in the utilities, which is now on your list of wanted features ;-) Talking about feature ideas - it would be nice to have profile modification scriptable. I'm thinking about

Re: [apparmor] [PATCH] Move poppler cMap rule to fonts abstraction

2013-05-30 Thread Seth Arnold
On Thu, May 30, 2013 at 09:52:20AM -0700, Seth Arnold wrote: === modified file 'profiles/apparmor.d/abstractions/fonts' --- profiles/apparmor.d/abstractions/fonts 2013-01-05 06:05:53 + +++ profiles/apparmor.d/abstractions/fonts 2013-05-30 14:14:07 + @@ -44,3 +44,6

Re: [apparmor] [PATCH 24/36] apparmor: add abilitiy to print labels and update interface to use

2013-05-29 Thread Seth Arnold
On Wed, May 01, 2013 at 02:31:09PM -0700, John Johansen wrote: A few comments in line.. +bool aa_update_label_name(struct aa_namespace *ns, struct aa_label *label, + gfp_t gfp); + +int aa_profile_snprint(char *str, size_t size, struct aa_namespace *ns, +

Re: [apparmor] [PATCH 24/36] apparmor: add abilitiy to print labels and update interface to use

2013-05-29 Thread Seth Arnold
On Wed, May 29, 2013 at 09:23:52AM -0700, John Johansen wrote: Would you mind renaming the functions to _printf() where appropriate? These names don't really speak to me.. (Also, are all those really needed? :) yes I would, because its not appropriate, non of them take a format string

Re: [apparmor] [PATCH 25/36] apparmor: rework auditing to use the label

2013-05-29 Thread Seth Arnold
On Wed, May 01, 2013 at 02:31:10PM -0700, John Johansen wrote: Signed-off-by: John Johansen john.johan...@canonical.com Acked-by: Seth Arnold seth.arn...@canonical.com signature.asc Description: Digital signature -- AppArmor mailing list AppArmor@lists.ubuntu.com Modify settings

Re: [apparmor] [PATCH 26/36] apparmor: audit the profile and namespace for all messages

2013-05-29 Thread Seth Arnold
to know which namespace is in use so log the unconfined profile and its namespace as well. Signed-off-by: John Johansen john.johan...@canonical.com This is nice, it anticipated a question I had from the previous patch. :) Acked-by: Seth Arnold seth.arn...@canonical.com signature.asc

Re: [apparmor] [PATCH 27/36] apparmor: treat each task as if the label can have mutiple entries

2013-05-29 Thread Seth Arnold
what to do. The patch, as described, looked right to me, but my quibble is with the intention of too-early exits. :) So, uh, add Acked-by: Seth Arnold seth.arn...@canonical.com, but with the hope that a future patch changes a lot of the logging logic. :) Thanks signature.asc Description: Digital

Re: [apparmor] Google Summer of Code'13 accepted student

2013-05-28 Thread Seth Arnold
On Tue, May 28, 2013 at 07:33:09PM +0530, Kshitij Gupta wrote: I'm Kshitij Gupta from Lucknow, India. I had applied for GSoC under openSUSE and am glad to have been accepted as a student to work on Profile management tool for AppArmor under the guidance of Christian Boltz (Project Mentor).

Re: [apparmor] [PATCH 23/36] apparmor: introduce using labels from contexts

2013-05-22 Thread Seth Arnold
On Wed, May 01, 2013 at 02:31:08PM -0700, John Johansen wrote: Baby step to using labels instead of profiles. Switch from using profile refs to label refs. Note this step does not make any functional changes Signed-off-by: John Johansen john.johan...@canonical.com A few small comments

Re: [apparmor] [PATCH 20/36] apparmor: update profile interface file for labels

2013-05-21 Thread Seth Arnold
On Wed, May 01, 2013 at 02:31:05PM -0700, John Johansen wrote: Signed-off-by: John Johansen john.johan...@canonical.com --- security/apparmor/apparmorfs.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) Acked-by: Seth Arnold seth.arn...@canonical.com diff --git a/security/apparmor

Re: [apparmor] [PATCH 21/36] apparmor: baby step - now add labels to the labelset trees

2013-05-21 Thread Seth Arnold
On Wed, May 01, 2013 at 02:31:06PM -0700, John Johansen wrote: Just add the labels to the tree to make sure insertions and deletions into the rb tree are working. @@ -1330,6 +1347,8 @@ ssize_t aa_remove_profiles(char *fqname, size_t size) } name =

Re: [apparmor] [PATCH 22/36] apparmor: move replacedby to use labels instead of profiles

2013-05-21 Thread Seth Arnold
; + error = -ENOMEM; + goto fail_lock; There's a trailing space in the info = string. With these two typos fixed, Acked-by: Seth Arnold seth.arn...@canonical.com Thanks signature.asc Description: Digital signature -- AppArmor mailing list AppArmor

Re: [apparmor] default/system profile

2013-05-20 Thread Seth Arnold
On Sun, May 19, 2013 at 05:07:16AM -0700, John Johansen wrote: When a profile is created the first profile it is created with is the init profile. - this profile is replaceable, and set as the default profile - For the root namespace (namespace setup on boot) - this profile is setup in the

Re: [apparmor] [PATCH 19/36] apparmor: directly free a label if it has not been added to a labelset

2013-05-17 Thread Seth Arnold
On Wed, May 01, 2013 at 02:31:04PM -0700, John Johansen wrote: In error conditions is possible to put a label that has not been added to a labelset. In this case just directly free it. Signed-off-by: John Johansen john.johan...@canonical.com Acked-by: Seth Arnold seth.arn...@canonical.com

Re: [apparmor] [PATCH 18/36] apparmor: add basic support for implicit labeling of files

2013-05-16 Thread Seth Arnold
On Wed, May 01, 2013 at 02:31:03PM -0700, John Johansen wrote: The labeling of files is implied by the set of rules and profiles. Add the ability to set implicit labels on files to reduce the number of path and rule lookups that are needed. +static bool __aa_label_remove(struct aa_labelset

Re: [apparmor] default/system profile

2013-05-16 Thread Seth Arnold
On Wed, May 15, 2013 at 05:13:15PM -0700, John Johansen wrote: So this is a new attempt to frame the default/init/system profile discussion Interesting. I like it. There are several potential solutions to the problem of confining init and its early children 1. Policy load in the

Re: [apparmor] [PATCH 15/36] apparmor: Add profile introspection file to interface

2013-05-14 Thread Seth Arnold
On Wed, May 01, 2013 at 02:31:00PM -0700, John Johansen wrote: Add the dynamic profiles file to the interace, to allow load policy introspection. Signed-off-by: John Johansen john.johan...@canonical.com Acked-by: Kees Cook k...@ubuntu.com +/** + * __next_profile - step to the next profile

Re: [apparmor] [PATCH 17/36] apparmor: reuse name string from previous profile

2013-05-14 Thread Seth Arnold
On Wed, May 01, 2013 at 02:31:02PM -0700, John Johansen wrote: For profiles that have been replaced reuse the name string so the old and new version of the profile share the same string. This will make some checks/comparisons in labeling quicker. +static void share_name(struct aa_profile

Re: [apparmor] [PATCH 18/36] apparmor: add basic support for implicit labeling of files

2013-05-14 Thread Seth Arnold
On Wed, May 01, 2013 at 02:31:03PM -0700, John Johansen wrote: The labeling of files is implied by the set of rules and profiles. Add the ability to set implicit labels on files to reduce the number of path and rule lookups that are needed. Signed-off-by: John Johansen

Re: [apparmor] [PATCH] two updates to private-files*

2013-05-13 Thread Seth Arnold
-to-private.patch: deny writes to upstart user sessions jobs Oh, I meant to also nominate these for 2.8. Acked-By: Seth Arnold seth.arn...@canonical.com for both trunk and 2.8 signature.asc Description: Digital signature -- AppArmor mailing list AppArmor@lists.ubuntu.com Modify settings

Re: [apparmor] default profile

2013-05-10 Thread Seth Arnold
On Fri, May 10, 2013 at 11:24:46AM -0700, John Johansen wrote: currently the override to select the default profile is apparmor.unconfined=0 or N and to select unconfined apparmor.unconfined=Y this option is fine but I'm not fond of apparmor.unconfined=0 We could change this so that

Re: [apparmor] dbus/pair address rule encoding

2013-05-09 Thread Seth Arnold
On Thu, May 09, 2013 at 01:45:04PM -0700, Tyler Hicks wrote: I think that we're mostly ok. We just need to think about it a little differently. Here's the current syntax: DBUS RULE = [ 'audit' ] [ 'deny' ] 'dbus' [ DBUS BUS ] [ ( DBUS LOCAL CONDITIONS | - DBUS REMOTE CONDITIONS ) ] [ DBUS

Re: [apparmor] dbus/pair address rule encoding

2013-05-09 Thread Seth Arnold
On Thu, May 09, 2013 at 03:08:35PM -0700, John Johansen wrote: it depends how you look at it. To me it is changing the meaning of - of course I am now convinced that - is just wrong and we need different syntax, because - just seems to have too many potential different interpretations that

Re: [apparmor] dbus/pair address rule encoding

2013-05-09 Thread Seth Arnold
On Thu, May 09, 2013 at 03:27:24PM -0700, Tyler Hicks wrote: dbus [address spec] acquire, # unchanged dbus [address spec] - [address spec], # unidirectional dbus [address spec] - [address spec], # unidirectional dbus [address spec] - [address spec], # bidirectional I'm all for making

Re: [apparmor] [PATCH 08/36] apparmor: provide the ability to boot with a default profile set on init

2013-05-08 Thread Seth Arnold
On Wed, May 01, 2013 at 02:30:53PM -0700, John Johansen wrote: --- a/security/apparmor/Kconfig +++ b/security/apparmor/Kconfig @@ -29,3 +29,14 @@ config SECURITY_APPARMOR_BOOTPARAM_VALUE boot. If you are unsure how to answer this question, answer 1. + +config

Re: [apparmor] [PATCH 09/36] apparmor: fix fs extry display for default profile

2013-05-08 Thread Seth Arnold
On Wed, May 01, 2013 at 02:30:54PM -0700, John Johansen wrote: The default profile needs its replaced by information set as its on the profile list and will have an fs interface (and the fs interface files require a valid replacedby). Signed-off-by: John Johansen john.johan...@canonical.com

Re: [apparmor] [PATCH 10/36] apparmor: allow setting any profile into the unconfined state

2013-05-08 Thread Seth Arnold
On Wed, May 01, 2013 at 02:30:55PM -0700, John Johansen wrote: Allow emulating the default profile behavior from boot, by allowing loading of a profile in the unconfined state into a new NS. Signed-off-by: John Johansen john.johan...@canonical.com Acked-by: Seth Arnold seth.arn

Re: [apparmor] [patch] backport python3 compability patch to 2.8 branch

2013-05-06 Thread Seth Arnold
: line = re.sub(regex, my_repl, line.rstrip()) -print line +sys.stdout.write('%s\n' % line) +#print line This comment could be deleted. So feel free to add Skimmed-by: Seth Arnold seth.arn...@canonical.com or whatever says I didn't spot anything wrong but I also didn't

Re: [apparmor] GSoC Project on new AppArmor profile development tool

2013-05-03 Thread Seth Arnold
On Fri, May 03, 2013 at 09:43:15PM +0200, Christian Boltz wrote: Indeed - creating some profiles with genprof and logprof (and at the same time reading the audit.log and the resulting profile) is the easier and probably faster way to understand how genprof and logprof work. Goal: you

Re: [apparmor] GSoC Project on new AppArmor profile development tool

2013-05-01 Thread Seth Arnold
On Wed, May 01, 2013 at 05:35:03PM +0200, Christian Boltz wrote: Am Sonntag, 28. April 2013 schrieb Seth Arnold: I don't know anything about the GSoC project or process, but it'd be Let's change that ;-) We (Kshitij, John and I) discussed several things in private mails, but Kshitij's

Re: [apparmor] /dev/nvidiactl denied by Firefox profile.

2013-05-01 Thread Seth Arnold
On Tue, Apr 30, 2013 at 10:00:08PM +0200, Daniel Curtis wrote: Since I've put a Firefox default profile in 'enforce' mode, from some time in '/var/log/syslog' and '/var/log/kern.log' files, I see some entries about AppArmor activity. It always refers to one thing: '/dev/nvidiactl'. There is

Re: [apparmor] [PATCH 01/36] apparmor: provide base for multiple profiles to be replaced at once

2013-05-01 Thread Seth Arnold
On Wed, May 01, 2013 at 02:30:46PM -0700, John Johansen wrote: previously profiles had to be loaded one at a time, which could result in cases where a replacement would partially succeed, and then fail resulting in inconsitent policy. Allow multiple profiles to replaced atomically so that

Re: [apparmor] [PATCH 05/36] apparmor: fix namespace to be freeded via RCU

2013-05-01 Thread Seth Arnold
Johansen john.johan...@canonical.com Acked-by: Seth Arnold seth.arn...@canonical.com Thanks signature.asc Description: Digital signature -- AppArmor mailing list AppArmor@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/apparmor

Re: [apparmor] [PATCH 07/36] apparmor: use free_profile instead of put_profile when erroring out early

2013-05-01 Thread Seth Arnold
On Wed, May 01, 2013 at 02:30:52PM -0700, John Johansen wrote: aa_put_profile causes profiles to go throw an rcu based delayed free cycle. Discard profiles that can't be in use and hence don't need the delayed free call free_profile directly. This description doesn't seem to match the code,

Re: [apparmor] GSoC Project on new AppArmor profile development tool

2013-04-28 Thread Seth Arnold
On Wed, Apr 24, 2013 at 05:06:01PM +0530, Kshitij Gupta wrote: I am Kshitij and I would like to work on developing a new AppArmor profile management tool to further strengthen the AppArmor project as my Google Summer of Code project. I have been using both C/C++ and Python for a while and hope

Re: [apparmor] Firefox profile and ~/Downloads, ~/Public folders permission.

2013-04-28 Thread Seth Arnold
On Sun, Apr 28, 2013 at 04:05:30PM +0200, Daniel Curtis wrote: Default profile allows downloads to ~/Downloads and uploads from ~/Public, right? So, what should I do or add to achieve this functionality. For now I can upload and download files everywhere I want. I would like to achieve that

Re: [apparmor] [PATCH] audio and base abstraction updates

2013-04-08 Thread Seth Arnold
-By: Seth Arnold seth.arn...@canonical.com Thanks signature.asc Description: Digital signature -- AppArmor mailing list AppArmor@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/apparmor

Re: [apparmor] FatRat profile

2013-03-19 Thread Seth Arnold
On Tue, Mar 19, 2013 at 11:37:46PM +0400, Артём Н. wrote: Also I've added @{TORRENT_CLIENT} in tunables/global and I've granted permissions on execution it in browser's rules. tunables/global: @{TORRENT_CLIENT}=/usr/bin/fatrat This is going to lead to trouble. What we have now is

Re: [apparmor] [PATCH v3] apparmor: implement profile-based query interface in apparmorfs

2013-03-15 Thread Seth Arnold
...@canonical.com Acked-by: Seth Arnold seth.arn...@canonical.com Thanks Tyler! signature.asc Description: Digital signature -- AppArmor mailing list AppArmor@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/apparmor

Re: [apparmor] GSoC proposal text v3

2013-03-12 Thread Seth Arnold
On Mon, Mar 11, 2013 at 07:48:05PM -0700, John Johansen wrote: Alright so we have a GSoC proposal (current text below), through opensuse and I would like to put a couple of potential revisions to a vote. 1. Allowing for the Go language as an implementation option. I did this to allow the

Re: [apparmor] hello?

2013-03-11 Thread Seth Arnold
On Sat, Mar 09, 2013 at 07:46:39PM -0500, andrew barreto wrote: is this also for questions? On Sat, Mar 09, 2013 at 07:48:06PM -0500, andrew barreto wrote: hi is this a alternative to AppArmor@lists.ubuntu.com AppArmor@lists.ubuntu.com Most email servers don't care about capitalization of

Re: [apparmor] Some profiles

2013-03-11 Thread Seth Arnold
On Mon, Mar 11, 2013 at 09:12:57PM +0400, Артём Н. wrote: I can't found profiles for some programs, which I use. I use Debian OS and make profiles for it, but I hope, if they will be included in ubuntu packages, one time they will migrate from ubuntu to Debian. :-) Thanks for this :) Probably

Re: [apparmor] [PATCH RFC] Add profile-based libapparmor query interface

2013-03-07 Thread Seth Arnold
On Thu, Mar 07, 2013 at 03:38:17PM -0800, Tyler Hicks wrote: It sounds like we're both on the same page. Yes. :) $ gcc -Wall -o query-profile query_profile.c -lapparmor $ ldd query-profile linux-vdso.so.1 = (0x7fffe41fe000) libapparmor.so.1 = /usr/lib/libapparmor.so.1

Re: [apparmor] [PATCH RFC] Add profile-based libapparmor query interface

2013-03-07 Thread Seth Arnold
On Thu, Mar 07, 2013 at 04:17:39PM -0800, Tyler Hicks wrote: Am I just overcomplicating things? No, it is a potentially valid use case but I'm trying to keep this interface simple so that most applications don't have to worry about bitwise operations of four permission masks that come from

Re: [apparmor] [PATCH RFC] Add profile-based libapparmor query interface

2013-03-07 Thread Seth Arnold
Hicks tyhi...@canonical.com Acked-by: Seth Arnold seth.arn...@canonical.com Thanks Tyler! :) signature.asc Description: Digital signature -- AppArmor mailing list AppArmor@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/apparmor

Re: [apparmor] [PATCH v2] apparmor: implement profile-based query interface in apparmorfs

2013-03-06 Thread Seth Arnold
On Tue, Mar 05, 2013 at 06:38:35PM -0800, Tyler Hicks wrote: This looks really good. A few nitpicks inline.. Allow userspace applications to query for allowed, denied, audit, and quiet permissions using a profile name and a DFA match string. Userspace applications that wish to enforce access

Re: [apparmor] [PATCH v2] apparmor: implement profile-based query interface in apparmorfs

2013-03-06 Thread Seth Arnold
On Wed, Mar 06, 2013 at 04:39:00PM -0800, Tyler Hicks wrote: I may have tuned out a discussion on IRC about the 'deny' flags -- at least it feels like a conversation I've ignored :) -- but the profiles currently communicate 'deny' through the 'quiet' flags. Oh? I must have misunderstood

Re: [apparmor] [PATCH RFC] Add profile-based libapparmor query interface

2013-03-06 Thread Seth Arnold
On Tue, Mar 05, 2013 at 10:44:35PM -0800, Tyler Hicks wrote: * Setting two int return parameters to indicate allow and audit isn't a final solution. I was thinking that I'd return a special return code that will indicate error or allow and audit statuses. Then define some simple macros

Re: [apparmor] [PATCH] apparmor: add a features/dbus dir to securityfs interface

2013-03-05 Thread Seth Arnold
On Tue, Mar 05, 2013 at 07:42:26AM -0800, Tyler Hicks wrote: Add a dbus directory to the apparmor securityfs features subdirectory to contain a mask file with the supported D-Bus mediation rules. Signed-off-by: Tyler Hicks tyhi...@canonical.com Acked-by: Seth Arnold seth.arn...@canonical.com

Re: [apparmor] [patch] nscd profile

2013-03-05 Thread Seth Arnold
deny capability block_suspend because nobody can imagine why it would be needed. References: https://bugzilla.novell.com/show_bug.cgi?id=807104 Acked-by: Seth Arnold seth.arn...@canonical.com === modified file 'profiles/apparmor.d/usr.sbin.nscd' --- profiles/apparmor.d/usr.sbin.nscd 2013

Re: [apparmor] [PATCH 02/24] apparmor: convert profile lists to RCU based locking

2013-03-01 Thread Seth Arnold
@@ -546,17 +534,40 @@ static void __ns_list_release(struct list_head *head); */ static void destroy_namespace(struct aa_namespace *ns) { + struct aa_profile *unconfined; + if (!ns) return; - write_lock(ns-lock); + mutex_lock(ns-lock); /*

Re: [apparmor] [PATCH 02/24] apparmor: convert profile lists to RCU based locking

2013-03-01 Thread Seth Arnold
In the code below, the if (error) return error; near the top of the loop feels a bit out of place -- if one policy loads fine and a second policy fails the header check, a profile is on the list_head and never cleaned up. (I mentioned the caller of this function in a different email -- this is the

Re: [apparmor] [PATCH 01/24] apparmor: provide base for multiple profiles to be replaced at once

2013-02-28 Thread Seth Arnold
On Wed, Feb 27, 2013 at 10:14:00AM -0800, John Johansen wrote: * aa_replace_profiles - replace profile(s) on the profile list * @udata: serialized data stream (NOT NULL) * @size: size of the serialized data stream ... */ ssize_t aa_replace_profiles(void *udata, size_t size, bool

Re: [apparmor] [PATCH 02/24] apparmor: convert profile lists to RCU based locking

2013-02-28 Thread Seth Arnold
On Wed, Feb 27, 2013 at 10:14:01AM -0800, John Johansen wrote: signed-offby: John Johansen john.johan...@canonical.com Acked-By: Seth Arnold seth.arn...@canonical.com signature.asc Description: Digital signature -- AppArmor mailing list AppArmor@lists.ubuntu.com Modify settings

Re: [apparmor] [Merge] lp:~sdeziel/apparmor-profiles/fix-for-lp1133409 into lp:apparmor-profiles

2013-02-26 Thread Seth Arnold
Review: Approve Thanks, looks good to me. -- https://code.launchpad.net/~sdeziel/apparmor-profiles/fix-for-lp1133409/+merge/150605 Your team AppArmor Developers is subscribed to branch lp:apparmor-profiles. -- AppArmor mailing list AppArmor@lists.ubuntu.com Modify settings or unsubscribe at:

Re: [apparmor] [PATCH 19/43] apparmor: convert profile lists to RCU based locking

2013-02-26 Thread Seth Arnold
On Fri, Feb 08, 2013 at 01:00:55PM -0800, John Johansen wrote: @@ -1091,13 +1098,13 @@ ssize_t aa_replace_profiles(void *udata, size_t size, bool noreplace) Again, found while reviewing this patch, but not actually changed by _this_ patch at all. (Sorry.) My comments are out here:

Re: [apparmor] [PATCH 19/43] apparmor: convert profile lists to RCU based locking

2013-02-21 Thread Seth Arnold
Sorry this might be confusing, I had been looking at the top of your tree for my code inspections while reading through the details of the patch. So some of the references to profile-parent or __list_add_profile might have been added by _future_ patches -- I was afraid I'd forget the details if I

Re: [apparmor] [PATCH 19/43] apparmor: convert profile lists to RCU based locking

2013-02-20 Thread Seth Arnold
On Fri, Feb 08, 2013 at 01:00:55PM -0800, John Johansen wrote: +/** + * aa_get_profile_rcu - increment a refcount profile that can be replaced + * @p: pointer to profile that can be replaced (NOT NULL) + * + * Returns: pointer to a refcounted profile. + * else NULL if no profile + */

Re: [apparmor] [PATCH] 0001-fix-aa-sandbox-race.patch

2013-02-15 Thread Seth Arnold
On Fri, Feb 15, 2013 at 11:10:24AM -0600, Jamie Strandboge wrote: +for i in range(self.timeout): # Up to self.timeout seconds to start rc, out = cmd(['xpra', 'list']) + +if 'DEAD session at %s' % self.display in out: +error(xpra session at '%s'

Re: [apparmor] [PATCH 19/43] apparmor: convert profile lists to RCU based locking

2013-02-14 Thread Seth Arnold
On Fri, Feb 08, 2013 at 01:00:55PM -0800, John Johansen wrote: signed-offby: John Johansen john.johan...@canonical.com --- security/apparmor/domain.c | 15 ++- security/apparmor/include/apparmor.h |6 ++ security/apparmor/include/policy.h | 44 +++-

<    4   5   6   7   8   9   10   >