[Touch-packages] [Bug 1662501] Re: AppArmor profile for ubuntu-browsers allows too much read access

2017-02-07 Thread Jamie Strandboge
Thank you for using Ubuntu and filing a bug! While /etc/apparmor.d/abstractions/ubuntu-browsers.d/user-files is shipped by apparmor, it is actually /etc/apparmor.d/abstractions/ubuntu- browsers.d/firefox that #include's it, and this file is managed by the firefox package, so moving this bug

[Touch-packages] [Bug 1662501] Re: AppArmor profile for ubuntu-browsers allows too much read access

2017-02-07 Thread Vlad K.
Jeremy, that would not cover the general access case I was talking about. Please note, this is not a personal bug that I can't solve. I've modified my Firefox profile to address these issues as much as I can (as much as capable but not omnipotent AppArmor can do). I'm concerned about defaults

[Touch-packages] [Bug 1662501] Re: AppArmor profile for ubuntu-browsers allows too much read access

2017-02-07 Thread Jeremy Bicha
What about blocking access by default to directories that begin with . (like .config, .cache, etc.) ? I think that might fix your KeePassX use case but still allow users to use their browser to upload pictures either from their Pictures/ directory or whatever named normal directory in their home

[Touch-packages] [Bug 1662501] Re: AppArmor profile for ubuntu-browsers allows too much read access

2017-02-07 Thread Vlad K.
Just a comment about snaps. The snaps would have the same kind of problem, if convenience is a factor. But most importantly, these security issues should be communicated to the user. If convenience is a critical and important default. "The [snap|browser] you've just installed is secured against