[Touch-packages] [Bug 1362199] Re: [FFe] apparmor abstract, anonymous and netlink socket mediation

2014-09-05 Thread Jamie Strandboge
** Changed in: apparmor-easyprof-ubuntu (Ubuntu)
   Importance: Undecided = Critical

** Changed in: apparmor (Ubuntu)
 Assignee: (unassigned) = Jamie Strandboge (jdstrand)

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to isc-dhcp in Ubuntu.
https://bugs.launchpad.net/bugs/1362199

Title:
  [FFe] apparmor abstract, anonymous and netlink socket mediation

Status in “apparmor” package in Ubuntu:
  In Progress
Status in “apparmor-easyprof-ubuntu” package in Ubuntu:
  In Progress
Status in “isc-dhcp” package in Ubuntu:
  In Progress
Status in “libvirt” package in Ubuntu:
  In Progress
Status in “lightdm” package in Ubuntu:
  In Progress
Status in “linux” package in Ubuntu:
  In Progress
Status in “rsyslog” package in Ubuntu:
  In Progress
Status in “tlsdate” package in Ubuntu:
  In Progress

Bug description:
  Background: kernel and apparmor userspace updates to support abstract,
  anonymous and fine-grained netlink socket mediation. These packages
  are listed in one bug because they are related, but the FFes may be
  granted and the uploads may happen at different times.

  = linux =
  Summary:
  This feature freeze exception is requested for abstract, anonymous and 
fine-grained netlink socket via apparmor in the kernel. When used with a 
compatible apparmor userspace, 'unix' and 'network netlink' rules are 
supported. When used without a compatible apparmor userspace (eg, on a trusty 
system with an utopic backport kernel), abstract, anonymous and fine-grained 
netlink socket mediation is not enforced (ie, you can use this kernel with an 
old userspace without any issues).

  Testing:
  * 14.04 system with backported kernel: TODO
   * test-apparmor.py: TODO (runs extensive tests (upstream and distro))
   * exploratory manual testing: TODO (networking, aa-enforce with firefox, 
firefox works, apparmor blocks access, etc)
   * aa-status: TODO
   * lxc: TODO (containers can be created, started, shutdown)
   * libvirt: TODO (VMs started via openstack, and test-libvirt.py from QRT 
passes all tests)
  * 14.10 system (non-Touch) with current apparmor userspace: TODO (relevant 
parts of https://wiki.ubuntu.com/Process/Merges/TestPlans/AppArmor)
   * test-apparmor.py: TODO (runs extensive tests (upstream and distro))
   * exploratory manual testing: TODO (networking, aa-enforce with firefox, 
firefox works, apparmor blocks access, etc)
   * aa-status: TODO
   * lxc: TODO (containers can be created, started, shutdown)
   * libvirt: TODO (QRT/script/test-libvirt.py (though there are 3 failures 
unrelated to apparmor))
   * click-apparmor QRT touch image tests: TODO
   * apparmor-easyprof-ubuntu QRT touch image tests: TODO
  * 14.10 system (non-Touch) with updated apparmor userspace capable of 
supporting abstract, anonymous and fine-grained netlink socket: TODO (relevant 
parts of https://wiki.ubuntu.com/Process/Merges/TestPlans/AppArmor)
   * test-apparmor.py: TODO (runs extensive tests (upstream and distro))
   * exploratory manual testing: TODO (networking, aa-enforce with firefox, 
firefox works, apparmor blocks access, etc)
   * aa-status: TODO
   * lxc: TODO (containers can be created, started, shutdown)
   * libvirt: TODO (QRT/script/test-libvirt.py (though there are 3 failures 
unrelated to apparmor))
   * click-apparmor QRT touch image tests: TODO
   * apparmor-easyprof-ubuntu QRT touch image tests: TODO

  Justification:
  This feature is required to support comprehensive application confinement on 
Ubuntu Touch. This feature adds a security benefit to libvirt's qemu guest 
isolation which is fundamental to Ubuntu on Server/Cloud. This feature also 
adds a welcome improvement to administrators wishing to further protect their 
systems.

  = apparmor userspace =
  Summary:
  This feature freeze exception is requested for abstract, anonymous and 
fine-grained netlink socket for apparmor userspace. When used with a compatible 
kernel, 'unix' and 'network netlink' rules are supported. When used without a 
compatible apparmor userspace (eg, on a trusty system with an utopic backport 
kernel), abstract, anonymous and fine-grained netlink socket mediation is not 
enforced (ie, you can use this userspace with an old kernel without any issues).

  Testing:
  * 14.10 system with current kernel:
   * https://wiki.ubuntu.com/Process/Merges/TestPlans/AppArmor: DONE (includes 
click-apparmor, apparmor-easyprof-ubuntu, exploratory manual testing, etc)
  * 14.10 system with previous kernel lacking abstract, anonymous and 
fine-grained netlink socket mediation (non-Touch):
   * https://wiki.ubuntu.com/Process/Merges/TestPlans/AppArmor: DONE 
(exploratory manual testing, lxc, libvirt, etc)
   * test-apparmor.py: DONE
   * lightdm guest session: DONE (login, start browser, logout)
  * 14.10 system kernel capable of supporting abstract, anonymous and 
fine-grained netlink socket mediation (non-Touch):
   * https://wiki.ubuntu.com/Process/Merges

[Touch-packages] [Bug 1362199] Re: [FFe] apparmor abstract, anonymous and netlink socket mediation

2014-09-05 Thread Jamie Strandboge
isc-dhcp (4.2.4-7ubuntu14) utopic; urgency=medium

  * debian/apparmor-profile.dhclient: add file_inherit inet{,6} dgram rules
for child profiles

** Changed in: isc-dhcp (Ubuntu)
   Status: In Progress = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to isc-dhcp in Ubuntu.
https://bugs.launchpad.net/bugs/1362199

Title:
  [FFe] apparmor abstract, anonymous and netlink socket mediation

Status in “apparmor” package in Ubuntu:
  In Progress
Status in “apparmor-easyprof-ubuntu” package in Ubuntu:
  In Progress
Status in “isc-dhcp” package in Ubuntu:
  Fix Released
Status in “libvirt” package in Ubuntu:
  In Progress
Status in “lightdm” package in Ubuntu:
  In Progress
Status in “linux” package in Ubuntu:
  In Progress
Status in “rsyslog” package in Ubuntu:
  In Progress
Status in “tlsdate” package in Ubuntu:
  In Progress

Bug description:
  Background: kernel and apparmor userspace updates to support abstract,
  anonymous and fine-grained netlink socket mediation. These packages
  are listed in one bug because they are related, but the FFes may be
  granted and the uploads may happen at different times.

  = linux =
  Summary:
  This feature freeze exception is requested for abstract, anonymous and 
fine-grained netlink socket via apparmor in the kernel. When used with a 
compatible apparmor userspace, 'unix' and 'network netlink' rules are 
supported. When used without a compatible apparmor userspace (eg, on a trusty 
system with an utopic backport kernel), abstract, anonymous and fine-grained 
netlink socket mediation is not enforced (ie, you can use this kernel with an 
old userspace without any issues).

  Testing:
  * 14.04 system with backported kernel: TODO
   * test-apparmor.py: TODO (runs extensive tests (upstream and distro))
   * exploratory manual testing: TODO (networking, aa-enforce with firefox, 
firefox works, apparmor blocks access, etc)
   * aa-status: TODO
   * lxc: TODO (containers can be created, started, shutdown)
   * libvirt: TODO (VMs started via openstack, and test-libvirt.py from QRT 
passes all tests)
  * 14.10 system (non-Touch) with current apparmor userspace: TODO (relevant 
parts of https://wiki.ubuntu.com/Process/Merges/TestPlans/AppArmor)
   * test-apparmor.py: TODO (runs extensive tests (upstream and distro))
   * exploratory manual testing: TODO (networking, aa-enforce with firefox, 
firefox works, apparmor blocks access, etc)
   * aa-status: TODO
   * lxc: TODO (containers can be created, started, shutdown)
   * libvirt: TODO (QRT/script/test-libvirt.py (though there are 3 failures 
unrelated to apparmor))
   * click-apparmor QRT touch image tests: TODO
   * apparmor-easyprof-ubuntu QRT touch image tests: TODO
  * 14.10 system (non-Touch) with updated apparmor userspace capable of 
supporting abstract, anonymous and fine-grained netlink socket: TODO (relevant 
parts of https://wiki.ubuntu.com/Process/Merges/TestPlans/AppArmor)
   * test-apparmor.py: TODO (runs extensive tests (upstream and distro))
   * exploratory manual testing: TODO (networking, aa-enforce with firefox, 
firefox works, apparmor blocks access, etc)
   * aa-status: TODO
   * lxc: TODO (containers can be created, started, shutdown)
   * libvirt: TODO (QRT/script/test-libvirt.py (though there are 3 failures 
unrelated to apparmor))
   * click-apparmor QRT touch image tests: TODO
   * apparmor-easyprof-ubuntu QRT touch image tests: TODO

  Justification:
  This feature is required to support comprehensive application confinement on 
Ubuntu Touch. This feature adds a security benefit to libvirt's qemu guest 
isolation which is fundamental to Ubuntu on Server/Cloud. This feature also 
adds a welcome improvement to administrators wishing to further protect their 
systems.

  = apparmor userspace =
  Summary:
  This feature freeze exception is requested for abstract, anonymous and 
fine-grained netlink socket for apparmor userspace. When used with a compatible 
kernel, 'unix' and 'network netlink' rules are supported. When used without a 
compatible apparmor userspace (eg, on a trusty system with an utopic backport 
kernel), abstract, anonymous and fine-grained netlink socket mediation is not 
enforced (ie, you can use this userspace with an old kernel without any issues).

  Testing:
  * 14.10 system with current kernel:
   * https://wiki.ubuntu.com/Process/Merges/TestPlans/AppArmor: DONE (includes 
click-apparmor, apparmor-easyprof-ubuntu, exploratory manual testing, etc)
  * 14.10 system with previous kernel lacking abstract, anonymous and 
fine-grained netlink socket mediation (non-Touch):
   * https://wiki.ubuntu.com/Process/Merges/TestPlans/AppArmor: DONE 
(exploratory manual testing, lxc, libvirt, etc)
   * test-apparmor.py: DONE
   * lightdm guest session: DONE (login, start browser, logout)
  * 14.10 system kernel capable of supporting abstract, anonymous and 
fine-grained netlink socket mediation (non-Touch):

[Touch-packages] [Bug 1366314] Re: security issue? auto suggest seems to copy credentials into clipboard

2014-09-08 Thread Jamie Strandboge
It does seem that the keyboard shouldn't be putting whatever you type
into the clipboard.

That said, I wonder if this is also a bug in the terminal app? Maybe it isn't 
using these:
Qt.ImhHiddenText - Characters should be hidden, as is typically used when 
entering passwords. This is automatically set when setting echoMode to 
TextInput.Password.
Qt.ImhSensitiveData - Typed text should not be stored by the active input 
method in any persistent storage like predictive user dictionary.

Note, AIUI, the filemanager app uses the same embedded password checking
backend as the terminal so it may be affected too.

Reference:
http://people.canonical.com/~dpm/sdk-docs/html.orig/qml-ubuntu-components0-textfield.html

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ubuntu-keyboard in Ubuntu.
https://bugs.launchpad.net/bugs/1366314

Title:
  security issue? auto suggest seems to copy credentials into clipboard

Status in “ubuntu-keyboard” package in Ubuntu:
  New

Bug description:
  on todays image (krillin rtm-proposed r21) with ONLY auto suggest
  language option on I get:

  13:57  asac 1. kill terminal
  13:57  asac 2. open terminal and enter pin
  13:57  asac 3. click in terminal pastes my pin :)

  obviously not good for security. Think might be bad.

  Seems its not getting to dictionary at least:

  13:58  asac 4. /me uses backspace to delete
  13:58  asac 5. type ls
  13:58  asac 6. type first digit of pin - does not suggest my pin

  This doesn't happen if I turn auto suggestion off. Not sure if the
  paste is what doesn't happen or the clipboarding doesn't happen.
  Surely important to check out and know for sure.

  We should check other credential prompts too: pin lock screen, sim pin
  etc.

  Haven't tried, but I assume UITK password fields and browser dont have
  that, but might be worth checking.

  Thanks!

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-keyboard/+bug/1366314/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1362199] Re: [FFe] apparmor abstract, anonymous and netlink socket mediation

2014-09-08 Thread Jamie Strandboge
** Description changed:

  Background: kernel and apparmor userspace updates to support abstract,
  anonymous and fine-grained netlink socket mediation. These packages are
  listed in one bug because they are related, but the FFes may be granted
  and the uploads may happen at different times.
+ 
+ = apparmor userspace =
+ Summary:
+ This feature freeze exception is requested for abstract, anonymous and 
fine-grained netlink socket for apparmor userspace. When used with a compatible 
kernel, 'unix' and 'network netlink' rules are supported. When used without a 
compatible apparmor userspace (eg, on a trusty system with an utopic backport 
kernel), abstract, anonymous and fine-grained netlink socket mediation is not 
enforced (ie, you can use this userspace with an old kernel without any issues).
+ 
+ Testing:
+ * 14.10 system with previous kernel lacking abstract, anonymous and 
fine-grained netlink socket mediation (non-Touch):
+  * https://wiki.ubuntu.com/Process/Merges/TestPlans/AppArmor: DONE 
(exploratory manual testing, lxc, libvirt, etc)
+ * 14.10 system kernel capable of supporting abstract, anonymous and 
fine-grained netlink socket mediation (non-Touch):
+  * https://wiki.ubuntu.com/Process/Merges/TestPlans/AppArmor: INPROGRESS 
(includes test-apparmor.py, exploratory manual testing, lxc, libvirt, etc)
+  * Verify everything in 
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/AppArmorProfiles: DONE 
(except juju since it doesn't have policy itself)
+ 
+ Justification:
+ This feature is required to support comprehensive application confinement on 
Ubuntu Touch. This feature adds a security benefit to libvirt's qemu guest 
isolation which is fundamental to Ubuntu on Server/Cloud. This feature also 
adds a welcome improvement to administrators wishing to further protect their 
systems.
+ 
+ Extra information:
+ While the apparmor userspace and kernel changes to support abstract, 
anonymous and fine-grained netlink socket can happen at different times, the 
apparmor userspace upload must correspond with uploads for packages that ship 
AppArmor policy that require updates (eg, libvirt, lxc, etc). The packages 
outlined in https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/AppArmorProfiles 
have been tested to either work without modification to the policy or updated 
and tested to work with updated policy. Common rules will be added to the 
apparmor base abstraction such that most packages shipping apparmor policy will 
not require updating. These updates will be prepared, tested and published en 
masse via a silo ppa.
+ 
  
  = linux =
  Summary:
  This feature freeze exception is requested for abstract, anonymous and 
fine-grained netlink socket via apparmor in the kernel. When used with a 
compatible apparmor userspace, 'unix' and 'network netlink' rules are 
supported. When used without a compatible apparmor userspace (eg, on a trusty 
system with an utopic backport kernel), abstract, anonymous and fine-grained 
netlink socket mediation is not enforced (ie, you can use this kernel with an 
old userspace without any issues).
  
  Testing:
  * 14.04 system with backported kernel: TODO
-  * test-apparmor.py: TODO (runs extensive tests (upstream and distro))
-  * exploratory manual testing: TODO (networking, aa-enforce with firefox, 
firefox works, apparmor blocks access, etc)
-  * aa-status: TODO
-  * lxc: TODO (containers can be created, started, shutdown)
-  * libvirt: TODO (VMs started via openstack, and test-libvirt.py from QRT 
passes all tests)
- * 14.10 system (non-Touch) with current apparmor userspace: TODO (relevant 
parts of https://wiki.ubuntu.com/Process/Merges/TestPlans/AppArmor)
-  * test-apparmor.py: TODO (runs extensive tests (upstream and distro))
-  * exploratory manual testing: TODO (networking, aa-enforce with firefox, 
firefox works, apparmor blocks access, etc)
-  * aa-status: TODO
-  * lxc: TODO (containers can be created, started, shutdown)
-  * libvirt: TODO (QRT/script/test-libvirt.py (though there are 3 failures 
unrelated to apparmor))
-  * click-apparmor QRT touch image tests: TODO
-  * apparmor-easyprof-ubuntu QRT touch image tests: TODO
- * 14.10 system (non-Touch) with updated apparmor userspace capable of 
supporting abstract, anonymous and fine-grained netlink socket: TODO (relevant 
parts of https://wiki.ubuntu.com/Process/Merges/TestPlans/AppArmor)
-  * test-apparmor.py: TODO (runs extensive tests (upstream and distro))
-  * exploratory manual testing: TODO (networking, aa-enforce with firefox, 
firefox works, apparmor blocks access, etc)
-  * aa-status: TODO
-  * lxc: TODO (containers can be created, started, shutdown)
-  * libvirt: TODO (QRT/script/test-libvirt.py (though there are 3 failures 
unrelated to apparmor))
-  * click-apparmor QRT touch image tests: TODO
-  * apparmor-easyprof-ubuntu QRT touch image tests: TODO
+  * test-apparmor.py: TODO (runs extensive tests (upstream and distro))
+  * exploratory manual testing: TODO (networking, aa-enforce with 

[Touch-packages] [Bug 1362199] Re: [FFe] apparmor abstract, anonymous and netlink socket mediation

2014-09-08 Thread Jamie Strandboge
** Description changed:

  Background: kernel and apparmor userspace updates to support abstract,
  anonymous and fine-grained netlink socket mediation. These packages are
  listed in one bug because they are related, but the FFes may be granted
  and the uploads may happen at different times.
  
  = apparmor userspace =
  Summary:
  This feature freeze exception is requested for abstract, anonymous and 
fine-grained netlink socket for apparmor userspace. When used with a compatible 
kernel, 'unix' and 'network netlink' rules are supported. When used without a 
compatible apparmor userspace (eg, on a trusty system with an utopic backport 
kernel), abstract, anonymous and fine-grained netlink socket mediation is not 
enforced (ie, you can use this userspace with an old kernel without any issues).
  
  Testing:
- * 14.10 system with previous kernel lacking abstract, anonymous and 
fine-grained netlink socket mediation (non-Touch):
+ * 14.10 system with current kernels lacking abstract, anonymous and 
fine-grained netlink socket mediation (non-Touch):
   * https://wiki.ubuntu.com/Process/Merges/TestPlans/AppArmor: DONE 
(exploratory manual testing, lxc, libvirt, etc)
  * 14.10 system kernel capable of supporting abstract, anonymous and 
fine-grained netlink socket mediation (non-Touch):
   * https://wiki.ubuntu.com/Process/Merges/TestPlans/AppArmor: INPROGRESS 
(includes test-apparmor.py, exploratory manual testing, lxc, libvirt, etc)
   * Verify everything in 
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/AppArmorProfiles: DONE 
(except juju since it doesn't have policy itself)
  
  Justification:
  This feature is required to support comprehensive application confinement on 
Ubuntu Touch. This feature adds a security benefit to libvirt's qemu guest 
isolation which is fundamental to Ubuntu on Server/Cloud. This feature also 
adds a welcome improvement to administrators wishing to further protect their 
systems.
  
  Extra information:
  While the apparmor userspace and kernel changes to support abstract, 
anonymous and fine-grained netlink socket can happen at different times, the 
apparmor userspace upload must correspond with uploads for packages that ship 
AppArmor policy that require updates (eg, libvirt, lxc, etc). The packages 
outlined in https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/AppArmorProfiles 
have been tested to either work without modification to the policy or updated 
and tested to work with updated policy. Common rules will be added to the 
apparmor base abstraction such that most packages shipping apparmor policy will 
not require updating. These updates will be prepared, tested and published en 
masse via a silo ppa.
  
- 
  = linux =
  Summary:
  This feature freeze exception is requested for abstract, anonymous and 
fine-grained netlink socket via apparmor in the kernel. When used with a 
compatible apparmor userspace, 'unix' and 'network netlink' rules are 
supported. When used without a compatible apparmor userspace (eg, on a trusty 
system with an utopic backport kernel), abstract, anonymous and fine-grained 
netlink socket mediation is not enforced (ie, you can use this kernel with an 
old userspace without any issues).
  
  Testing:
  * 14.04 system with backported kernel: TODO
-  * test-apparmor.py: TODO (runs extensive tests (upstream and distro))
-  * exploratory manual testing: TODO (networking, aa-enforce with firefox, 
firefox works, apparmor blocks access, etc)
-  * aa-status: TODO
-  * lxc: TODO (containers can be created, started, shutdown)
-  * libvirt: TODO (VMs started via openstack, and test-libvirt.py from QRT 
passes all tests)
+  * test-apparmor.py: TODO (runs extensive tests (upstream and distro))
+  * exploratory manual testing: TODO (networking, aa-enforce with firefox, 
firefox works, apparmor blocks access, etc)
+  * aa-status: TODO
+  * lxc: TODO (containers can be created, started, shutdown)
+  * libvirt: TODO (VMs started via openstack, and test-libvirt.py from QRT 
passes all tests)
  * 14.10 system (non-Touch) with updated kernel:
-  * https://wiki.ubuntu.com/Process/Merges/TestPlans/AppArmor: INPROGRESS 
(includes click-apparmor, apparmor-easyprof-ubuntu, exploratory manual testing, 
etc)
+  * https://wiki.ubuntu.com/Process/Merges/TestPlans/AppArmor: INPROGRESS 
(includes click-apparmor, apparmor-easyprof-ubuntu, exploratory manual testing, 
etc)
  * 14.10 system (Touch) with updated kernel:
-  * https://wiki.ubuntu.com/Process/Merges/TestPlans/AppArmor: INPROGRESS 
(includes click-apparmor, apparmor-easyprof-ubuntu, exploratory manual testing, 
etc)
+  * https://wiki.ubuntu.com/Process/Merges/TestPlans/AppArmor: INPROGRESS 
(includes click-apparmor, apparmor-easyprof-ubuntu, exploratory manual testing, 
etc)
  
  Justification:
  This feature is required to support comprehensive application confinement on 
Ubuntu Touch. This feature adds a security benefit to libvirt's qemu guest 
isolation which is fundamental to Ubuntu on Server/Cloud. 

[Touch-packages] [Bug 1362199] Re: [FFe] apparmor abstract, anonymous and netlink socket mediation

2014-09-08 Thread Jamie Strandboge
1) old kernel and new userspace
- this is well tested and ready to land now

2) new kernel and old userspace
3) new kernel and new userspace
- these are tested, but need more testing on the kernel side. We are finalizing 
the kernel and will have these in place for kernel pull requests

Ah, I did not update AppArmor's debian/control for the Breaks like I did
for the signal and ptrace mediation, but meant to. Thanks for the
reminder, I'll do that now.

Here are the apparmor changes:
https://code.launchpad.net/~apparmor-dev/apparmor/apparmor-ubuntu-citrain.abstract

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to isc-dhcp in Ubuntu.
https://bugs.launchpad.net/bugs/1362199

Title:
  [FFe] apparmor abstract, anonymous and netlink socket mediation

Status in “apparmor” package in Ubuntu:
  In Progress
Status in “apparmor-easyprof-ubuntu” package in Ubuntu:
  In Progress
Status in “isc-dhcp” package in Ubuntu:
  Fix Released
Status in “libvirt” package in Ubuntu:
  In Progress
Status in “lightdm” package in Ubuntu:
  In Progress
Status in “linux” package in Ubuntu:
  In Progress
Status in “rsyslog” package in Ubuntu:
  In Progress
Status in “tlsdate” package in Ubuntu:
  In Progress

Bug description:
  Background: kernel and apparmor userspace updates to support abstract,
  anonymous and fine-grained netlink socket mediation. These packages
  are listed in one bug because they are related, but the FFes may be
  granted and the uploads may happen at different times.

  = apparmor userspace =
  Summary:
  This feature freeze exception is requested for abstract, anonymous and 
fine-grained netlink socket for apparmor userspace. When used with a compatible 
kernel, 'unix' and 'network netlink' rules are supported. When used without a 
compatible apparmor userspace (eg, on a trusty system with an utopic backport 
kernel), abstract, anonymous and fine-grained netlink socket mediation is not 
enforced (ie, you can use this userspace with an old kernel without any issues).

  Testing:
  * 14.10 system with current kernels lacking abstract, anonymous and 
fine-grained netlink socket mediation (non-Touch):
   * https://wiki.ubuntu.com/Process/Merges/TestPlans/AppArmor: DONE 
(exploratory manual testing, lxc, libvirt, etc)
  * 14.10 system kernel capable of supporting abstract, anonymous and 
fine-grained netlink socket mediation (non-Touch):
   * https://wiki.ubuntu.com/Process/Merges/TestPlans/AppArmor: INPROGRESS 
(includes test-apparmor.py, exploratory manual testing, lxc, libvirt, etc)
   * Verify everything in 
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/AppArmorProfiles: DONE 
(except juju since it doesn't have policy itself)

  Justification:
  This feature is required to support comprehensive application confinement on 
Ubuntu Touch. This feature adds a security benefit to libvirt's qemu guest 
isolation which is fundamental to Ubuntu on Server/Cloud. This feature also 
adds a welcome improvement to administrators wishing to further protect their 
systems.

  Extra information:
  While the apparmor userspace and kernel changes to support abstract, 
anonymous and fine-grained netlink socket can happen at different times, the 
apparmor userspace upload must correspond with uploads for packages that ship 
AppArmor policy that require updates (eg, libvirt, lightdm, etc). The packages 
outlined in https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/AppArmorProfiles 
have been tested to either work without modification to the policy or updated 
and tested to work with updated policy. Common rules will be added to the 
apparmor base abstraction such that most packages shipping apparmor policy will 
not require updating. These updates will be prepared, tested and published en 
masse via a silo ppa.

  = linux =
  Summary:
  This feature freeze exception is requested for abstract, anonymous and 
fine-grained netlink socket via apparmor in the kernel. When used with a 
compatible apparmor userspace, 'unix' and 'network netlink' rules are 
supported. When used without a compatible apparmor userspace (eg, on a trusty 
system with an utopic backport kernel), abstract, anonymous and fine-grained 
netlink socket mediation is not enforced (ie, you can use this kernel with an 
old userspace without any issues).

  Testing:
  * 14.04 system with backported kernel: TODO
   * test-apparmor.py: TODO (runs extensive tests (upstream and distro))
   * exploratory manual testing: TODO (networking, aa-enforce with firefox, 
firefox works, apparmor blocks access, etc)
   * aa-status: TODO
   * lxc: TODO (containers can be created, started, shutdown)
   * libvirt: TODO (VMs started via openstack, and test-libvirt.py from QRT 
passes all tests)
  * 14.10 system (non-Touch) with updated kernel:
   * https://wiki.ubuntu.com/Process/Merges/TestPlans/AppArmor: INPROGRESS 
(includes click-apparmor, apparmor-easyprof-ubuntu, exploratory manual testing, 
etc)
  * 14.10 

[Touch-packages] [Bug 1362199] Re: [FFe] apparmor abstract, anonymous and netlink socket mediation

2014-09-08 Thread Jamie Strandboge
FYI, when booting new userspace with old kernel, the parser will output 
something like this:
Warning from profile /usr/lib/telepathy/telepathy-ofono 
(/etc/apparmor.d/usr.lib.telepathy): downgrading extended network unix socket 
rule to generic network rule

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to isc-dhcp in Ubuntu.
https://bugs.launchpad.net/bugs/1362199

Title:
  [FFe] apparmor abstract, anonymous and netlink socket mediation

Status in “apparmor” package in Ubuntu:
  In Progress
Status in “apparmor-easyprof-ubuntu” package in Ubuntu:
  In Progress
Status in “isc-dhcp” package in Ubuntu:
  Fix Released
Status in “libvirt” package in Ubuntu:
  In Progress
Status in “lightdm” package in Ubuntu:
  In Progress
Status in “linux” package in Ubuntu:
  In Progress
Status in “rsyslog” package in Ubuntu:
  In Progress
Status in “tlsdate” package in Ubuntu:
  In Progress

Bug description:
  Background: kernel and apparmor userspace updates to support abstract,
  anonymous and fine-grained netlink socket mediation. These packages
  are listed in one bug because they are related, but the FFes may be
  granted and the uploads may happen at different times.

  = apparmor userspace =
  Summary:
  This feature freeze exception is requested for abstract, anonymous and 
fine-grained netlink socket for apparmor userspace. When used with a compatible 
kernel, 'unix' and 'network netlink' rules are supported. When used without a 
compatible apparmor userspace (eg, on a trusty system with an utopic backport 
kernel), abstract, anonymous and fine-grained netlink socket mediation is not 
enforced (ie, you can use this userspace with an old kernel without any issues).

  Testing:
  * 14.10 system with current kernels lacking abstract, anonymous and 
fine-grained netlink socket mediation (non-Touch):
   * https://wiki.ubuntu.com/Process/Merges/TestPlans/AppArmor: DONE 
(exploratory manual testing, lxc, libvirt, etc)
  * 14.10 system kernel capable of supporting abstract, anonymous and 
fine-grained netlink socket mediation (non-Touch):
   * https://wiki.ubuntu.com/Process/Merges/TestPlans/AppArmor: INPROGRESS 
(includes test-apparmor.py, exploratory manual testing, lxc, libvirt, etc)
   * Verify everything in 
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/AppArmorProfiles: DONE 
(except juju since it doesn't have policy itself)

  Justification:
  This feature is required to support comprehensive application confinement on 
Ubuntu Touch. This feature adds a security benefit to libvirt's qemu guest 
isolation which is fundamental to Ubuntu on Server/Cloud. This feature also 
adds a welcome improvement to administrators wishing to further protect their 
systems.

  Extra information:
  While the apparmor userspace and kernel changes to support abstract, 
anonymous and fine-grained netlink socket can happen at different times, the 
apparmor userspace upload must correspond with uploads for packages that ship 
AppArmor policy that require updates (eg, libvirt, lightdm, etc). The packages 
outlined in https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/AppArmorProfiles 
have been tested to either work without modification to the policy or updated 
and tested to work with updated policy. Common rules will be added to the 
apparmor base abstraction such that most packages shipping apparmor policy will 
not require updating. These updates will be prepared, tested and published en 
masse via a silo ppa.

  = linux =
  Summary:
  This feature freeze exception is requested for abstract, anonymous and 
fine-grained netlink socket via apparmor in the kernel. When used with a 
compatible apparmor userspace, 'unix' and 'network netlink' rules are 
supported. When used without a compatible apparmor userspace (eg, on a trusty 
system with an utopic backport kernel), abstract, anonymous and fine-grained 
netlink socket mediation is not enforced (ie, you can use this kernel with an 
old userspace without any issues).

  Testing:
  * 14.04 system with backported kernel: TODO
   * test-apparmor.py: TODO (runs extensive tests (upstream and distro))
   * exploratory manual testing: TODO (networking, aa-enforce with firefox, 
firefox works, apparmor blocks access, etc)
   * aa-status: TODO
   * lxc: TODO (containers can be created, started, shutdown)
   * libvirt: TODO (VMs started via openstack, and test-libvirt.py from QRT 
passes all tests)
  * 14.10 system (non-Touch) with updated kernel:
   * https://wiki.ubuntu.com/Process/Merges/TestPlans/AppArmor: INPROGRESS 
(includes click-apparmor, apparmor-easyprof-ubuntu, exploratory manual testing, 
etc)
  * 14.10 system (Touch) with updated kernel:
   * https://wiki.ubuntu.com/Process/Merges/TestPlans/AppArmor: INPROGRESS 
(includes click-apparmor, apparmor-easyprof-ubuntu, exploratory manual testing, 
etc)

  Justification:
  This feature is required to support comprehensive application confinement on 
Ubuntu Touch. 

[Touch-packages] [Bug 1342858] Re: old click packages are not always cleaned out

2014-09-09 Thread Jamie Strandboge
Attached is the output of 'find /opt/click.ubuntu.com -ls'.

Also, from IRC:
11:38  jdstrand cjwatson: fyi, I currently have 252 json files in 
/var/lib/apparmor/clicks but only 113 apps listed with 'click list'. so, some 
apps do ship multiple profiles, but most apps do not.

** Attachment added: cjwatson-1342858.txt.gz
   
https://bugs.launchpad.net/ubuntu/+source/click/+bug/1342858/+attachment/4199813/+files/cjwatson-1342858.txt.gz

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to click in Ubuntu.
https://bugs.launchpad.net/bugs/1342858

Title:
  old click packages are not always cleaned out

Status in “click” package in Ubuntu:
  Triaged

Bug description:
  /var/lib/apparmor/clicks still has a lot of symlinks pointing to
  security manifests for click packages that are no longer installed. I
  haven't verified this, but I think it might have something to do with
  preinstalled packages and system-image updates. Eg:

  $ ls -1 /var/lib/apparmor/clicks/*json | wc -l
  157

  $ click list | wc -l
  85

  $ sudo click list | wc -l
  19

  None of the symlinks in /var/lib/apparmor/clicks are dangling, so
  while this doesn't actively harm the system AFAICT, the 70+ additional
  and unneeded apparmor profiles means a slower first boot when policy
  regeneration is required.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/click/+bug/1342858/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1367028] Re: [MIR] system-image

2014-09-09 Thread Jamie Strandboge
** Changed in: system-image (Ubuntu)
 Assignee: Ubuntu Security Team (ubuntu-security) = Seth Arnold 
(seth-arnold)

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to system-image in Ubuntu.
https://bugs.launchpad.net/bugs/1367028

Title:
  [MIR] system-image

Status in “system-image” package in Ubuntu:
  New

Bug description:
  Availability: universe

  Rationale: system-image is the client for image based upgrades.  It is
  a core component and thus seeded in Ubuntu Touch.

  Security: No known issues.

  QA: Well supported upstream and in Ubuntu.  Package has build-time
  unittests and DEP-8 tests.

  UI standards: n/a

  Dependencies: All non-main build- and run-time dependencies already or
  will soon have MIRs.

  Standards compliance: No known issues.

  Maintenance: No known issues.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/system-image/+bug/1367028/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1249586] Re: music stops when app goes to background

2014-09-09 Thread Jamie Strandboge
*** This bug is a duplicate of bug 1249387 ***
https://bugs.launchpad.net/bugs/1249387

** Tags removed: rtm14

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unity-webapps-qml in
Ubuntu.
https://bugs.launchpad.net/bugs/1249586

Title:
  music stops when app goes to background

Status in Oxide Webview:
  Confirmed
Status in The Webapps-core project:
  Confirmed
Status in Web Browser App:
  Confirmed
Status in “unity-webapps-qml” package in Ubuntu:
  Confirmed
Status in “webbrowser-app” package in Ubuntu:
  Confirmed

Bug description:
  The issue did not exist on 14.04(r5) or 13.10(r100). I was even proud of this 
little feature :P :D
  When any online music is opened in the browser from the music lens, the music 
plays. But when a full swipe to the homescreen is done, or another app is 
brought to the foreground with the right swipe, the music abruptly stops. on 
bringing the browser app to the foreground, the music continues to play from 
where it stopped. Reproduced on soundcloud only. I dont think any other music 
site works in touch right now.
  On the earlier build of Trusty and saucy, i couldnt reproduce this issue. 
Atleast a full swipe in those builds did not stop the music.

To manage notifications about this bug go to:
https://bugs.launchpad.net/oxide/+bug/1249586/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1368751] [NEW] [enhancement] allow MTP access for authenticated computers

2014-09-12 Thread Jamie Strandboge
Public bug reported:

In accordance with
https://wiki.ubuntu.com/SecurityAndPrivacySettings/ProtectingUserData,
MTP currently refuses to show any folders when connecting the device to
a system and the device's screen is locked (good). A nice future
enhancement might be to do something similar to what is planned with
adb-- using a certificate or token for each system the device connects
to. Eg, it might look something like this:

1. Janet plugs in a locked device to her new laptop
2. MTP checks to see if this system (the new laptop) is known to the device
3. Since it is not, MTP checks the state of the screensaver and sees that it is 
locked, so refuses to export any directories
4. Janet unlocks the screen on the device and the files are exported to her 
laptop
5. Meanwhile on the device, MTP prompts Janet with:
Detected new system. Unconditionally export MTP files to this system in the 
future?
[ ] yes [ ] no
6. Janet answers 'yes' and MTP adds Janet's new laptop to its database of known 
devices
7. Janet performs file transfers via MTP, then unplugs the device and goes out 
to dinner, taking a lot of fun pictures
8. Janet returns home and plugs her locked device into her laptop
9. MTP checks to see if this system (the new laptop) is known to the device
10. Since Janet answered 'yes' in step '6', the files are exported to her 
laptop (without having to unlock the screen) and she can copy her fun pictures 
to her laptop

If Janet answered 'no' in step '6', after performing step '9', MTP would
proceed to step '3' instead of '10'.

This probably requires design for the user interactions. Eg, perhaps it
would be good to remember if the user answered 'no' in step '5'. Also,
it would be good to be able to revoke systems from the database of known
devices.

This is not for RTM. This is not a security requirement. This is for UX.

** Affects: mtp (Ubuntu)
 Importance: Undecided
 Status: New

** Description changed:

  In accordance with
  https://wiki.ubuntu.com/SecurityAndPrivacySettings/ProtectingUserData,
  MTP currently refuses to show any folders when connecting the device to
- a system and the device's screen is locked. (good). A nice future
+ a system and the device's screen is locked (good). A nice future
  enhancement might be to do something similar to what is planned with
  adb-- using a certificate or token for each system the device connects
  to. Eg, it might look something like this:
  
  1. Janet plugs in a locked device to her new laptop
  2. MTP checks to see if this system (the new laptop) is known to the device
  3. Since it is not, MTP checks the state of the screensaver and sees that it 
is locked, so refuses to export any directories
  4. Janet unlocks the screen on the device and the files are exported to her 
laptop
  5. MTP then prompts Janet with:
- Detected new system. Unconditionally export MTP files to this system in 
the future?
- [ ] yes [ ] no
+ Detected new system. Unconditionally export MTP files to this system in 
the future?
+ [ ] yes [ ] no
  6. Janet answers 'yes' and MTP adds Janet's new laptop to its database of 
known devices
  7. Janet performs file transfers via MTP, then unplugs the device and goes 
out to dinner, taking a lot of fun pictures
  8. Janet returns home and plugs her locked device into her laptop
  9. MTP checks to see if this system (the new laptop) is known to the device
  10. Since Janet answered 'yes' in step '6', the files are exported to her 
laptop (without having to unlock the screen)
  
  If Janet answered 'no' in step '6', after performing step '9', MTP would
  proceed to step '3' instead of '10'.
  
  This probably requires design for the user interactions. Eg, perhaps it
  would be good to remember if the user answered 'no' in step '5'. Also,
  it would be good to be able to revoke systems from the database of known
  devices.
  
  This is not for RTM. This is not a security requirement. This is for UX.

** Description changed:

  In accordance with
  https://wiki.ubuntu.com/SecurityAndPrivacySettings/ProtectingUserData,
  MTP currently refuses to show any folders when connecting the device to
  a system and the device's screen is locked (good). A nice future
  enhancement might be to do something similar to what is planned with
  adb-- using a certificate or token for each system the device connects
  to. Eg, it might look something like this:
  
  1. Janet plugs in a locked device to her new laptop
  2. MTP checks to see if this system (the new laptop) is known to the device
  3. Since it is not, MTP checks the state of the screensaver and sees that it 
is locked, so refuses to export any directories
  4. Janet unlocks the screen on the device and the files are exported to her 
laptop
- 5. MTP then prompts Janet with:
+ 5. Meanwhile on the device, MTP prompts Janet with:
  Detected new system. Unconditionally export MTP files to this system in 
the future?
  [ ] yes [ ] no
  6. Janet 

[Touch-packages] [Bug 1327139] Re: mirscreencast broke (moved socket) in #71

2014-09-12 Thread Jamie Strandboge
There are different sockets. Bug #1236912 was about the sockets apps in
the user's session are supposed to be able to access, ie
$XDG_RUNTIME_DIR/mir_socket. /run/mir_socket is AIUI different and not
supposed to be accessed by apps.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to mir in Ubuntu.
https://bugs.launchpad.net/bugs/1327139

Title:
  mirscreencast broke (moved socket) in #71

Status in Light Display Manager:
  New
Status in Mir:
  Invalid
Status in “mir” package in Ubuntu:
  Invalid
Status in “phablet-tools” package in Ubuntu:
  Fix Released

Bug description:
  Since the mir_socket moved from /tmp to /var/run, mirscreencast broke.

  $ adb shell mirscreencast -n 1
  Failed to connect to server. Error was :connect: No such file or directory

  This works:-

  $ adb shell mirscreencast -m /var/run/mir_socket -n 1

  ProblemType: Bug
  DistroRelease: Ubuntu 14.10
  Package: mir-utils 0.1.9+14.10.20140430.1-0ubuntu1
  Uname: Linux 3.4.0-5-mako armv7l
  ApportVersion: 2.14.3-0ubuntu1
  Architecture: armhf
  Date: Fri Jun  6 10:47:19 2014
  InstallationDate: Installed on 2014-06-06 (0 days ago)
  InstallationMedia: Ubuntu Utopic Unicorn (development branch) - armhf 
(20140606.1)
  SourcePackage: mir
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/lightdm/+bug/1327139/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1326105] Re: AppArmor policy for scope zmq access is too lenient

2014-09-15 Thread Jamie Strandboge
** Changed in: unity-scopes-api (Ubuntu)
   Status: New = Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unity-scopes-api in
Ubuntu.
https://bugs.launchpad.net/bugs/1326105

Title:
  AppArmor policy for scope zmq access is too lenient

Status in “unity-scopes-api” package in Ubuntu:
  Confirmed

Bug description:
  Currently in apparmor-easyprof-ubuntu 1.2.3 we have:
    owner /run/user/[0-9]*/zmq/Registry-s   rw,
    owner /run/user/[0-9]*/zmq/Registry-pr,
    owner /run/user/[0-9]*/zmq/c-*-r rw,

  Note that all scopes, regardless of whether they use the ubuntu-scope-
  network or ubuntu-scope-local-content templates have access to these
  overlapped accesses. While we discussed the apparmor policy at length
  at the recent sprint, in thinking about this more there are still a
  few issues:

   1. How will the scope-registry handle when either
  /run/user/[0-9]*/zmq/Registry-s or /run/user/[0-9]*/zmq/Registry-p
  already exists?

   2. In addition to dealing with /run/user/[0-9]*/zmq/c-*-r possibly
  already existing, there is an additional issue with this access--
  because the ubuntu-scope-network and ubuntu-scope-local-content
  templates both allow this access, this allows a malicious scope author
  to create a scope using the ubuntu-scope-local-content template, then
  collect files off the filesystem and store them in
  /run/user/[0-9]*/zmq/c-I_can_leak_your_files.tar.gz-c, then upload a
  new version of the scope using the ubuntu-scope-network template,
  which can then ship
  /run/user/[0-9]*/zmq/c-I_can_leak_your_files.tar.gz-c off to a remote
  server when the user upgrades (the fact that it is in /run doesn't
  really help-- the malicious scope can save the file in its scope-
  specific directory then copy it in to place to make sure it is always
  there).

  For '1', standard defensive programming should be sufficient and
  someone should verify that the scopes API is handling when these files
  already exist (as sockets, regular files, etc, etc).

  For '2', standard defensive programming should also be used, but that
  isn't enough. I suggested at the sprint that these endpoints should be
  made application specific by their name like with the other endpoints,
  but was told this is problematic. I can (and will) update the apparmor
  policy to use this rule:

    owner
  
/run/user/[0-9]*/zmq/c-[0-9a-f][0-9a-f][0-9a-f][0-9a-f][0-9a-f][0-9a-f][0-9a-f][0-9a-f][0-9a-f][0-9a-f][0-9a-f][0-9a-f][0-9a-f][0-9a-f][0-9a-f][0-9a-f]-r
  rw,

  but this doesn't solve the problem since a malicious app writer will
  just pick something matching that apparmor regular expression (AARE).
  AIUI, it is difficult/impossible to make these endpoints application
  specific (eg, /run/user/[0-9]*/zmq/c-@{APP_PKGNAME}-r which would be
  the preferred fix). If that is the case, we can either namespace this
  endpoint in zmq/local-fs/c-*r and zmq/local-net/c-*r and adjust the
  policy templates accordingly. I have a feeling this will have the same
  problems (or worse) as making the endpoint application specific since
  you'd need to track the type of scope this is. Alternatively, you
  could have a garbage collector to unconditionally remove any non-unix
  domain socket files and unused unix domain socket files that match
  zmq/c-*-r. While making these endpoints application specific would be
  cleanest from a policy point of view, implementing good garbage
  collection (perhaps triggered on scope start/register) would be
  sufficient to close this bug.

  Thanks!

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/unity-scopes-api/+bug/1326105/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1306769] Re: pinlock snap decision potentially allows malicious app to gain access to user PIN and Passcode

2014-09-15 Thread Jamie Strandboge
Mirco, can you answer my question in comment #8?

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unity8 in Ubuntu.
https://bugs.launchpad.net/bugs/1306769

Title:
  pinlock snap decision potentially allows malicious app to gain access
  to user PIN and Passcode

Status in Server and client library for desktop notifications in Unity:
  Triaged
Status in “unity8” package in Ubuntu:
  Triaged

Bug description:
  Currently the pinlock dialog is implemented as snapdecision and thus
  any application that is allowed to use the notifications can
  potentially trick the user to provide his PIN code or Passcode to the
  application by invoking the pinlock dialog.

  As we want to allow applications to send normal notifications and
  snapdecisions we can't just block the whole notify service from them,
  but also we don't have any means to block just one of them.

  Thus the only solution is to remove the pinlock from snap decisions
  completely and implement a standalone dbus service for pinlock dialog
  which can be properly confined.

To manage notifications about this bug go to:
https://bugs.launchpad.net/unity-notifications/+bug/1306769/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1365875] Re: mail notification displayed even when phone locked

2014-09-15 Thread Jamie Strandboge
Since this was fixed in push notifications, I am closing the other
tasks. Please reopen if this is in error.

** No longer affects: account-polld (Ubuntu)

** No longer affects: indicator-messages (Ubuntu)

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to indicator-messages in
Ubuntu.
https://bugs.launchpad.net/bugs/1365875

Title:
  mail notification displayed even when phone locked

Status in Ubuntu Push Notifications:
  Fix Released
Status in “unity8” package in Ubuntu:
  Opinion

Bug description:
  I had just woken up the phone (screen was displaying the welcome
  greeter) but had not yet unlocked the device (I have set a pin code)
  when a mail notification appeared on screen that divulged the sender.

  This is a privacy issue.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-push/+bug/1365875/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1369457] Re: able to left swipe and launch apps without unlocking phone

2014-09-15 Thread Jamie Strandboge
I think much of this is by design. The security team doesn't consider
launching apps behind the lockscreen a security issue. These apps are
subjected to application lifecycle and will not continue running.
However, the other behaviors may be bugs-- I'll ask someone to comment.

** Information type changed from Public Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unity8 in Ubuntu.
https://bugs.launchpad.net/bugs/1369457

Title:
  able to left swipe and launch apps without unlocking phone

Status in Ubuntu UX bugs:
  New
Status in “unity8” package in Ubuntu:
  New

Bug description:
  This is atleast a privacy issue but could also be a security depending
  on exactly what apps the user has pinned to their launcher.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-ux/+bug/1369457/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1369453] Re: able to view and change indicators without unlocking phone

2014-09-15 Thread Jamie Strandboge
** Changed in: indicator-location (Ubuntu)
   Status: New = Confirmed

** Changed in: indicator-network (Ubuntu)
   Status: New = Confirmed

** Also affects: indicator-datetime (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: indicator-datetime (Ubuntu)
   Status: New = Confirmed

** Changed in: indicator-datetime (Ubuntu)
   Importance: Undecided = Critical

** Changed in: indicator-location (Ubuntu)
   Importance: Undecided = High

** Changed in: indicator-network (Ubuntu)
   Importance: Undecided = High

** Tags added: rtm14

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to indicator-location in
Ubuntu.
https://bugs.launchpad.net/bugs/1369453

Title:
  able to view and change indicators without unlocking phone

Status in “indicator-datetime” package in Ubuntu:
  Confirmed
Status in “indicator-location” package in Ubuntu:
  Confirmed
Status in “indicator-network” package in Ubuntu:
  Confirmed

Bug description:
  This is a pretty significant security issue that affects:

  - networking - able to switch networks without entering pin to unlock phone
  - GPS - can toggle.
  - bluetooth - can toggle.
  - upcoming events - can view.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/indicator-datetime/+bug/1369453/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1369450] Re: adb shell sudo shows password in the clear

2014-09-15 Thread Jamie Strandboge
FYI, as a workaround I suggest using 'phablet-shell' since it behaves
correctly.

** Changed in: android-tools (Ubuntu)
   Status: New = Confirmed

** Changed in: android-tools (Ubuntu)
   Importance: Undecided = High

** Tags added: rtm14

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to android-tools in Ubuntu.
https://bugs.launchpad.net/bugs/1369450

Title:
  adb shell sudo shows password in the clear

Status in “android-tools” package in Ubuntu:
  Confirmed

Bug description:
  $ adb shell sudo id
  [sudo] password for phablet: you should not be able to see this!!!

  ProblemType: Bug
  DistroRelease: Ubuntu 14.10
  Package: android-tools-adb 4.2.2+git20130218-3ubuntu35
  ProcVersionSignature: Ubuntu 3.16.0-14.20-generic 3.16.2
  Uname: Linux 3.16.0-14-generic x86_64
  ApportVersion: 2.14.7-0ubuntu2
  Architecture: amd64
  CurrentDesktop: Unity
  Date: Mon Sep 15 09:43:59 2014
  InstallationDate: Installed on 2014-04-11 (156 days ago)
  InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Daily amd64 (20140409)
  SourcePackage: android-tools
  UpgradeStatus: Upgraded to utopic on 2014-05-08 (129 days ago)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/android-tools/+bug/1369450/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1306769] Re: pinlock snap decision potentially allows malicious app to gain access to user PIN and Passcode

2014-09-15 Thread Jamie Strandboge
Thanks for the feedback-- though I think we may need more information. Here is 
the current policy:
  dbus (receive)
   bus=session
   path=/com/canonical/hud/publisher*
   interface=org.gtk.Menus
   member=Start,
  dbus (receive)
   bus=session
   path=/com/canonical/hud/publisher*
   interface=org.gtk.Menus
   member=End,
  dbus (send)
   bus=session
   path=/com/canonical/hud/publisher*
   interface=org.gtk.Menus
   member=Changed
   peer=(name=org.freedesktop.DBus),
  dbus (receive)
   bus=session
   path=/com/canonical/unity/actions
   interface=org.gtk.Actions
   member={DescribeAll,Activate},
  dbus (send)
   bus=session
   path=/com/canonical/unity/actions
   interface=org.gtk.Actions
   member=Changed
   peer=(name=org.freedesktop.DBus),
  dbus (receive)
   bus=session
   path=/context_*
   interface=org.gtk.Actions
   member=DescribeAll,


Related policy is:
  dbus (send)
   bus=session
   path=/com/canonical/hud
   interface=org.freedesktop.DBus.Properties
   member=GetAll,
  dbus (send)
   bus=session
   path=/com/canonical/hud
   interface=com.canonical.hud
   member=RegisterApplication,
  dbus (receive, send)
   bus=session
  dbus (receive)
   bus=session
   path=/com/canonical/hud
   interface=com.canonical.hud
   member=UpdatedQuery,
  dbus (receive)
   bus=session
   interface=com.canonical.hud.Awareness
   member=CheckAwareness,


My understanding was that apps were *not* supposed to be allowed to use snap 
decisions, which is why Mirco had me add this policy:
  audit deny dbus bus=session
  interface=com.canonical.snapdecisions,


Can this policy be circumvented? If yes, can someone demonstrate how? If not, 
are you saying that the push notifications dialogs can be used to fake the 
pinlock dialog? If so, moving the pin lock snap decision to another service 
will not solve this and the only way to solve that would be to make sure that 
the pinlock snap decision looks sufficiently visually different and that 
applications can't influence a push notification to look like it.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unity8 in Ubuntu.
https://bugs.launchpad.net/bugs/1306769

Title:
  pinlock snap decision potentially allows malicious app to gain access
  to user PIN and Passcode

Status in Server and client library for desktop notifications in Unity:
  Triaged
Status in “unity8” package in Ubuntu:
  Triaged

Bug description:
  Currently the pinlock dialog is implemented as snapdecision and thus
  any application that is allowed to use the notifications can
  potentially trick the user to provide his PIN code or Passcode to the
  application by invoking the pinlock dialog.

  As we want to allow applications to send normal notifications and
  snapdecisions we can't just block the whole notify service from them,
  but also we don't have any means to block just one of them.

  Thus the only solution is to remove the pinlock from snap decisions
  completely and implement a standalone dbus service for pinlock dialog
  which can be properly confined.

To manage notifications about this bug go to:
https://bugs.launchpad.net/unity-notifications/+bug/1306769/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1306769] Re: pinlock snap decision potentially allows malicious app to gain access to user PIN and Passcode

2014-09-15 Thread Jamie Strandboge
Shoot, I had a mispaste of the related policy. Here is all of it for
clarity:

  dbus (send)
   bus=session
   path=/com/canonical/hud
   interface=org.freedesktop.DBus.Properties
   member=GetAll,
  dbus (send)
   bus=session
   path=/com/canonical/hud
   interface=com.canonical.hud
   member=RegisterApplication,
  dbus (receive, send)
   bus=session
   path=/com/canonical/hud/applications/@{APP_ID_DBUS}*,
  dbus (receive)
   bus=session
   path=/com/canonical/hud/publisher*
   interface=org.gtk.Menus
   member=Start,
  dbus (receive)
   bus=session
   path=/com/canonical/hud/publisher*
   interface=org.gtk.Menus
   member=End,
  dbus (send)
   bus=session
   path=/com/canonical/hud/publisher*
   interface=org.gtk.Menus
   member=Changed
   peer=(name=org.freedesktop.DBus),
  dbus (receive)
   bus=session
   path=/com/canonical/unity/actions
   interface=org.gtk.Actions
   member={DescribeAll,Activate},
  dbus (send)
   bus=session
   path=/com/canonical/unity/actions
   interface=org.gtk.Actions
   member=Changed
   peer=(name=org.freedesktop.DBus),
  dbus (receive)
   bus=session
   path=/context_*
   interface=org.gtk.Actions
   member=DescribeAll,
  dbus (receive)
   bus=session
   path=/com/canonical/hud
   interface=com.canonical.hud
   member=UpdatedQuery,
  dbus (receive)
   bus=session
   interface=com.canonical.hud.Awareness
   member=CheckAwareness,
...
  audit deny dbus bus=session
  interface=com.canonical.snapdecisions,

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unity8 in Ubuntu.
https://bugs.launchpad.net/bugs/1306769

Title:
  pinlock snap decision potentially allows malicious app to gain access
  to user PIN and Passcode

Status in Server and client library for desktop notifications in Unity:
  Triaged
Status in “unity8” package in Ubuntu:
  Triaged

Bug description:
  Currently the pinlock dialog is implemented as snapdecision and thus
  any application that is allowed to use the notifications can
  potentially trick the user to provide his PIN code or Passcode to the
  application by invoking the pinlock dialog.

  As we want to allow applications to send normal notifications and
  snapdecisions we can't just block the whole notify service from them,
  but also we don't have any means to block just one of them.

  Thus the only solution is to remove the pinlock from snap decisions
  completely and implement a standalone dbus service for pinlock dialog
  which can be properly confined.

To manage notifications about this bug go to:
https://bugs.launchpad.net/unity-notifications/+bug/1306769/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1306769] Re: pinlock snap decision potentially allows malicious app to gain access to user PIN and Passcode

2014-09-15 Thread Jamie Strandboge
Bumping the priority since this would be a bad bug. Marking as rtm14
since we can't have apps phish for passwords.

** Tags added: rtm14

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unity8 in Ubuntu.
https://bugs.launchpad.net/bugs/1306769

Title:
  pinlock snap decision potentially allows malicious app to gain access
  to user PIN and Passcode

Status in Server and client library for desktop notifications in Unity:
  Incomplete
Status in “unity8” package in Ubuntu:
  Incomplete

Bug description:
  Currently the pinlock dialog is implemented as snapdecision and thus
  any application that is allowed to use the notifications can
  potentially trick the user to provide his PIN code or Passcode to the
  application by invoking the pinlock dialog.

  As we want to allow applications to send normal notifications and
  snapdecisions we can't just block the whole notify service from them,
  but also we don't have any means to block just one of them.

  Thus the only solution is to remove the pinlock from snap decisions
  completely and implement a standalone dbus service for pinlock dialog
  which can be properly confined.

To manage notifications about this bug go to:
https://bugs.launchpad.net/unity-notifications/+bug/1306769/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1306769] Re: pinlock snap decision potentially allows malicious app to gain access to user PIN and Passcode

2014-09-15 Thread Jamie Strandboge
I am going to mark this as incomplete. Antii says Currently the
pinlock dialog is implemented as snapdecision and thus any application
that is allowed to use the notifications can potentially trick the user
to provide his PIN code or Passcode to the application by invoking the
pinlock dialog. However, AppArmor policy explicitly disables the
snapdecisions interface and there is no code or described methodology
describing the problem so I can't determine if this is mere concern that
there might be a problem or that there is an actual problem.

** Changed in: unity-notifications
   Status: Triaged = Incomplete

** Changed in: unity8 (Ubuntu)
   Status: Triaged = Incomplete

** Changed in: unity8 (Ubuntu)
   Importance: Medium = High

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unity8 in Ubuntu.
https://bugs.launchpad.net/bugs/1306769

Title:
  pinlock snap decision potentially allows malicious app to gain access
  to user PIN and Passcode

Status in Server and client library for desktop notifications in Unity:
  Incomplete
Status in “unity8” package in Ubuntu:
  Incomplete

Bug description:
  Currently the pinlock dialog is implemented as snapdecision and thus
  any application that is allowed to use the notifications can
  potentially trick the user to provide his PIN code or Passcode to the
  application by invoking the pinlock dialog.

  As we want to allow applications to send normal notifications and
  snapdecisions we can't just block the whole notify service from them,
  but also we don't have any means to block just one of them.

  Thus the only solution is to remove the pinlock from snap decisions
  completely and implement a standalone dbus service for pinlock dialog
  which can be properly confined.

To manage notifications about this bug go to:
https://bugs.launchpad.net/unity-notifications/+bug/1306769/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1324292] Re: re-add support for selecting text for copying

2014-09-16 Thread Jamie Strandboge
** Changed in: oxide
   Importance: High = Critical

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to webbrowser-app in Ubuntu.
https://bugs.launchpad.net/bugs/1324292

Title:
  re-add support for selecting text for copying

Status in Oxide Webview:
  New
Status in Web Browser App:
  Confirmed
Status in “webbrowser-app” package in Ubuntu:
  Confirmed

Bug description:
  in the qtwebkit browser we had the ability to create a selection
  region with handles for resizing. needs to bring this back for oxide
  based browser.

To manage notifications about this bug go to:
https://bugs.launchpad.net/oxide/+bug/1324292/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1369512] Re: None of the torch app starts

2014-09-17 Thread Jamie Strandboge
After discussion on IRC, this is because qtubuntu-camera implements the
'click' camera sound. The proper fix is to move this outside of
qtubuntu-camera and apps can optionally make the click sound using
Audio, which only then would bring in media-hub, and only then require
the audio policy group. Since recording with the camera is moving to
media-hub, I will be adding to the camera policy group a dbus rule to
allow talking to it. This will workaround this bug for now.

** Also affects: qtubuntu-camera (Ubuntu)
   Importance: Undecided
   Status: New

** Summary changed:

- None of the torch app starts
+ please move click sound out of qtubuntu-camera

** Also affects: apparmor-easyprof-ubuntu (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: apparmor-easyprof-ubuntu (Ubuntu)
   Importance: Undecided = Critical

** Changed in: apparmor-easyprof-ubuntu (Ubuntu)
   Status: New = In Progress

** Changed in: qtubuntu-camera (Ubuntu)
   Status: New = Triaged

** Changed in: apparmor-easyprof-ubuntu (Ubuntu)
 Assignee: (unassigned) = Jamie Strandboge (jdstrand)

** Changed in: qtubuntu-camera (Ubuntu)
 Assignee: (unassigned) = Jim Hodapp (jhodapp)

** Tags added: touch-2014-09-25

** Tags added: rtm14

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to qtubuntu-camera in Ubuntu.
https://bugs.launchpad.net/bugs/1369512

Title:
  please move click sound out of qtubuntu-camera

Status in Media Hub:
  Confirmed
Status in “apparmor-easyprof-ubuntu” package in Ubuntu:
  In Progress
Status in “qtubuntu-camera” package in Ubuntu:
  Triaged

Bug description:
  RTM image 39 on mako
  media-hub 1.0.0+14.10.20140908~rtm-0ubuntu1

  The Ubuntu Store have three torch apps, I installed all but none of
  them starts. The upstart log shows something bad re: apparmor/media-
  hub

To manage notifications about this bug go to:
https://bugs.launchpad.net/media-hub/+bug/1369512/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1369512] Re: please move click sound out of qtubuntu-camera

2014-09-17 Thread Jamie Strandboge
In testing uTorch, I noticed it also doesn't specify the camera policy
group. It will need to do so after this bug is marked fixed in apparmor-
easyprof-ubuntu.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor-easyprof-ubuntu
in Ubuntu.
https://bugs.launchpad.net/bugs/1369512

Title:
  please move click sound out of qtubuntu-camera

Status in Media Hub:
  Confirmed
Status in “apparmor-easyprof-ubuntu” package in Ubuntu:
  In Progress
Status in “qtubuntu-camera” package in Ubuntu:
  Triaged

Bug description:
  RTM image 39 on mako
  media-hub 1.0.0+14.10.20140908~rtm-0ubuntu1

  The Ubuntu Store have three torch apps, I installed all but none of
  them starts. The upstart log shows something bad re: apparmor/media-
  hub

To manage notifications about this bug go to:
https://bugs.launchpad.net/media-hub/+bug/1369512/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1362199] Re: [FFe] apparmor abstract, anonymous and netlink socket mediation

2014-09-17 Thread Jamie Strandboge
** Changed in: linux (Ubuntu)
   Importance: Undecided = Critical

** Changed in: linux (Ubuntu)
   Importance: Critical = High

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to isc-dhcp in Ubuntu.
https://bugs.launchpad.net/bugs/1362199

Title:
  [FFe] apparmor abstract, anonymous and netlink socket mediation

Status in “apparmor” package in Ubuntu:
  Fix Released
Status in “apparmor-easyprof-ubuntu” package in Ubuntu:
  Fix Released
Status in “isc-dhcp” package in Ubuntu:
  Fix Released
Status in “libvirt” package in Ubuntu:
  Fix Released
Status in “lightdm” package in Ubuntu:
  Fix Released
Status in “linux” package in Ubuntu:
  In Progress
Status in “rsyslog” package in Ubuntu:
  Fix Released
Status in “tlsdate” package in Ubuntu:
  Fix Released

Bug description:
  Background: kernel and apparmor userspace updates to support abstract,
  anonymous and fine-grained netlink socket mediation. These packages
  are listed in one bug because they are related, but the FFes may be
  granted and the uploads may happen at different times.

  = apparmor userspace =
  Summary:
  This feature freeze exception is requested for abstract, anonymous and 
fine-grained netlink socket for apparmor userspace. When used with a compatible 
kernel, 'unix' and 'network netlink' rules are supported. When used without a 
compatible apparmor userspace (eg, on a trusty system with an utopic backport 
kernel), abstract, anonymous and fine-grained netlink socket mediation is not 
enforced (ie, you can use this userspace with an old kernel without any issues).

  Testing:
  * 14.10 system with current kernels lacking abstract, anonymous and 
fine-grained netlink socket mediation (non-Touch):
   * https://wiki.ubuntu.com/Process/Merges/TestPlans/AppArmor: DONE 
(exploratory manual testing, lxc, libvirt, etc)
  * 14.10 system kernel capable of supporting abstract, anonymous and 
fine-grained netlink socket mediation (non-Touch):
   * https://wiki.ubuntu.com/Process/Merges/TestPlans/AppArmor: INPROGRESS 
(includes test-apparmor.py, exploratory manual testing, lxc, libvirt, etc)
   * Verify everything in 
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/AppArmorProfiles: DONE 
(except juju since it doesn't have policy itself)

  Justification:
  This feature is required to support comprehensive application confinement on 
Ubuntu Touch. This feature adds a security benefit to libvirt's qemu guest 
isolation which is fundamental to Ubuntu on Server/Cloud. This feature also 
adds a welcome improvement to administrators wishing to further protect their 
systems.

  Extra information:
  While the apparmor userspace and kernel changes to support abstract, 
anonymous and fine-grained netlink socket can happen at different times, the 
apparmor userspace upload must correspond with uploads for packages that ship 
AppArmor policy that require updates (eg, libvirt, lightdm, etc). The packages 
outlined in https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/AppArmorProfiles 
have been tested to either work without modification to the policy or updated 
and tested to work with updated policy. Common rules will be added to the 
apparmor base abstraction such that most packages shipping apparmor policy will 
not require updating. These updates will be prepared, tested and published en 
masse via a silo ppa.

  = linux =
  Summary:
  This feature freeze exception is requested for abstract, anonymous and 
fine-grained netlink socket via apparmor in the kernel. When used with a 
compatible apparmor userspace, 'unix' and 'network netlink' rules are 
supported. When used without a compatible apparmor userspace (eg, on a trusty 
system with an utopic backport kernel), abstract, anonymous and fine-grained 
netlink socket mediation is not enforced (ie, you can use this kernel with an 
old userspace without any issues).

  Testing:
  * 14.04 system with backported kernel: TODO
   * test-apparmor.py: TODO (runs extensive tests (upstream and distro))
   * exploratory manual testing: TODO (networking, aa-enforce with firefox, 
firefox works, apparmor blocks access, etc)
   * aa-status: TODO
   * lxc: TODO (containers can be created, started, shutdown)
   * libvirt: TODO (VMs started via openstack, and test-libvirt.py from QRT 
passes all tests)
  * 14.10 system (non-Touch) with updated kernel:
   * https://wiki.ubuntu.com/Process/Merges/TestPlans/AppArmor: INPROGRESS 
(includes click-apparmor, apparmor-easyprof-ubuntu, exploratory manual testing, 
etc)
  * 14.10 system (Touch) with updated kernel:
   * https://wiki.ubuntu.com/Process/Merges/TestPlans/AppArmor: INPROGRESS 
(includes click-apparmor, apparmor-easyprof-ubuntu, exploratory manual testing, 
etc)

  Justification:
  This feature is required to support comprehensive application confinement on 
Ubuntu Touch. This feature adds a security benefit to libvirt's qemu guest 
isolation which is fundamental to Ubuntu on Server/Cloud. This 

[Touch-packages] [Bug 1371170] [NEW] information disclosure: clipboard contents can be obtained without user knowledge

2014-09-18 Thread Jamie Strandboge
*** This bug is a security vulnerability ***

Public security bug reported:

Currently, the clipboard is implemented such that all apps can access
the contents at any time. The clipboard contents should only be given to
apps based on user driven input (eg, a paste operation).

Attack scenario:
1. user launches malicious app 'baz' that polls the clipboard for contents
2. user launches legitimate app 'foo', at which point 'baz' is backgrounded
3. user selects some text and puts it into the clipboard
4. user opens legitimate app 'bar' and pastes text
5. user foregrounds 'baz' which now has access to the clipboard contents

In the above, users can understand that 'foo' and 'bar' have access to
the text put in the clipboard. However, it is unexpected that 'baz' also
has access since the user didn't paste the text into it.

As it is currently implemented, there is no clipboard timeout, so the
contents will persist through the session (unless changed by another
copy operation). Application lifecycle will help a little, but not fully
since whenever an app is foregrounded, it can the contents of the
keyboard.

Ideally this would be handled via wholly user-driven interactions. While
this could be achieved via keyboard driven interactions, it is difficult
with toolkit driven interactions (ie, 'Paste' from a menu is necessarily
a pull operation). One idea is not to block access but instead make
users aware of the clipboard access (eg, an overlay that says Pasted
from clipboard and then fades out)-- this should be as unobtrusive as
possible.

** Affects: content-hub (Ubuntu)
 Importance: High
 Status: New

** Affects: mir (Ubuntu)
 Importance: High
 Status: New

** Affects: unity8 (Ubuntu)
 Importance: High
 Status: New


** Tags: application-confinement

** Summary changed:

- information disclosure: clipboard contents can be leaked to other applications
+ information disclosure: clipboard contents can be obtained in the background

** Also affects: mir (Ubuntu)
   Importance: Undecided
   Status: New

** Also affects: content-hub (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: content-hub (Ubuntu)
   Importance: Undecided = High

** Changed in: mir (Ubuntu)
   Importance: Undecided = High

** Changed in: unity8 (Ubuntu)
   Importance: Undecided = High

** Description changed:

  Currently, the clipboard is implemented such that all apps can access
  the contents at any time. The clipboard contents should only be given to
  apps based on user driven input (eg, a paste operation).
  
  Attack scenario:
  1. user launches malicious app 'baz' that polls the clipboard for contents
  2. user launches legitimate app 'foo', at which point 'baz' is backgrounded
  3. user selects some text and puts it into the clipboard
  4. user opens legitimate app 'bar' and pastes text
  5. user foregrounds 'baz' which now has access to the clipboard contents
  
  In the above, users can understand that 'foo' and 'bar' have access to
  the text put in the clipboard. However, it is unexpected that 'baz' also
  has access since the user didn't paste the text into it.
  
  As it is currently implemented, there is no clipboard timeout, so the
  contents will persist through the session (unless changed by another
  copy operation). Application lifecycle will help a little, but not fully
  since whenever an app is foregrounded, it can the contents of the
  keyboard.
+ 
+ Ideally this would be handled via wholly user-driven interactions. While
+ this could be achieved via keyboard driven interactions, it is difficult
+ with toolkit driven interactions (ie, 'Paste' from a menu is necessarily
+ a pull operation). One idea is not to block access but instead make
+ users aware of the clipboard access (eg, an overlay that says Pasted
+ from clipboard and then fades out)-- this should be as unobtrusive as
+ possible.

** Tags added: application-confinement

** Information type changed from Public to Public Security

** Summary changed:

- information disclosure: clipboard contents can be obtained in the background
+ information disclosure: clipboard contents can be obtained without user 
knowledge

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unity8 in Ubuntu.
https://bugs.launchpad.net/bugs/1371170

Title:
  information disclosure: clipboard contents can be obtained without
  user knowledge

Status in “content-hub” package in Ubuntu:
  New
Status in “mir” package in Ubuntu:
  New
Status in “unity8” package in Ubuntu:
  New

Bug description:
  Currently, the clipboard is implemented such that all apps can access
  the contents at any time. The clipboard contents should only be given
  to apps based on user driven input (eg, a paste operation).

  Attack scenario:
  1. user launches malicious app 'baz' that polls the clipboard for contents
  2. user launches legitimate app 'foo', at which point 'baz' is backgrounded
  

[Touch-packages] [Bug 1371170] Re: information disclosure: clipboard contents can be obtained without user knowledge

2014-09-18 Thread Jamie Strandboge
** Description changed:

  Currently, the clipboard is implemented such that all apps can access
  the contents at any time. The clipboard contents should only be given to
  apps based on user driven input (eg, a paste operation).
  
  Attack scenario:
  1. user launches malicious app 'baz' that polls the clipboard for contents
  2. user launches legitimate app 'foo', at which point 'baz' is backgrounded
  3. user selects some text and puts it into the clipboard
  4. user opens legitimate app 'bar' and pastes text
  5. user foregrounds 'baz' which now has access to the clipboard contents
  
  In the above, users can understand that 'foo' and 'bar' have access to
  the text put in the clipboard. However, it is unexpected that 'baz' also
  has access since the user didn't paste the text into it.
  
  As it is currently implemented, there is no clipboard timeout, so the
  contents will persist through the session (unless changed by another
  copy operation). Application lifecycle will help a little, but not fully
  since whenever an app is foregrounded, it can the contents of the
  keyboard.
  
+ In the short term, we should require that only a foregrounded app whould
+ be able to get clipboard contents. Push helpers should have an explicit
+ deny to the (upcoming) DBus clipboard access.
+ 
  Ideally this would be handled via wholly user-driven interactions. While
  this could be achieved via keyboard driven interactions, it is difficult
  with toolkit driven interactions (ie, 'Paste' from a menu is necessarily
  a pull operation). One idea is not to block access but instead make
  users aware of the clipboard access (eg, an overlay that says Pasted
  from clipboard and then fades out)-- this should be as unobtrusive as
  possible.

** Also affects: apparmor-easyprof-ubuntu (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: apparmor-easyprof-ubuntu (Ubuntu)
   Importance: Undecided = High

** Changed in: apparmor-easyprof-ubuntu (Ubuntu)
   Status: New = Triaged

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to content-hub in Ubuntu.
https://bugs.launchpad.net/bugs/1371170

Title:
  information disclosure: clipboard contents can be obtained without
  user knowledge

Status in “apparmor-easyprof-ubuntu” package in Ubuntu:
  Triaged
Status in “content-hub” package in Ubuntu:
  New
Status in “mir” package in Ubuntu:
  New
Status in “unity8” package in Ubuntu:
  New

Bug description:
  Currently, the clipboard is implemented such that all apps can access
  the contents at any time. The clipboard contents should only be given
  to apps based on user driven input (eg, a paste operation).

  Attack scenario:
  1. user launches malicious app 'baz' that polls the clipboard for contents
  2. user launches legitimate app 'foo', at which point 'baz' is backgrounded
  3. user selects some text and puts it into the clipboard
  4. user opens legitimate app 'bar' and pastes text
  5. user foregrounds 'baz' which now has access to the clipboard contents

  In the above, users can understand that 'foo' and 'bar' have access to
  the text put in the clipboard. However, it is unexpected that 'baz'
  also has access since the user didn't paste the text into it.

  As it is currently implemented, there is no clipboard timeout, so the
  contents will persist through the session (unless changed by another
  copy operation). Application lifecycle will help a little, but not
  fully since whenever an app is foregrounded, it can the contents of
  the keyboard.

  In the short term, we should require that only a foregrounded app
  whould be able to get clipboard contents. Push helpers should have an
  explicit deny to the (upcoming) DBus clipboard access. Background apps
  should not be allowed to push content into the clipboard (application
  lifecycle deals with this, but we need this for the future).

  Ideally this would be handled via wholly user-driven interactions.
  While this could be achieved via keyboard driven interactions, it is
  difficult with toolkit driven interactions (ie, 'Paste' from a menu is
  necessarily a pull operation). One idea is not to block access but
  instead make users aware of the clipboard access (eg, an overlay that
  says Pasted from clipboard and then fades out)-- this should be as
  unobtrusive as possible.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor-easyprof-ubuntu/+bug/1371170/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1371170] Re: information disclosure: clipboard contents can be obtained without user knowledge

2014-09-18 Thread Jamie Strandboge
** Description changed:

  Currently, the clipboard is implemented such that all apps can access
  the contents at any time. The clipboard contents should only be given to
  apps based on user driven input (eg, a paste operation).
  
  Attack scenario:
  1. user launches malicious app 'baz' that polls the clipboard for contents
  2. user launches legitimate app 'foo', at which point 'baz' is backgrounded
  3. user selects some text and puts it into the clipboard
  4. user opens legitimate app 'bar' and pastes text
  5. user foregrounds 'baz' which now has access to the clipboard contents
  
  In the above, users can understand that 'foo' and 'bar' have access to
  the text put in the clipboard. However, it is unexpected that 'baz' also
  has access since the user didn't paste the text into it.
  
  As it is currently implemented, there is no clipboard timeout, so the
  contents will persist through the session (unless changed by another
  copy operation). Application lifecycle will help a little, but not fully
  since whenever an app is foregrounded, it can the contents of the
  keyboard.
  
  In the short term, we should require that only a foregrounded app whould
  be able to get clipboard contents. Push helpers should have an explicit
- deny to the (upcoming) DBus clipboard access.
+ deny to the (upcoming) DBus clipboard access. Background apps should not
+ be allowed to push content into the clipboard (application lifecycle
+ deals with this, but we need this for the future).
  
  Ideally this would be handled via wholly user-driven interactions. While
  this could be achieved via keyboard driven interactions, it is difficult
  with toolkit driven interactions (ie, 'Paste' from a menu is necessarily
  a pull operation). One idea is not to block access but instead make
  users aware of the clipboard access (eg, an overlay that says Pasted
  from clipboard and then fades out)-- this should be as unobtrusive as
  possible.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor-easyprof-ubuntu
in Ubuntu.
https://bugs.launchpad.net/bugs/1371170

Title:
  information disclosure: clipboard contents can be obtained without
  user knowledge

Status in “apparmor-easyprof-ubuntu” package in Ubuntu:
  Triaged
Status in “content-hub” package in Ubuntu:
  New
Status in “mir” package in Ubuntu:
  New
Status in “unity8” package in Ubuntu:
  New

Bug description:
  Currently, the clipboard is implemented such that all apps can access
  the contents at any time. The clipboard contents should only be given
  to apps based on user driven input (eg, a paste operation).

  Attack scenario:
  1. user launches malicious app 'baz' that polls the clipboard for contents
  2. user launches legitimate app 'foo', at which point 'baz' is backgrounded
  3. user selects some text and puts it into the clipboard
  4. user opens legitimate app 'bar' and pastes text
  5. user foregrounds 'baz' which now has access to the clipboard contents

  In the above, users can understand that 'foo' and 'bar' have access to
  the text put in the clipboard. However, it is unexpected that 'baz'
  also has access since the user didn't paste the text into it.

  As it is currently implemented, there is no clipboard timeout, so the
  contents will persist through the session (unless changed by another
  copy operation). Application lifecycle will help a little, but not
  fully since whenever an app is foregrounded, it can the contents of
  the keyboard.

  In the short term, we should require that only a foregrounded app
  whould be able to get clipboard contents. Push helpers should have an
  explicit deny to the (upcoming) DBus clipboard access. Background apps
  should not be allowed to push content into the clipboard (application
  lifecycle deals with this, but we need this for the future).

  Ideally this would be handled via wholly user-driven interactions.
  While this could be achieved via keyboard driven interactions, it is
  difficult with toolkit driven interactions (ie, 'Paste' from a menu is
  necessarily a pull operation). One idea is not to block access but
  instead make users aware of the clipboard access (eg, an overlay that
  says Pasted from clipboard and then fades out)-- this should be as
  unobtrusive as possible.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor-easyprof-ubuntu/+bug/1371170/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 870373] Re: guest session will not open

2014-09-18 Thread Jamie Strandboge
Marking this as fixed. The user said a reinstall fixed it and the guest
session has been working fine for a long time. Please file a new bug if
you are still having issues.

** Changed in: lightdm (Ubuntu)
   Status: Confirmed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to lightdm in Ubuntu.
https://bugs.launchpad.net/bugs/870373

Title:
  guest session will not open

Status in “lightdm” package in Ubuntu:
  Fix Released

Bug description:
  What I expected to happen:

  By choosing the guest session option (either from the login screen or
  the user menu when logged in to a normal account) a guest session
  should be launched.

  What happened instead:

  By choosing either method, the screen goes blank for a moment before I
  am returned to the login screen.

  Looking at the logs, it looks like the guest /home is created in
  /tmp, but for whatever reason it can't be used.  At first I thought it
  was due to the apparmor profile for the guest session, since it throws
  up a lot of denied  entries, but even after putting that profile in
  complain mode, the issue persists.

  ProblemType: Bug
  DistroRelease: Ubuntu 11.10
  Package: lightdm 1.0.1-0ubuntu6
  ProcVersionSignature: Ubuntu 3.0.0-12.19-generic 3.0.4
  Uname: Linux 3.0.0-12-generic i686
  ApportVersion: 1.23-0ubuntu2
  Architecture: i386
  Date: Fri Oct  7 23:55:29 2011
  InstallationMedia: Ubuntu 11.10 Oneiric Ocelot - Beta i386 (20110901)
  ProcEnviron:
   LANGUAGE=en_GB:en
   PATH=(custom, no user)
   LANG=en_GB.UTF-8
   SHELL=/bin/bash
  SourcePackage: lightdm
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lightdm/+bug/870373/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1361372] Re: Apparmor stopping Google Chrome from launching in guest session

2014-09-18 Thread Jamie Strandboge
** Changed in: lightdm (Ubuntu)
   Status: New = In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to lightdm in Ubuntu.
https://bugs.launchpad.net/bugs/1361372

Title:
  Apparmor stopping Google Chrome from launching in guest session

Status in “lightdm” package in Ubuntu:
  In Progress

Bug description:
  As mentioned in comment 5 of bug #1298021, it seems that Google have
  modified how they package Chrome in their repository.

  Based on the fix for that bug, it appears that Chrome was packaged as
  /opt/google/chrome-stable/google-chrome-stable, /opt/google/chrome-
  beta/google-chrome-beta or /opt/google/chrome-unstable/google-chrome-
  unstable based on the package version. The current stable package,
  google-chrome-stable version 36.0.1985.143-1, from the repository at
  http://dl.google.com/linux/chrome/deb/installs the binary as
  /opt/google/chrome/google-chrome, which doesn't match any of the rules
  added to Apparmor.

  Adding the following additional line caused the browser to work in
  guest mode for me:

/opt/google/chrome/google-chrome Cx - chromium,

  $ lsb_release -rd
  Description:  Ubuntu 14.04.1 LTS
  Release:  14.04

  $ apt-cache policy lightdm
  lightdm:
Installed: 1.10.1-0ubuntu1
Candidate: 1.10.1-0ubuntu1
Version table:
   *** 1.10.1-0ubuntu1 0
  500 http://gb.archive.ubuntu.com/ubuntu/ trusty-updates/main amd64 
Packages
  100 /var/lib/dpkg/status
   1.10.0-0ubuntu3 0
  500 http://gb.archive.ubuntu.com/ubuntu/ trusty/main amd64 Packages

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lightdm/+bug/1361372/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1362469] Re: AppArmor unrequested reply protection generates unallowable denials

2014-09-18 Thread Jamie Strandboge
** Tags added: application-confinement

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to dbus in Ubuntu.
https://bugs.launchpad.net/bugs/1362469

Title:
  AppArmor unrequested reply protection generates unallowable denials

Status in “dbus” package in Ubuntu:
  Triaged

Bug description:
  Starting with utopic's dbus 1.8.6-1ubuntu1 package, the new AppArmor
  unrequested reply protections can generate some denials that can't
  easily be allowed in policy. For example, when running a confined
  pasaffe, you see these denials when starting and closing pasaffe:

  apparmor=DENIED operation=dbus_error  bus=session
  error_name=org.freedesktop.DBus.Error.UnknownMethod mask=send
  name=:1.22 pid=4993 profile=/usr/bin/pasaffe peer_pid=3624
  peer_profile=unconfined

  It isn't obvious how to construct an AppArmor D-Bus rule to allow that
  operation. A bare dbus, rule allows it but that's not acceptable for
  profiles implementing tight D-Bus confinement.

  The code that implements unrequested reply protections should be
  reviewed for issues and, if everything looks good there,
  investigations into how to allow the operation that triggers the above
  denial should occur.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dbus/+bug/1362469/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1371310] [NEW] docker.io doesn't work with 3.0 RC1 kernel

2014-09-18 Thread Jamie Strandboge
Public bug reported:

Steps to reproduce (from
https://wiki.ubuntu.com/Process/Merges/TestPlans/AppArmor):

1. sudo apt-get install docker.io # 1.2.0~dfsg1-1

2. sudo docker pull ubuntu:trusty

3. sudo docker run ubuntu:trusty uptime
2014/09/18 15:48:48 Error response from daemon: Cannot start container 
fcdfaaf7945bcd9455fb5e0bde9950451152af14556880033818df7b50ddb1f4: set apparmor 
profile docker-default: permission denied

What is expected? uptime to return something like:
$ sudo docker run ubuntu:trusty uptime
 20:31:21 up 1 min,  0 users,  load average: 0.09, 0.06, 0.03


I set 'sudo sysctl -w kernel.printk_ratelimit=0' but there is nothing apparmor 
related in the logs. If I boot an earlier kernel without the 3.0 RC1 patches, 
it works.

** Affects: apparmor (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: docker.io (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Confirmed

** Also affects: docker.io (Ubuntu)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
   Status: New = Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/1371310

Title:
  docker.io doesn't work with 3.0 RC1 kernel

Status in “apparmor” package in Ubuntu:
  New
Status in “docker.io” package in Ubuntu:
  New
Status in “linux” package in Ubuntu:
  Confirmed

Bug description:
  Steps to reproduce (from
  https://wiki.ubuntu.com/Process/Merges/TestPlans/AppArmor):

  1. sudo apt-get install docker.io # 1.2.0~dfsg1-1

  2. sudo docker pull ubuntu:trusty

  3. sudo docker run ubuntu:trusty uptime
  2014/09/18 15:48:48 Error response from daemon: Cannot start container 
fcdfaaf7945bcd9455fb5e0bde9950451152af14556880033818df7b50ddb1f4: set apparmor 
profile docker-default: permission denied

  What is expected? uptime to return something like:
  $ sudo docker run ubuntu:trusty uptime
   20:31:21 up 1 min,  0 users,  load average: 0.09, 0.06, 0.03

  
  I set 'sudo sysctl -w kernel.printk_ratelimit=0' but there is nothing 
apparmor related in the logs. If I boot an earlier kernel without the 3.0 RC1 
patches, it works.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1371310/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1371310] Re: docker.io doesn't work with 3.0 RC1 kernel

2014-09-18 Thread Jamie Strandboge
Installing auditd does not help.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/1371310

Title:
  docker.io doesn't work with 3.0 RC1 kernel

Status in “apparmor” package in Ubuntu:
  New
Status in “docker.io” package in Ubuntu:
  New
Status in “linux” package in Ubuntu:
  Confirmed

Bug description:
  Steps to reproduce (from
  https://wiki.ubuntu.com/Process/Merges/TestPlans/AppArmor):

  1. sudo apt-get install docker.io # 1.2.0~dfsg1-1

  2. sudo docker pull ubuntu:trusty

  3. sudo docker run ubuntu:trusty uptime
  2014/09/18 15:48:48 Error response from daemon: Cannot start container 
fcdfaaf7945bcd9455fb5e0bde9950451152af14556880033818df7b50ddb1f4: set apparmor 
profile docker-default: permission denied

  What is expected? uptime to return something like:
  $ sudo docker run ubuntu:trusty uptime
   20:31:21 up 1 min,  0 users,  load average: 0.09, 0.06, 0.03

  
  I set 'sudo sysctl -w kernel.printk_ratelimit=0' but there is nothing 
apparmor related in the logs. If I boot an earlier kernel without the 3.0 RC1 
patches, it works.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1371310/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1371310] Re: docker.io doesn't work with 3.0 RC1 kernel

2014-09-18 Thread Jamie Strandboge
The target profile is loaded:
$ sudo aa-status|grep docker
   docker-default

I tried this on the 3.16.0-9.14 and 3.16.0-16.22 distro kernels. The 'docker 
run' command succeeds. If I do this:
$ sudo docker run -i -t ubuntu:trusty /bin/sh

I can verify the container is launched under confinement here:
sudo aa-status|grep docker
   docker-default
   docker-default (2209)

$ ps -Z 2209
LABEL PID TTY  STAT   TIME COMMAND
docker-default   2209 pts/1Ss+0:00 /bin/sh

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/1371310

Title:
  docker.io doesn't work with 3.0 RC1 kernel

Status in “apparmor” package in Ubuntu:
  New
Status in “docker.io” package in Ubuntu:
  New
Status in “linux” package in Ubuntu:
  Confirmed

Bug description:
  Steps to reproduce (from
  https://wiki.ubuntu.com/Process/Merges/TestPlans/AppArmor):

  1. sudo apt-get install docker.io # 1.2.0~dfsg1-1

  2. sudo docker pull ubuntu:trusty

  3. sudo docker run ubuntu:trusty uptime
  2014/09/18 15:48:48 Error response from daemon: Cannot start container 
fcdfaaf7945bcd9455fb5e0bde9950451152af14556880033818df7b50ddb1f4: set apparmor 
profile docker-default: permission denied

  What is expected? uptime to return something like:
  $ sudo docker run ubuntu:trusty uptime
   20:31:21 up 1 min,  0 users,  load average: 0.09, 0.06, 0.03

  
  I set 'sudo sysctl -w kernel.printk_ratelimit=0' but there is nothing 
apparmor related in the logs. If I boot an earlier kernel without the 3.0 RC1 
patches, it works.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1371310/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1371310] Re: docker.io doesn't work with 3.0 RC1 kernel

2014-09-18 Thread Jamie Strandboge
Adding the following to /etc/apparmor.d/docker does not help:
  audit unix,
  audit signal,
  audit ptrace,
  change_profile - *,

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/1371310

Title:
  docker.io doesn't work with 3.0 RC1 kernel

Status in “apparmor” package in Ubuntu:
  New
Status in “docker.io” package in Ubuntu:
  New
Status in “linux” package in Ubuntu:
  Confirmed

Bug description:
  Steps to reproduce (from
  https://wiki.ubuntu.com/Process/Merges/TestPlans/AppArmor):

  1. sudo apt-get install docker.io # 1.2.0~dfsg1-1

  2. sudo docker pull ubuntu:trusty

  3. sudo docker run ubuntu:trusty uptime
  2014/09/18 15:48:48 Error response from daemon: Cannot start container 
fcdfaaf7945bcd9455fb5e0bde9950451152af14556880033818df7b50ddb1f4: set apparmor 
profile docker-default: permission denied

  What is expected? uptime to return something like:
  $ sudo docker run ubuntu:trusty uptime
   20:31:21 up 1 min,  0 users,  load average: 0.09, 0.06, 0.03

  
  I set 'sudo sysctl -w kernel.printk_ratelimit=0' but there is nothing 
apparmor related in the logs. If I boot an earlier kernel without the 3.0 RC1 
patches, it works.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1371310/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1371310] Re: docker.io doesn't work with 3.0 RC1 kernel

2014-09-18 Thread Jamie Strandboge
** Changed in: apparmor (Ubuntu)
   Importance: Undecided = High

** Changed in: linux (Ubuntu)
   Importance: Undecided = High

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/1371310

Title:
  docker.io doesn't work with 3.0 RC1 kernel

Status in “apparmor” package in Ubuntu:
  New
Status in “docker.io” package in Ubuntu:
  New
Status in “linux” package in Ubuntu:
  Confirmed

Bug description:
  Steps to reproduce (from
  https://wiki.ubuntu.com/Process/Merges/TestPlans/AppArmor):

  1. sudo apt-get install docker.io # 1.2.0~dfsg1-1

  2. sudo docker pull ubuntu:trusty

  3. sudo docker run ubuntu:trusty uptime
  2014/09/18 15:48:48 Error response from daemon: Cannot start container 
fcdfaaf7945bcd9455fb5e0bde9950451152af14556880033818df7b50ddb1f4: set apparmor 
profile docker-default: permission denied

  What is expected? uptime to return something like:
  $ sudo docker run ubuntu:trusty uptime
   20:31:21 up 1 min,  0 users,  load average: 0.09, 0.06, 0.03

  
  I set 'sudo sysctl -w kernel.printk_ratelimit=0' but there is nothing 
apparmor related in the logs. If I boot an earlier kernel without the 3.0 RC1 
patches, it works.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1371310/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1362543] Re: Web Application fail to load properly every other time is launched

2014-09-19 Thread Jamie Strandboge
** Changed in: oxide
   Importance: Undecided = Critical

** Changed in: oxide
   Status: New = Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to webbrowser-app in Ubuntu.
https://bugs.launchpad.net/bugs/1362543

Title:
  Web Application fail to load properly every other time is launched

Status in Oxide Webview:
  Confirmed
Status in Web Browser App:
  In Progress
Status in “webbrowser-app” package in Ubuntu:
  In Progress

Bug description:
  I am testing a game called ninjaflips. Works fine the first time you
  launch it , but the second time wont load correctly. If you close it
  and try again it will launch fine and so on..

  Attached logs for working and not working plus click package

To manage notifications about this bug go to:
https://bugs.launchpad.net/oxide/+bug/1362543/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1370930] Re: apparmor cups samba problem no printing

2014-09-19 Thread Jamie Strandboge
Since 14.04, apparmor has signal mediation. Cups is trying to kill some 
processes. To obtain 13.10 behavior, you could add this to usr.sbin.cupsd:
  signal,

However, this would obviously allow cups to send signals to anything. I'm 
guessing it is sending signals to third party backends. It would probably be 
best to change this rule:
  /usr/lib/cups/backend/* Ux,

to something like (untested):
  /usr/lib/cups/backend/* Cx - cups_backends,
  signal (send) peer=cups_backends,
  profile cups_backends {
file,
capability,
network,
audit deny capability mac_admin,
dbus,
signal,
ptrace,
unix,
  }

In addition to fixing the above, this adds a modest improvement over
what we have now: backends aren't allowed to change MAC policy, can't
change_profile and can't use mount.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to cups in Ubuntu.
https://bugs.launchpad.net/bugs/1370930

Title:
  apparmor cups samba problem no printing

Status in “cups” package in Ubuntu:
  New

Bug description:
  I configured a usb brother printer correctly (working) on ubuntu 14.04.1.
  Then I installed a samba server to share this printer on a windows network
  The samba printing from windows machines works correctly. The usb direct cups 
printing inform printing OK, jobs completed, but nothing prints. On syslog I 
see this apparmor DENIED messages:
  Sep 18 08:51:57 gabi-K55A kernel: [  844.181601] type=1400 
audit(1411023117.729:74): apparmor=DENIED operation=open 
profile=/usr/sbin/cupsd
   name=/var/cache/samba/gencache.tdb pid=3353 comm=smb requested_mask=r 
denied_mask=r fsuid=7 ouid=0
  Sep 18 08:51:57 gabi-K55A kernel: [  844.181649] type=1400 
audit(1411023117.729:75): apparmor=DENIED operation=open 
profile=/usr/sbin/cupsd
   name=/var/cache/samba/gencache.tdb pid=3353 comm=smb requested_mask=r 
denied_mask=r fsuid=7 ouid=0
  Sep 18 08:51:57 gabi-K55A kernel: [  844.182286] type=1400 
audit(1411023117.729:76): apparmor=DENIED operation=open 
profile=/usr/sbin/cupsd
   name=/var/cache/samba/gencache.tdb pid=3353 comm=smb requested_mask=r 
denied_mask=r fsuid=7 ouid=0
  Sep 18 08:54:04 gabi-K55A kernel: [  971.394145] type=1400 
audit(1411023244.943:77): apparmor=DENIED operation=signal 
profile=/usr/sbin/cup
  sd pid=2034 comm=cupsd requested_mask=send denied_mask=send 
signal=term peer=unconfined
  Sep 18 08:54:04 gabi-K55A kernel: [  971.394155] type=1400 
audit(1411023244.943:78): apparmor=DENIED operation=signal 
profile=/usr/sbin/cup
  sd pid=2034 comm=cupsd requested_mask=send denied_mask=send 
signal=term peer=unconfined
  Sep 18 08:54:04 gabi-K55A kernel: [  971.394161] type=1400 
audit(1411023244.943:79): apparmor=DENIED operation=signal 
profile=/usr/sbin/cup
  sd pid=2034 comm=cupsd requested_mask=send denied_mask=send 
signal=term peer=unconfined
  Sep 18 08:54:04 gabi-K55A kernel: [  971.394166] type=1400 
audit(1411023244.943:80): apparmor=DENIED operation=signal 
profile=/usr/sbin/cup
  sd pid=2034 comm=cupsd requested_mask=send denied_mask=send 
signal=term peer=unconfined


  I install with apt-get last apparmor profiles, but I get this messages yet, 
with the same result (no printing):
  Sep 18 09:15:06 gabi-K55A kernel: [  100.620853] usblp0: removed
  Sep 18 09:15:06 gabi-K55A kernel: [  100.878155] usblp 1-4:1.0: usblp0: USB 
Bidirectional printer dev 3 if 0 alt 0 proto 2 vid 0x04F9 pid 0x0037
  Sep 18 09:16:39 gabi-K55A kernel: [  193.894732] type=1400 
audit(1411024599.437:117): apparmor=DENIED operation=open 
profile=/usr/sbin/cupsd name=/var/cache/samba/gencache.tdb pid=2384 
comm=smb requested_mask=r denied_mask=r fsuid=7 ouid=0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/cups/+bug/1370930/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1370930] Re: apparmor cups samba problem no printing

2014-09-19 Thread Jamie Strandboge
Actually, I see more Ux rules. Try this instead (also untested):
  /usr/bin/hpijs Cx - third_party, 
   
  /usr/Brother/** Cx - third_party, 
  /usr/lib/cups/backend/* Cx - third_party,
  /usr/lib/cups/filter/** Cxr - third_party,
  /usr/lib/cups/driver/* Cxr - third_party,
  signal (send) peer=third_party,
  profile third_party {
file,
capability,
network,
audit deny capability mac_admin,
dbus,
signal,
ptrace,
unix,
  }

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to cups in Ubuntu.
https://bugs.launchpad.net/bugs/1370930

Title:
  apparmor cups samba problem no printing

Status in “cups” package in Ubuntu:
  New

Bug description:
  I configured a usb brother printer correctly (working) on ubuntu 14.04.1.
  Then I installed a samba server to share this printer on a windows network
  The samba printing from windows machines works correctly. The usb direct cups 
printing inform printing OK, jobs completed, but nothing prints. On syslog I 
see this apparmor DENIED messages:
  Sep 18 08:51:57 gabi-K55A kernel: [  844.181601] type=1400 
audit(1411023117.729:74): apparmor=DENIED operation=open 
profile=/usr/sbin/cupsd
   name=/var/cache/samba/gencache.tdb pid=3353 comm=smb requested_mask=r 
denied_mask=r fsuid=7 ouid=0
  Sep 18 08:51:57 gabi-K55A kernel: [  844.181649] type=1400 
audit(1411023117.729:75): apparmor=DENIED operation=open 
profile=/usr/sbin/cupsd
   name=/var/cache/samba/gencache.tdb pid=3353 comm=smb requested_mask=r 
denied_mask=r fsuid=7 ouid=0
  Sep 18 08:51:57 gabi-K55A kernel: [  844.182286] type=1400 
audit(1411023117.729:76): apparmor=DENIED operation=open 
profile=/usr/sbin/cupsd
   name=/var/cache/samba/gencache.tdb pid=3353 comm=smb requested_mask=r 
denied_mask=r fsuid=7 ouid=0
  Sep 18 08:54:04 gabi-K55A kernel: [  971.394145] type=1400 
audit(1411023244.943:77): apparmor=DENIED operation=signal 
profile=/usr/sbin/cup
  sd pid=2034 comm=cupsd requested_mask=send denied_mask=send 
signal=term peer=unconfined
  Sep 18 08:54:04 gabi-K55A kernel: [  971.394155] type=1400 
audit(1411023244.943:78): apparmor=DENIED operation=signal 
profile=/usr/sbin/cup
  sd pid=2034 comm=cupsd requested_mask=send denied_mask=send 
signal=term peer=unconfined
  Sep 18 08:54:04 gabi-K55A kernel: [  971.394161] type=1400 
audit(1411023244.943:79): apparmor=DENIED operation=signal 
profile=/usr/sbin/cup
  sd pid=2034 comm=cupsd requested_mask=send denied_mask=send 
signal=term peer=unconfined
  Sep 18 08:54:04 gabi-K55A kernel: [  971.394166] type=1400 
audit(1411023244.943:80): apparmor=DENIED operation=signal 
profile=/usr/sbin/cup
  sd pid=2034 comm=cupsd requested_mask=send denied_mask=send 
signal=term peer=unconfined


  I install with apt-get last apparmor profiles, but I get this messages yet, 
with the same result (no printing):
  Sep 18 09:15:06 gabi-K55A kernel: [  100.620853] usblp0: removed
  Sep 18 09:15:06 gabi-K55A kernel: [  100.878155] usblp 1-4:1.0: usblp0: USB 
Bidirectional printer dev 3 if 0 alt 0 proto 2 vid 0x04F9 pid 0x0037
  Sep 18 09:16:39 gabi-K55A kernel: [  193.894732] type=1400 
audit(1411024599.437:117): apparmor=DENIED operation=open 
profile=/usr/sbin/cupsd name=/var/cache/samba/gencache.tdb pid=2384 
comm=smb requested_mask=r denied_mask=r fsuid=7 ouid=0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/cups/+bug/1370930/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1371765] [NEW] apparmor_parser should be able to recompile policy on bad cache

2014-09-19 Thread Jamie Strandboge
Public bug reported:

Right now, if given --cache-loc the parser will see if there is a cache
file. If there isn't and --write-cache is used, the parser will compile
the policy and put the binary cache in --cache-loc (fine). If there is a
cache file, it will load the cache file (also fine). If the cache file
is corrupt, the policy is not loaded into the kernel.

Not loading the policy into the kernel may be fine for certain
environments, but there should be an option on if the cache file is
corrupt, to delete it, recompile the policy and write out a new cache
file. This would be very worthwhile for Ubuntu's cache loading since
there is no way to recover from a bad cache file without user
intervention.

Setting to 'High' with tags to indicate that we want to include this on
shipping devices but that it can be delivered as OTA.

** Affects: apparmor (Ubuntu)
 Importance: High
 Status: Triaged


** Tags: ota-1 rtm14

** Changed in: apparmor (Ubuntu)
   Importance: Undecided = High

** Changed in: apparmor (Ubuntu)
   Status: New = Triaged

** Tags added: ota-1 rtm14

** Description changed:

  Right now, if given --cache-loc the parser will see if there is a cache
  file. If there isn't and --write-cache is used, the parser will compile
  the policy and put the binary cache in --cache-loc (fine). If there is a
  cache file, it will load the cache file (also fine). If the cache file
  is corrupt, the policy is not loaded into the kernel.
  
  Not loading the policy into the kernel may be fine for certain
  environments, but there should be an option on if the cache file is
  corrupt, to delete it, recompile the policy and write out a new cache
  file. This would be very worthwhile for Ubuntu's cache loading since
  there is no way to recover from a bad cache file without user
  intervention.
+ 
+ Setting to 'High' with tags to indicate that we want to include this on
+ shipping devices but that it can be delivered as OTA.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/1371765

Title:
  apparmor_parser should be able to recompile policy on bad cache

Status in “apparmor” package in Ubuntu:
  Triaged

Bug description:
  Right now, if given --cache-loc the parser will see if there is a
  cache file. If there isn't and --write-cache is used, the parser will
  compile the policy and put the binary cache in --cache-loc (fine). If
  there is a cache file, it will load the cache file (also fine). If the
  cache file is corrupt, the policy is not loaded into the kernel.

  Not loading the policy into the kernel may be fine for certain
  environments, but there should be an option on if the cache file is
  corrupt, to delete it, recompile the policy and write out a new cache
  file. This would be very worthwhile for Ubuntu's cache loading since
  there is no way to recover from a bad cache file without user
  intervention.

  Setting to 'High' with tags to indicate that we want to include this
  on shipping devices but that it can be delivered as OTA.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1371765/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1371771] [NEW] premature exit if find corrupted cache files

2014-09-19 Thread Jamie Strandboge
Public bug reported:

2.8.96~2652-0ubuntu4 did this:
  * debian/lib/apparmor/functions: don't pass costly '-n1' to xargs in
foreach_configured_profile() when loading valid cache files. This used to
be needed when apparmor_parser would generate different binary caches when
compiling policy one profile at a time and all at once. That bug is long
fixed and removing -n1 gives a significant performance improvement for
boots with valid cache files (~65% on armhf)

This is great except there is a parser bug that if there is a corrupted
cache file, all further cache files fail to load. While it is unusual to
have corrupted cache files, the damage is catastrophic if an early cache
file is corrupt since all remaining policy fails to load and requires
the user to manually delete the corrupted cache files. Fixing the
premature exit will not address corrupt cache files, but will allow the
remaining good cache files to load.

Please see bug #1371765 on how to make cache usage more robust.

** Affects: apparmor (Ubuntu)
 Importance: Critical
 Assignee: John Johansen (jjohansen)
 Status: In Progress


** Tags: rtm14 touch-2014-09-25

** Changed in: apparmor (Ubuntu)
   Status: New = In Progress

** Changed in: apparmor (Ubuntu)
   Importance: Undecided = Critical

** Changed in: apparmor (Ubuntu)
 Assignee: (unassigned) = John Johansen (jjohansen)

** Tags added: rtm14 touch-2014-09-25

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/1371771

Title:
  premature exit if find corrupted cache files

Status in “apparmor” package in Ubuntu:
  In Progress

Bug description:
  2.8.96~2652-0ubuntu4 did this:
* debian/lib/apparmor/functions: don't pass costly '-n1' to xargs in
  foreach_configured_profile() when loading valid cache files. This used to
  be needed when apparmor_parser would generate different binary caches when
  compiling policy one profile at a time and all at once. That bug is long
  fixed and removing -n1 gives a significant performance improvement for
  boots with valid cache files (~65% on armhf)

  This is great except there is a parser bug that if there is a
  corrupted cache file, all further cache files fail to load. While it
  is unusual to have corrupted cache files, the damage is catastrophic
  if an early cache file is corrupt since all remaining policy fails to
  load and requires the user to manually delete the corrupted cache
  files. Fixing the premature exit will not address corrupt cache files,
  but will allow the remaining good cache files to load.

  Please see bug #1371765 on how to make cache usage more robust.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1371771/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1371310] Re: docker.io doesn't work with 3.0 RC1 kernel

2014-09-19 Thread Jamie Strandboge
After discussing on IRC, we will revert the patch enabling stricter
requirements to restore previous behavior while we investigate the best
approach to resolve the issue properly.

** Changed in: linux (Ubuntu)
   Status: Confirmed = Triaged

** Changed in: apparmor (Ubuntu)
   Status: New = Invalid

** Changed in: docker.io (Ubuntu)
   Importance: Undecided = High

** Changed in: docker.io (Ubuntu)
   Status: New = Invalid

** Changed in: linux (Ubuntu)
 Assignee: (unassigned) = John Johansen (jjohansen)

** Summary changed:

- docker.io doesn't work with 3.0 RC1 kernel
+ docker.io doesn't work with apparmor 3.0 RC1 kernel

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/1371310

Title:
  docker.io doesn't work with apparmor 3.0 RC1 kernel

Status in “apparmor” package in Ubuntu:
  Invalid
Status in “docker.io” package in Ubuntu:
  Invalid
Status in “linux” package in Ubuntu:
  Triaged

Bug description:
  Steps to reproduce (from
  https://wiki.ubuntu.com/Process/Merges/TestPlans/AppArmor):

  1. sudo apt-get install docker.io # 1.2.0~dfsg1-1

  2. sudo docker pull ubuntu:trusty

  3. sudo docker run ubuntu:trusty uptime
  2014/09/18 15:48:48 Error response from daemon: Cannot start container 
fcdfaaf7945bcd9455fb5e0bde9950451152af14556880033818df7b50ddb1f4: set apparmor 
profile docker-default: permission denied

  What is expected? uptime to return something like:
  $ sudo docker run ubuntu:trusty uptime
   20:31:21 up 1 min,  0 users,  load average: 0.09, 0.06, 0.03

  I set 'sudo sysctl -w kernel.printk_ratelimit=0' but there is nothing
  apparmor related in the logs. If I boot an earlier kernel without the
  3.0 RC1 patches, it works.

  FYI, 3.16.0-17.23 is in utopic-proposed now and on its way to utopic,
  which will affect docker.io in Ubuntu. Workaround until this bug is
  fixed is to boot into 3.16.0-16.22 or earlier.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1371310/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1371310] Re: docker.io doesn't work with apparmor 3.0 RC1 kernel

2014-09-19 Thread Jamie Strandboge
** Description changed:

  Steps to reproduce (from
  https://wiki.ubuntu.com/Process/Merges/TestPlans/AppArmor):
  
  1. sudo apt-get install docker.io # 1.2.0~dfsg1-1
  
  2. sudo docker pull ubuntu:trusty
  
  3. sudo docker run ubuntu:trusty uptime
  2014/09/18 15:48:48 Error response from daemon: Cannot start container 
fcdfaaf7945bcd9455fb5e0bde9950451152af14556880033818df7b50ddb1f4: set apparmor 
profile docker-default: permission denied
  
  What is expected? uptime to return something like:
  $ sudo docker run ubuntu:trusty uptime
-  20:31:21 up 1 min,  0 users,  load average: 0.09, 0.06, 0.03
+  20:31:21 up 1 min,  0 users,  load average: 0.09, 0.06, 0.03
  
+ I set 'sudo sysctl -w kernel.printk_ratelimit=0' but there is nothing
+ apparmor related in the logs. If I boot an earlier kernel without the
+ 3.0 RC1 patches, it works.
  
- I set 'sudo sysctl -w kernel.printk_ratelimit=0' but there is nothing 
apparmor related in the logs. If I boot an earlier kernel without the 3.0 RC1 
patches, it works.
+ FYI, 3.16.0-17.23 is in utopic-proposed now and on its way to utopic,
+ which will affect docker.io in Ubuntu. Workaround until this bug is
+ fixed is to boot into 3.16.0-16.22 or earlier.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/1371310

Title:
  docker.io doesn't work with apparmor 3.0 RC1 kernel

Status in “apparmor” package in Ubuntu:
  Invalid
Status in “docker.io” package in Ubuntu:
  Invalid
Status in “linux” package in Ubuntu:
  Triaged

Bug description:
  Steps to reproduce (from
  https://wiki.ubuntu.com/Process/Merges/TestPlans/AppArmor):

  1. sudo apt-get install docker.io # 1.2.0~dfsg1-1

  2. sudo docker pull ubuntu:trusty

  3. sudo docker run ubuntu:trusty uptime
  2014/09/18 15:48:48 Error response from daemon: Cannot start container 
fcdfaaf7945bcd9455fb5e0bde9950451152af14556880033818df7b50ddb1f4: set apparmor 
profile docker-default: permission denied

  What is expected? uptime to return something like:
  $ sudo docker run ubuntu:trusty uptime
   20:31:21 up 1 min,  0 users,  load average: 0.09, 0.06, 0.03

  I set 'sudo sysctl -w kernel.printk_ratelimit=0' but there is nothing
  apparmor related in the logs. If I boot an earlier kernel without the
  3.0 RC1 patches, it works.

  FYI, 3.16.0-17.23 is in utopic-proposed now and on its way to utopic,
  which will affect docker.io in Ubuntu. Workaround until this bug is
  fixed is to boot into 3.16.0-16.22 or earlier.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1371310/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1371765] Re: apparmor_parser should be able to recompile policy on bad cache

2014-09-19 Thread Jamie Strandboge
** Changed in: apparmor (Ubuntu)
   Status: Triaged = In Progress

** Changed in: apparmor (Ubuntu)
 Assignee: (unassigned) = John Johansen (jjohansen)

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/1371765

Title:
  apparmor_parser should be able to recompile policy on bad cache

Status in “apparmor” package in Ubuntu:
  In Progress

Bug description:
  Right now, if given --cache-loc the parser will see if there is a
  cache file. If there isn't and --write-cache is used, the parser will
  compile the policy and put the binary cache in --cache-loc (fine). If
  there is a cache file, it will load the cache file (also fine). If the
  cache file is corrupt, the policy is not loaded into the kernel.

  Not loading the policy into the kernel may be fine for certain
  environments, but there should be an option on if the cache file is
  corrupt, to delete it, recompile the policy and write out a new cache
  file. This would be very worthwhile for Ubuntu's cache loading since
  there is no way to recover from a bad cache file without user
  intervention.

  Setting to 'High' with tags to indicate that we want to include this
  on shipping devices but that it can be delivered as OTA.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1371765/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1371835] [NEW] highlighting selected item displays incorrectly with OptionSelector

2014-09-19 Thread Jamie Strandboge
Public bug reported:

Steps to reproduce:

1. open the Ubuntu SDK
2. Tools/Ubuntu/Showcase Gallery
3. click Styles on the left
4. select the SuruDark theme

Notice after selecting the dark theme that there is a light gray
rectangle for the selected item. This light gray box expands outside the
rounded corners of the OptionSelector and looks wrong. If you look very
carefully at the Ambiance theme, the same thing happens there with the
selected item-- it is just that the highlight color is much closer to
the background color.

I have an application that is affected by this and it makes it look horrible. I 
think two things should be fixed to address this bug:
1. the highlight color should fill within the rounded corners but not outside)
2. you should be able to disable highlighting or make the color configurable, 
since not all users of OptionSelector will want to have the default highlight 
color (I do not in my application).

Adding rtm14 tag and marking as Critical because many applications use
OptionSelector and this bug makes these applications look bad.

** Affects: ubuntu-ui-toolkit (Ubuntu)
 Importance: Critical
 Status: New


** Tags: rtm14

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ubuntu-ui-toolkit in
Ubuntu.
https://bugs.launchpad.net/bugs/1371835

Title:
  highlighting selected item displays incorrectly with OptionSelector

Status in “ubuntu-ui-toolkit” package in Ubuntu:
  New

Bug description:
  Steps to reproduce:

  1. open the Ubuntu SDK
  2. Tools/Ubuntu/Showcase Gallery
  3. click Styles on the left
  4. select the SuruDark theme

  Notice after selecting the dark theme that there is a light gray
  rectangle for the selected item. This light gray box expands outside
  the rounded corners of the OptionSelector and looks wrong. If you look
  very carefully at the Ambiance theme, the same thing happens there
  with the selected item-- it is just that the highlight color is much
  closer to the background color.

  I have an application that is affected by this and it makes it look horrible. 
I think two things should be fixed to address this bug:
  1. the highlight color should fill within the rounded corners but not outside)
  2. you should be able to disable highlighting or make the color configurable, 
since not all users of OptionSelector will want to have the default highlight 
color (I do not in my application).

  Adding rtm14 tag and marking as Critical because many applications use
  OptionSelector and this bug makes these applications look bad.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-ui-toolkit/+bug/1371835/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1371835] Re: highlighting selected item displays incorrectly with OptionSelector and ItemSelector

2014-09-19 Thread Jamie Strandboge
** Summary changed:

- highlighting selected item displays incorrectly with OptionSelector
+ highlighting selected item displays incorrectly with OptionSelector and 
ItemSelector

** Description changed:

  Steps to reproduce:
  
  1. open the Ubuntu SDK
  2. Tools/Ubuntu/Showcase Gallery
  3. click Styles on the left
  4. select the SuruDark theme
  
  Notice after selecting the dark theme that there is a light gray
  rectangle for the selected item. This light gray box expands outside the
  rounded corners of the OptionSelector and looks wrong. If you look very
  carefully at the Ambiance theme, the same thing happens there with the
  selected item-- it is just that the highlight color is much closer to
  the background color.
  
  I have an application that is affected by this and it makes it look horrible. 
I think two things should be fixed to address this bug:
  1. the highlight color should fill within the rounded corners but not outside)
  2. you should be able to disable highlighting or make the color configurable, 
since not all users of OptionSelector will want to have the default highlight 
color (I do not in my application).
  
  Adding rtm14 tag and marking as Critical because many applications use
  OptionSelector and this bug makes these applications look bad.
+ 
+ I just noticed the same thing happens with ItemSelector.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ubuntu-ui-toolkit in
Ubuntu.
https://bugs.launchpad.net/bugs/1371835

Title:
  highlighting selected item displays incorrectly with OptionSelector
  and ItemSelector

Status in “ubuntu-ui-toolkit” package in Ubuntu:
  New

Bug description:
  Steps to reproduce:

  1. open the Ubuntu SDK
  2. Tools/Ubuntu/Showcase Gallery
  3. click Styles on the left
  4. select the SuruDark theme

  Notice after selecting the dark theme that there is a light gray
  rectangle for the selected item. This light gray box expands outside
  the rounded corners of the OptionSelector and looks wrong. If you look
  very carefully at the Ambiance theme, the same thing happens there
  with the selected item-- it is just that the highlight color is much
  closer to the background color.

  I have an application that is affected by this and it makes it look horrible. 
I think two things should be fixed to address this bug:
  1. the highlight color should fill within the rounded corners but not outside)
  2. you should be able to disable highlighting or make the color configurable, 
since not all users of OptionSelector will want to have the default highlight 
color (I do not in my application).

  Adding rtm14 tag and marking as Critical because many applications use
  OptionSelector and this bug makes these applications look bad.

  I just noticed the same thing happens with ItemSelector.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-ui-toolkit/+bug/1371835/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1371835] Re: highlighting selected item displays incorrectly with OptionSelector and ItemSelector

2014-09-19 Thread Jamie Strandboge
Attached is an example of ItemSelector displaying the problem in my app.
Specifically, the highlight is outside of the rounded corners and there
is no way to turn of highlighting/adjust the color of the highlight that
I can see. The default highlighting is garish in my app and not what I
want.

** Attachment added: itemselector_highlight.png
   
https://bugs.launchpad.net/ubuntu/+source/ubuntu-ui-toolkit/+bug/1371835/+attachment/4209398/+files/itemselector_highlight.png

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ubuntu-ui-toolkit in
Ubuntu.
https://bugs.launchpad.net/bugs/1371835

Title:
  highlighting selected item displays incorrectly with OptionSelector
  and ItemSelector

Status in “ubuntu-ui-toolkit” package in Ubuntu:
  New

Bug description:
  Steps to reproduce:

  1. open the Ubuntu SDK
  2. Tools/Ubuntu/Showcase Gallery
  3. click Styles on the left
  4. select the SuruDark theme

  Notice after selecting the dark theme that there is a light gray
  rectangle for the selected item. This light gray box expands outside
  the rounded corners of the OptionSelector and looks wrong. If you look
  very carefully at the Ambiance theme, the same thing happens there
  with the selected item-- it is just that the highlight color is much
  closer to the background color.

  I have an application that is affected by this and it makes it look horrible. 
I think two things should be fixed to address this bug:
  1. the highlight color should fill within the rounded corners but not outside)
  2. you should be able to disable highlighting or make the color configurable, 
since not all users of OptionSelector will want to have the default highlight 
color (I do not in my application).

  Adding rtm14 tag and marking as Critical because many applications use
  OptionSelector and this bug makes these applications look bad.

  I just noticed the same thing happens with ItemSelector.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-ui-toolkit/+bug/1371835/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1371846] [NEW] no way to disable PageHeadState actions highlighting

2014-09-19 Thread Jamie Strandboge
Public bug reported:

On applications with a dark theme (eg, Authenticator, Blabble, Utudu)
the highlight color of the PageHeadState actions is very noticeable.
This is easily seen by simply pressing one of the actions. When using a
light theme, the effect is much more subtle. It would be nice to be able
to disable the highlight or to set the highlight to a custom color.

Setting as rtm14 with High priority since as an application writer it is
very frustrating not being able to adjust this when using dark colors
for the theme.

On a possibly related note-- perhaps this is all configurable via Theme,
but I've tried several times to figure out to do it. There appears to be
no documentation on it (and I've mentioned this at least 3 times to
people that we need it).

** Affects: ubuntu-ui-toolkit (Ubuntu)
 Importance: High
 Status: New


** Tags: rtm14

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ubuntu-ui-toolkit in
Ubuntu.
https://bugs.launchpad.net/bugs/1371846

Title:
  no way to disable PageHeadState actions highlighting

Status in “ubuntu-ui-toolkit” package in Ubuntu:
  New

Bug description:
  On applications with a dark theme (eg, Authenticator, Blabble, Utudu)
  the highlight color of the PageHeadState actions is very noticeable.
  This is easily seen by simply pressing one of the actions. When using
  a light theme, the effect is much more subtle. It would be nice to be
  able to disable the highlight or to set the highlight to a custom
  color.

  Setting as rtm14 with High priority since as an application writer it
  is very frustrating not being able to adjust this when using dark
  colors for the theme.

  On a possibly related note-- perhaps this is all configurable via
  Theme, but I've tried several times to figure out to do it. There
  appears to be no documentation on it (and I've mentioned this at least
  3 times to people that we need it).

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-ui-toolkit/+bug/1371846/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1372011] [NEW] ListItem.Subtitled subText color is too dark with SuruDark

2014-09-20 Thread Jamie Strandboge
Public bug reported:

It is hard to read ListItem.Subtitled subText when using the SuruDark
theme (or other dark themes).

** Affects: permy
 Importance: Undecided
 Status: New

** Affects: ubuntu-ui-toolkit (Ubuntu)
 Importance: Undecided
 Status: Confirmed

** Also affects: permy
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ubuntu-ui-toolkit in
Ubuntu.
https://bugs.launchpad.net/bugs/1372011

Title:
  ListItem.Subtitled subText color is too dark with SuruDark

Status in Permy:
  New
Status in “ubuntu-ui-toolkit” package in Ubuntu:
  Confirmed

Bug description:
  It is hard to read ListItem.Subtitled subText when using the SuruDark
  theme (or other dark themes).

To manage notifications about this bug go to:
https://bugs.launchpad.net/permy/+bug/1372011/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1372502] [NEW] usermetrics stopped working some time ago due to wrong group for files

2014-09-22 Thread Jamie Strandboge
Public bug reported:

$ ls -ld /var/lib/usermetrics/ ; sudo ls -l /var/lib/usermetrics/
drwxr-x--- 2 messagebus usermetrics 4096 Aug 21 11:05 /var/lib/usermetrics/
total 28
-rw-r--r-- 1 messagebus usermetrics 22528 Aug 21 11:05 usermetrics6.db

This may be related to bug #1363129, where rsyslog stopped working
because /var/log/syslog was owned by 'usermetrics'.

Workaround:
$ sudo chown -R usermetrics /var/lib/usermetrics/

** Affects: libusermetrics (Ubuntu)
 Importance: Undecided
 Status: New

** Description changed:

  $ ls -ld /var/lib/usermetrics/ ; sudo ls -l /var/lib/usermetrics/
  drwxr-x--- 2 messagebus usermetrics 4096 Aug 21 11:05 /var/lib/usermetrics/
  total 28
  -rw-r--r-- 1 messagebus usermetrics 22528 Aug 21 11:05 usermetrics6.db
  
  This may be related to bug #1363129, where rsyslog stopped working
  because /var/log/syslog was owned by 'usermetrics'.
+ 
+ Workaround:
+ $ sudo chown -R usermetrics /var/lib/usermetrics/

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libusermetrics in Ubuntu.
https://bugs.launchpad.net/bugs/1372502

Title:
  usermetrics stopped working some time ago due to wrong group for files

Status in “libusermetrics” package in Ubuntu:
  New

Bug description:
  $ ls -ld /var/lib/usermetrics/ ; sudo ls -l /var/lib/usermetrics/
  drwxr-x--- 2 messagebus usermetrics 4096 Aug 21 11:05 /var/lib/usermetrics/
  total 28
  -rw-r--r-- 1 messagebus usermetrics 22528 Aug 21 11:05 usermetrics6.db

  This may be related to bug #1363129, where rsyslog stopped working
  because /var/log/syslog was owned by 'usermetrics'.

  Workaround:
  $ sudo chown -R usermetrics /var/lib/usermetrics/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libusermetrics/+bug/1372502/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1359022] Re: Welcome screen on image #200 always states that there are no data sources available

2014-09-22 Thread Jamie Strandboge
See also bug #1372502.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libusermetrics in Ubuntu.
https://bugs.launchpad.net/bugs/1359022

Title:
  Welcome screen on image #200 always states that there are no data
  sources available

Status in Music application for Ubuntu devices:
  New
Status in “libusermetrics” package in Ubuntu:
  New
Status in “unity8” package in Ubuntu:
  Incomplete

Bug description:
  Upon upgrading to image 200 [1]. The welcome screen does not see any
  data sources for User Metrics. Even doing tasks that would normally
  add sources does not do so.

  To reproduce:

  1. Upgrade to image 200. Note that there are no sources found by the No data 
sources available message on the Welcome screen.
  2. Play a few songs on the music app, letting each play for more than 10 
seconds.
  3. Take a few pictures with the camera app.
  4. Note that the Welcome screen still reports No data sources available

  Expected results:

  Steps 3 and 4 would each lead to the Welcome screen showing valid data
  in libusermetrics and Step 1 should have retained the previous
  metrics.

  I've looked at the music app logs and it doesn't look like
  libusermetrics is returning any sort of error and dmesg seems to be
  free of apparmor denials.

  [1] http://people.canonical.com/~ogra/touch-image-stats/200.changes

To manage notifications about this bug go to:
https://bugs.launchpad.net/music-app/+bug/1359022/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1370228] Re: init script returns 0 even after parsing failure

2014-09-22 Thread Jamie Strandboge
** Changed in: apparmor (Ubuntu)
   Status: New = In Progress

** Changed in: apparmor (Ubuntu)
 Assignee: (unassigned) = Jamie Strandboge (jdstrand)

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/1370228

Title:
  init script returns 0 even after parsing failure

Status in “apparmor” package in Ubuntu:
  In Progress

Bug description:
  The apparmor init script (and likely the upstart job, but haven't
  checked) returns exit code 0 even when a profile can't be loaded.

  In /lib/apparmor/functions foreach_configured_profile first loads profiles 
from /etc/apparmor.d and then from /var/lib/apparmor/profiles.
  Parsing errors in the first dir are ignored.

  The attached patch returns the first non-zero return code or zero if
  there are no errors.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1370228/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1372579] Re: All apps need access to the D-Bus clipboard

2014-09-23 Thread Jamie Strandboge
Does this rule look ok:

# Mir clicpboard
dbus (receive, send)
  bus=session
  path=/com/canonical/QtMir/Clipboard
  interface=com.canonical.QtMir.Clipboard,

To test, pick two confined applications: one that should paste into the
clipboard and another to copy out of the clipboard. Then, open the
corresponding apparmor profile in /var/lib/apparmor/profiles/click_...
for the applications, add the above before the file '}', save them and
then run: 'sudo apparmor_parser -r /var/lib/apparmor/profiles/click_...'
for the profiles you edited. Now, try the clipboard operations.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor-easyprof-ubuntu
in Ubuntu.
https://bugs.launchpad.net/bugs/1372579

Title:
  All apps need access to the D-Bus clipboard

Status in “apparmor-easyprof-ubuntu” package in Ubuntu:
  New

Bug description:
  All apps need to have send and receive access to the following:

  Service: com.canonical.QtMir,
  Object: /com/canonical/QtMir/Clipboard,
  Interface: com.canonical.QtMir.Clipboard,

  It will be provided by the /usr/bin/unity8 binary.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor-easyprof-ubuntu/+bug/1372579/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1371835] Re: highlighting selected item displays incorrectly with OptionSelector and ItemSelector

2014-09-23 Thread Jamie Strandboge
This actually does affect pre-install apps-- it just isn't as
noticeable. Eg: open Contacts, create a new contact, go to the bottom to
select an addressbook-- you can see the square corners outside of the
rounded corners. Again, it isn't as easy to see as with a dark theme,
but it gives the wrong impression.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ubuntu-ui-toolkit in
Ubuntu.
https://bugs.launchpad.net/bugs/1371835

Title:
  highlighting selected item displays incorrectly with OptionSelector
  and ItemSelector

Status in “ubuntu-ui-toolkit” package in Ubuntu:
  New

Bug description:
  Steps to reproduce:

  1. open the Ubuntu SDK
  2. Tools/Ubuntu/Showcase Gallery
  3. click Styles on the left
  4. select the SuruDark theme

  Notice after selecting the dark theme that there is a light gray
  rectangle for the selected item. This light gray box expands outside
  the rounded corners of the OptionSelector and looks wrong. If you look
  very carefully at the Ambiance theme, the same thing happens there
  with the selected item-- it is just that the highlight color is much
  closer to the background color.

  I have an application that is affected by this and it makes it look horrible. 
I think two things should be fixed to address this bug:
  1. the highlight color should fill within the rounded corners but not outside)
  2. you should be able to disable highlighting or make the color configurable, 
since not all users of OptionSelector will want to have the default highlight 
color (I do not in my application).

  Adding rtm14 tag and marking as Critical because many applications use
  OptionSelector and this bug makes these applications look bad.

  I just noticed the same thing happens with ItemSelector.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-ui-toolkit/+bug/1371835/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1371310] Re: docker.io doesn't work with apparmor 3.0 RC1 kernel

2014-09-23 Thread Jamie Strandboge
** Tags added: apparmor

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/1371310

Title:
  docker.io doesn't work with apparmor 3.0 RC1 kernel

Status in “apparmor” package in Ubuntu:
  Invalid
Status in “docker.io” package in Ubuntu:
  Invalid
Status in “linux” package in Ubuntu:
  Triaged

Bug description:
  Steps to reproduce (from
  https://wiki.ubuntu.com/Process/Merges/TestPlans/AppArmor):

  1. sudo apt-get install docker.io # 1.2.0~dfsg1-1

  2. sudo docker pull ubuntu:trusty

  3. sudo docker run ubuntu:trusty uptime
  2014/09/18 15:48:48 Error response from daemon: Cannot start container 
fcdfaaf7945bcd9455fb5e0bde9950451152af14556880033818df7b50ddb1f4: set apparmor 
profile docker-default: permission denied

  What is expected? uptime to return something like:
  $ sudo docker run ubuntu:trusty uptime
   20:31:21 up 1 min,  0 users,  load average: 0.09, 0.06, 0.03

  I set 'sudo sysctl -w kernel.printk_ratelimit=0' but there is nothing
  apparmor related in the logs. If I boot an earlier kernel without the
  3.0 RC1 patches, it works.

  FYI, 3.16.0-17.23 is in utopic-proposed now and on its way to utopic,
  which will affect docker.io in Ubuntu. Workaround until this bug is
  fixed is to boot into 3.16.0-16.22 or earlier.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1371310/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1373085] Re: Parser error when using regex profile names in IPC rules

2014-09-23 Thread Jamie Strandboge
** Changed in: apparmor (Ubuntu)
   Status: New = Confirmed

** Changed in: apparmor (Ubuntu)
   Importance: Undecided = High

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/1373085

Title:
  Parser error when using regex profile names in IPC rules

Status in “apparmor” package in Ubuntu:
  Confirmed

Bug description:
  I tried to add this rule to the firefox profile:
  unix (send, receive) type=stream 
peer=(label=/usr/lib/firefox/firefox\{,\*\[^s\]\[^h\]\}//plugincontainer),

  apparmor_parser fails with:
  syntax error, unexpected TOK_CONDID, expecting TOK_EQUALS or TOK_IN

  When I add quotes around the label the parser fails with:
  Found unexpected character: ''

  I found this minimal test case:
  unix peer=(label=\{,\}),
  and
  unix peer=(label=\{,\}),

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1373085/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1350324] [NEW] Incorrect warning with ubuntu-scope-network template: Character - was quoted unnecessarily, dropped preceding quote ('\') character

2014-07-30 Thread Jamie Strandboge
Public bug reported:

$ cat /tmp/profile 
profile foo {
  owner /run/user/[0-9]*/zmq/{[^c]**,c[^\-]**}-r  rw,
}

$ apparmor_parser -QTK /tmp/profile 
Warning from /tmp/profile (/tmp/profile line 4): Character - was quoted 
unnecessarily, dropped preceding quote ('\') character

** Affects: apparmor (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/1350324

Title:
  Incorrect warning with ubuntu-scope-network template: Character - was
  quoted unnecessarily, dropped preceding quote ('\') character

Status in “apparmor” package in Ubuntu:
  New

Bug description:
  $ cat /tmp/profile 
  profile foo {
owner /run/user/[0-9]*/zmq/{[^c]**,c[^\-]**}-r  rw,
  }

  $ apparmor_parser -QTK /tmp/profile 
  Warning from /tmp/profile (/tmp/profile line 4): Character - was quoted 
unnecessarily, dropped preceding quote ('\') character

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1350324/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1186662] Re: isc-dhcp-server fails to renew lease file

2014-07-30 Thread Jamie Strandboge
As Michael said, this needs a code change to dchpd to open the files
correctly.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to isc-dhcp in Ubuntu.
https://bugs.launchpad.net/bugs/1186662

Title:
  isc-dhcp-server fails to renew lease file

Status in “isc-dhcp” package in Ubuntu:
  Triaged

Bug description:
  After raring upgrade, the dhcp server fails to renew lease file when
  it tries to (about every hour).

  The syslog says:
  dhcpd: Can't create new lease file: Permission denied

  It looks like a permission problem, because

  # chown -R dhcpd:dhcpd /var/lib/dhcp

  the above command temporarily solves the issue, until dhcpd is
  restarted: at that time, the ownership of the directory and the lease
  file is set back to root:root.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/isc-dhcp/+bug/1186662/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1350152] Re: [mako #158] apparmor denies access to /etc/ssl/openssl.cnf

2014-07-30 Thread Jamie Strandboge
** Changed in: apparmor-easyprof-ubuntu (Ubuntu)
   Status: In Progress = Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor-easyprof-ubuntu
in Ubuntu.
https://bugs.launchpad.net/bugs/1350152

Title:
  [mako #158] apparmor denies access to /etc/ssl/openssl.cnf

Status in Camera App:
  New
Status in Dropping Letters:
  New
Status in Gallery App:
  New
Status in Calculator application for Ubuntu devices:
  New
Status in “apparmor-easyprof-ubuntu” package in Ubuntu:
  Fix Committed

Bug description:
  A number of apps do not start on image #158 on either Mako or Flo.
  They each generate the following output in their respective
  application log:

  Auto configuration failed
  3020522732:error:0200100D:system library:fopen:Permission 
denied:bss_file.c:169:
  fopen('/usr/lib/ssl/openssl.cnf','rb')
  3020522732:error:2006D002:BIO routines:BIO_new_file:system lib:bss_file.c:174:
  3020522732:error:0E078002:configuration file routines:DEF_LOAD:system 
lib:conf_def.c:199:

To manage notifications about this bug go to:
https://bugs.launchpad.net/camera-app/+bug/1350152/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1350152] Re: [mako #158] apparmor denies access to /etc/ssl/openssl.cnf

2014-07-31 Thread Jamie Strandboge
** Changed in: ubuntu-calculator-app
   Status: New = Invalid

** Changed in: gallery-app
   Status: New = Invalid

** Changed in: dropping-letters
   Status: New = Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor-easyprof-ubuntu
in Ubuntu.
https://bugs.launchpad.net/bugs/1350152

Title:
  [mako #158] apparmor denies access to /etc/ssl/openssl.cnf

Status in Camera App:
  Invalid
Status in Dropping Letters:
  Invalid
Status in Gallery App:
  Invalid
Status in Calculator application for Ubuntu devices:
  Invalid
Status in “apparmor-easyprof-ubuntu” package in Ubuntu:
  Fix Released

Bug description:
  A number of apps do not start on image #158 on either Mako or Flo.
  They each generate the following output in their respective
  application log:

  Auto configuration failed
  3020522732:error:0200100D:system library:fopen:Permission 
denied:bss_file.c:169:
  fopen('/usr/lib/ssl/openssl.cnf','rb')
  3020522732:error:2006D002:BIO routines:BIO_new_file:system lib:bss_file.c:174:
  3020522732:error:0E078002:configuration file routines:DEF_LOAD:system 
lib:conf_def.c:199:

To manage notifications about this bug go to:
https://bugs.launchpad.net/camera-app/+bug/1350152/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1350598] Re: apparmor_parser takes a long time

2014-07-31 Thread Jamie Strandboge
** Changed in: apparmor (Ubuntu)
   Status: New = Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/1350598

Title:
  apparmor_parser takes a long time

Status in “apparmor” package in Ubuntu:
  Confirmed

Bug description:
  Just updated my Nexus 7 2013 from #160 to #161. It's been sat at the
  Google logo for 15 minutes now. It looks and feels like it's hung. As
  a user I'd be rebooting it thinking it had crashed by now. I shell in
  and find apparmor_parser  using a lot of cpu for a long time.

  top - 00:14:01 up 15 min,  2 users,  load average: 5.12, 4.85, 3.21
  Tasks: 202 total,   2 running, 200 sleeping,   0 stopped,   0 zombie
  %Cpu(s): 50.5 us,  0.8 sy,  0.0 ni, 48.5 id,  0.2 wa,  0.0 hi,  0.0 si,  0.0 
st
  KiB Mem:   1848024 total,   787400 used,  1060624 free,54216 buffers
  KiB Swap:32764 total,0 used,32764 free.   579228 cached Mem

PID USER  PR  NIVIRTRESSHR S  %CPU %MEM TIME+ COMMAND   

   1970 root  20   04976   3652852 R  99.8  0.2  14:31.04 
apparmor_parser 
  
   2596 phablet   20   05996   1264824 R   1.3  0.1   0:08.79 top   

914 root   0 -207572552396 S   0.7  0.0   0:05.02 
mpdecision  
  
 21 root  20   0   0  0  0 S   0.3  0.0   0:00.92 
kworker/0:1 
  
229 root  20   0   0  0  0 S   0.3  0.0   0:00.10 
jbd2/mmcblk0p30 
  
982 root  20   0   38856   1164868 S   0.3  0.1   0:01.77 adbd  

   2570 phablet   20   0   10540   1456692 S   0.3  0.1   0:02.30 sshd  

  1 root  20   03884   2648   1068 S   0.0  0.1   0:05.98 init  

  2 root  -2   0   0  0  0 S   0.0  0.0   0:00.01 kthreadd  

  3 root  20   0   0  0  0 S   0.0  0.0   0:00.04 
ksoftirqd/0  

  
  ... it eventually finished after 18 minutes.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1350598/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1350598] Re: apparmor_parser takes a long time

2014-07-31 Thread Jamie Strandboge
This is a known issue and most affects users who perform lots of system
updates with certain kernel and/or policy changes and is exacerbated by
a high number of installed packages. We employ caching in various ways
to reduce the time to recompile all policy to only needing to do it for
certain first boot situations. Recently, there was an update that
required recompiling the policy. The next time you boot, the cache will
be used again.

This will not normally affect consumers because neither the kernel nor
the policy will change during the system image update process. There are
plans to make some sort of progress bar when it does happen, and to
improve policy compiles.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/1350598

Title:
  apparmor_parser takes a long time

Status in “apparmor” package in Ubuntu:
  Confirmed

Bug description:
  Just updated my Nexus 7 2013 from #160 to #161. It's been sat at the
  Google logo for 15 minutes now. It looks and feels like it's hung. As
  a user I'd be rebooting it thinking it had crashed by now. I shell in
  and find apparmor_parser  using a lot of cpu for a long time.

  top - 00:14:01 up 15 min,  2 users,  load average: 5.12, 4.85, 3.21
  Tasks: 202 total,   2 running, 200 sleeping,   0 stopped,   0 zombie
  %Cpu(s): 50.5 us,  0.8 sy,  0.0 ni, 48.5 id,  0.2 wa,  0.0 hi,  0.0 si,  0.0 
st
  KiB Mem:   1848024 total,   787400 used,  1060624 free,54216 buffers
  KiB Swap:32764 total,0 used,32764 free.   579228 cached Mem

PID USER  PR  NIVIRTRESSHR S  %CPU %MEM TIME+ COMMAND   

   1970 root  20   04976   3652852 R  99.8  0.2  14:31.04 
apparmor_parser 
  
   2596 phablet   20   05996   1264824 R   1.3  0.1   0:08.79 top   

914 root   0 -207572552396 S   0.7  0.0   0:05.02 
mpdecision  
  
 21 root  20   0   0  0  0 S   0.3  0.0   0:00.92 
kworker/0:1 
  
229 root  20   0   0  0  0 S   0.3  0.0   0:00.10 
jbd2/mmcblk0p30 
  
982 root  20   0   38856   1164868 S   0.3  0.1   0:01.77 adbd  

   2570 phablet   20   0   10540   1456692 S   0.3  0.1   0:02.30 sshd  

  1 root  20   03884   2648   1068 S   0.0  0.1   0:05.98 init  

  2 root  -2   0   0  0  0 S   0.0  0.0   0:00.01 kthreadd  

  3 root  20   0   0  0  0 S   0.0  0.0   0:00.04 
ksoftirqd/0  

  
  ... it eventually finished after 18 minutes.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1350598/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1340345] Re: please use exclusive pipe access for /dev/socket/micshm

2014-07-31 Thread Jamie Strandboge
** Summary changed:

- please use exclusive pipe access for /android/micshm
+ please use exclusive pipe access for /dev/socket/micshm

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to qtubuntu-camera in Ubuntu.
https://bugs.launchpad.net/bugs/1340345

Title:
  please use exclusive pipe access for /dev/socket/micshm

Status in “qtubuntu-camera” package in Ubuntu:
  Triaged

Bug description:
  13:28  jdstrand jhodapp: ok, so, unless there are implementation flaws 
(which are just bugs that we can fix later on), a malicious app with access to 
/android/micshm can't do anything to DoS the service or to record in the 
background, correct?
  13:29  jhodapp jdstrand: correct, because there technically would be a 
reader on the Android side always open, but it won't be doing any reads unless 
triggered by kicking off the recording process
  13:34  jdstrand jhodapp: could a malicious app could in theory interfere 
with an app that is already recording?
  13:35  jhodapp jdstrand: in theory yes...I need to see if I could have the 
active reader/writer pair open the named pipe exclusively
  13:36  jhodapp jdstrand: so that only one writer is allowed
  13:49  jdstrand jhodapp: I think that would be a reasonable security 
improvement. I won't block adding the rule to policy though. pulseaudio itself 
isn't particularly great on this point aiui, and it too will need to be hardened
  13:49  jhodapp jdstrand: indeed...exclusive pipe access would actually be 
an improvement over how AudioFlinger does it...I'm pretty sure it's using an 
unprotected pipe

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/qtubuntu-camera/+bug/1340345/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1348251] Re: please make use of pam_tally2 for Touch login and screenunlock

2014-07-31 Thread Jamie Strandboge
** Changed in: ubuntu-touch-session (Ubuntu)
   Importance: Undecided = Critical

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to lightdm in Ubuntu.
https://bugs.launchpad.net/bugs/1348251

Title:
  please make use of pam_tally2 for Touch login and screenunlock

Status in Light Display Manager:
  Fix Released
Status in “lightdm” package in Ubuntu:
  Fix Released
Status in “ubuntu-touch-session” package in Ubuntu:
  New

Bug description:
  Ubuntu Touch will soon have/now has the ability to set a PIN/password
  for the user. If the password is set, we should provide some
  protection against brute force password guessing since many users will
  choose to use PINs rather than proper passwords. This is required for
  devices for RTM, but not for the traditional Ubuntu desktop.

To manage notifications about this bug go to:
https://bugs.launchpad.net/lightdm/+bug/1348251/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1348365] Re: MTP should not respond to new connection requests if the screen is locked

2014-07-31 Thread Jamie Strandboge
** Changed in: mtp (Ubuntu)
   Importance: High = Critical

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to mtp in Ubuntu.
https://bugs.launchpad.net/bugs/1348365

Title:
  MTP should not respond to new connection requests if the screen is
  locked

Status in “mtp” package in Ubuntu:
  New

Bug description:
  Ubuntu Touch will soon have/now has the ability to set a PIN/password
  for the user. If the password is set and the screen is locked, MTP
  should not respond to new connection requests per Phone Delivery
  requirements. This is needed for RTM.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mtp/+bug/1348365/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1230366] Re: Please provide Ubuntu camera service that integrates with trust-store

2014-07-31 Thread Jamie Strandboge
** Changed in: qtubuntu-camera (Ubuntu)
   Importance: High = Critical

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to qtubuntu-camera in Ubuntu.
https://bugs.launchpad.net/bugs/1230366

Title:
  Please provide Ubuntu camera service that integrates with trust-store

Status in “qtubuntu-camera” package in Ubuntu:
  Triaged

Bug description:
  Currently Ubuntu Touch is using the android camera-service and that is
  the plan for 13.10.

  Going forward in 14.04, the android camera-service will no longer be
  used and camera access is going to move to the Ubuntu side. There was
  discussion of either using HAL directly (direct access to devices) or
  using a camera-service type thing in Ubuntu.

  Using devices directly causes at least a few problems:
   * can't prevent more than one user from accessing the device at a time
   * enumerating camera devices for apparmor policy is extra maintenance for 
porters
   * can't provide a contextual runtime prompt for access (like we (will) do 
with online accounts, location, microphone). This is particularly important for 
application confinement.

  Instead of direct hardware access, an out of process helper (in
  relation to the app) can be used to address all of these problems,
  similar to what pulseaudio does for audio. This service can ensure
  only one user can access the device at a time and since the service
  accesses the the device files on the app's behalf, we don't need to
  enumerate devices in /dev in policy. Furthermore, when an app accesses
  the service (ideally over DBus), the service can contact trust-store,
  the trust-store will prompt the user (Foo wants to access the camera.
  Is this ok? Yes|No), then optionally cache the result and return the
  result to the service. In this manner the user is given a contextual
  prompt at the time of access by the app. By using caching this
  decision can be remembered the next time. If caching is used, there
  should be a method to change the decision in system settings.

  If direct hardware access is needed for performance reasons, it is
  possible to use fd delegation in AppArmor and have the service open
  the device and pass the fd to the app without having to enumerate the
  /dev devices. Please talk to jjohansen if pursuing this option.

  Lastly, bug #1230391 discusses providing a visual cue during
  background recording for audio. We will need to do the same for video
  recording. Feel free to add a task to bug #1230391 if there is work to
  integrate this new service with that visual cuing.

  This should be implemented in time for shippable devices to address
  the application confinement concern.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/qtubuntu-camera/+bug/1230366/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1224756] Re: Pulseaudio should integrate with trust-store

2014-07-31 Thread Jamie Strandboge
** Changed in: pulseaudio (Ubuntu Utopic)
   Importance: High = Critical

** No longer affects: pulseaudio (Ubuntu Saucy)

** No longer affects: pulseaudio (Ubuntu Trusty)

** No longer affects: pulseaudio (Ubuntu Utopic)

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to pulseaudio in Ubuntu.
https://bugs.launchpad.net/bugs/1224756

Title:
  Pulseaudio should integrate with trust-store

Status in “pulseaudio” package in Ubuntu:
  Triaged

Bug description:
  Currently the 'audio' policy group allows access to pulseaudio which
  allows apps to use the microphone and eavesdrop on the user.
  Pulseaudio needs to be modified to use trust-store, like location-
  service does. Integrating with trust-store means that when an app
  tries use the microphone via pulseaudio, pulseaudio will contact
  trust-store, the trust-store will prompt the user (Foo wants to use
  the microphone. Is this ok? Yes|No), optionally cache the result and
  return the result to pulseaudio. In this manner the user is given a
  contextual prompt at the time of access by the app. Using caching this
  decision can be remembered the next time. If caching is used, there
  should be a method to change the decision in settings.

  Targeting to T-Series for now, since the trust-store is not in a
  reusable form yet.

  Original description:
  David and the security team (inspired by an observation from Rick) discussed 
that when recording, pulseaudio should somehow unobtrusively show the user that 
it is recording. The easiest thing to do would be for pulseaudio to alert 
indicator-sound which would then turn its icon red (similar to 
indicator-message turning blue with new messages). Marking 'high' because apps 
with access to pulseaudio can currently eavedrop on users. If the app is 
allowed to do networking (the default for apps), then it can ship that 
information off to a server somewhere.

  Note 1, the alert to indicator-sound must happen via the out of
  process pulseaudio server and not the confined app itself to be
  effective.

  Note 2, we should consider how to enforce this for foreground apps
  only. Application lifecycle should probably handle this for 13.10
  (apps are suspended if not in foreground or if the screensaver is on),
  but we don't want an app on the converged device to record in the
  background when the user isn't paying attention. Example eavesdropping
  attack: start recording only when the screensaver is on (perhaps
  inhibiting the screensaver during recording would be enough).

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pulseaudio/+bug/1224756/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1347177] Re: Unconfined aggregating scope can't call confined child scope to get results

2014-07-31 Thread Jamie Strandboge
** Changed in: savilerow
   Status: Confirmed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor-easyprof-ubuntu
in Ubuntu.
https://bugs.launchpad.net/bugs/1347177

Title:
  Unconfined aggregating scope can't call confined child scope to get
  results

Status in The Savilerow project:
  Fix Released
Status in API for Unity scopes integration:
  Invalid
Status in “apparmor-easyprof-ubuntu” package in Ubuntu:
  Fix Released

Bug description:
  An unconfined scope is getting apparmor denials while getting results
  from a confined child scope.  The denials:

  Jul 22 17:06:40 ubuntu-phablet kernel: [30750.996517] type=1400
  audit(1406063200.136:2410): apparmor=DENIED operation=connect
  profile=com.canonical.scopes.etsy_etsy_1.0.9
  name=/run/user/32011/zmq/unity-scope-shopping-r pid=19097
  comm=com.canonical.s requested_mask=rw denied_mask=rw
  fsuid=32011 ouid=32011

  The child scope has the template: ubuntu-scope-network and can run
  fine on its own

To manage notifications about this bug go to:
https://bugs.launchpad.net/savilerow/+bug/1347177/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1219164] Re: Implement missing functionality to make location-service a trusted helper.

2014-07-31 Thread Jamie Strandboge
Removing old tasks and raising priority to Critical per RTM bug triage
procedures (we must deliver this for RTM). Thomas, can you adjust the
location service task to be Critical? Thanks!

** No longer affects: location-service (Ubuntu Saucy)

** No longer affects: location-service (Ubuntu Trusty)

** No longer affects: location-service (Ubuntu Utopic)

** Changed in: location-service (Ubuntu)
   Importance: High = Critical

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to location-service in
Ubuntu.
https://bugs.launchpad.net/bugs/1219164

Title:
  Implement missing functionality to make location-service a trusted
  helper.

Status in Location Service:
  In Progress
Status in “location-service” package in Ubuntu:
  In Progress

Bug description:
  Address FIXME in code and query the user if an app wants to access the
  location service:

  if (credentials.pid != pid || credentials.uid != uid)
  return Result::granted; // FIXME(tvoss): This should return rejected.

To manage notifications about this bug go to:
https://bugs.launchpad.net/location-service/+bug/1219164/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1230091] Re: [enhancement] Trusted Session surface management (required for appstore app trust model), modal subwindows

2014-07-31 Thread Jamie Strandboge
If there is another bug that should be used for Mir trust session
support and online accounts use of it for rtm, please let me know. For
now, adding rtm14 tag.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor-easyprof-ubuntu
in Ubuntu.
https://bugs.launchpad.net/bugs/1230091

Title:
  [enhancement] Trusted Session surface management (required for
  appstore app trust model), modal subwindows

Status in Content sharing/picking infrastructure and service:
  Triaged
Status in Mir:
  Triaged
Status in Unity Mir:
  Triaged
Status in “apparmor-easyprof-ubuntu” package in Ubuntu:
  Confirmed
Status in “signon” package in Ubuntu:
  Confirmed
Status in “unity-mir” package in Ubuntu:
  Confirmed

Bug description:
  (I'm filing this as a bug in order to be able to point other people to
  it, and to track its progress; if there's a blueprint containing this
  task, please let me know)

  Some components (such as the Online Accounts trusted helper) need to
  be able to pop-up a window (typically, a dialog) on top of the running
  application. Such windows should be modal to the application, that is
  the user should not be able to interact with the application while the
  modal window is displayed on top of them. This also means that in the
  task switcher one shouldn't see two windows, but only the topmost
  modal window (and parts of the application window, in case the modal
  window on top is a non-fullscreen dialog).

  For developers, this API already exists in Qt: see 
https://qt-project.org/doc/qt-5.1/qtgui/qwindow.html#fromWinId
  It needs to be implemented in the QPA plugin, so feel free to add the 
relevant projects to the bug report.

  From jdstrand
  This is a hard requirement for application confinement because of our trust 
model-- permission to access sensitive data by AppStore apps is typically 
granted or denied at the time of access (caching the result for later use as 
appropriate), so users have a context for the access being requested. We do 
this instead of throwing up a permissions prompt at installation. However, for 
it to work, trusted helpers like online accounts and location require this 
functionality from unity-mir. A trust-store is also being implemented so other 
services like calendar and contacts can do the same. Because this feature is 
not implemented, the implementation for online accounts, location and the 
trust-store is blocked and appstore apps are therefore able to access these 
services without the user knowing.

To manage notifications about this bug go to:
https://bugs.launchpad.net/content-hub/+bug/1230091/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1319546] Re: Remove sync-monitor policy rules

2014-07-31 Thread Jamie Strandboge
Are these ready to be removed now?

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor-easyprof-ubuntu
in Ubuntu.
https://bugs.launchpad.net/bugs/1319546

Title:
  Remove sync-monitor policy rules

Status in Address Book App:
  New
Status in Calendar application for Ubuntu devices:
  New
Status in “apparmor-easyprof-ubuntu” package in Ubuntu:
  New

Bug description:
  Sync monitor should not be accessed by the applications, the sync
  operation should be triggered by the push notification.

  We should remove any policy rules related with sync monitor as soon as
  we get sync monitor integrated with push notification system.

To manage notifications about this bug go to:
https://bugs.launchpad.net/address-book-app/+bug/1319546/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1235444] Re: pkg_name calculated incorrectly

2014-07-31 Thread Jamie Strandboge
** Changed in: thumbnailer
   Status: Confirmed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to thumbnailer in Ubuntu.
https://bugs.launchpad.net/bugs/1235444

Title:
  pkg_name calculated incorrectly

Status in Thumbnail generator for all kinds of files:
  Fix Released
Status in “thumbnailer” package in Ubuntu:
  Fix Released
Status in “thumbnailer” source package in Saucy:
  Fix Released

Bug description:
  get_app_pkg_name() parses the value of /proc/self/attr/current to determine 
the value to use for the cache directory, but it has an off by one error as 
seen with this apparmor denial:
  Oct  4 14:47:00 localhost kernel: [ 2456.617111] type=1400 
audit(1380916020.878:369): apparmor=DENIED operation=mkdir parent=3324 
profile=net.launchpad.ubuntu-security.ubuntu-sdk-1310-api-demos_ubuntu-sdk-1310-api-demos_0.6
 
name=/home/jamie/.cache/net.launchpad.ubuntu-security.ubuntu-sdk-1310-api-demo/
 pid=15749 comm=qmlscene requested_mask=c denied_mask=c fsuid=1000 
ouid=1000

  The app's apparmor label is 
net.launchpad.ubuntu-security.ubuntu-sdk-1310-api-demos_ubuntu-sdk-1310-api-demos_0.6
 so it should use:
  /home/jamie/.cache/net.launchpad.ubuntu-security.ubuntu-sdk-1310-api-demos

  however is actually uses:
  /home/jamie/.cache/net.launchpad.ubuntu-security.ubuntu-sdk-1310-api-demo

  This can perhaps be seen more clearly with the attached test program. Steps 
to reproduce:
  $ cat  /tmp/bug.profile EOM
  #include tunables/global
  profile test_me {
    file,
  }
  EOM
  $ sudo apparmor_parser -r /tmp/bug.profile
  $ g++ /tmp/bug.cpp -o /tmp/bug
  $ aa-exec -p test_me -- /tmp/bug
  /proc/self/attr/current=test_me (enforce)
  app_pkg_name=tes
  $

  In addition to the above, get_app_pkg_name() is not careful enough in 
determining the package name. It should throw an error if the value of 
/proc/self/attr/current doesn't match the following regex:
   ^[a-z0-9][a-z0-9+.-]+_[a-zA-Z0-9+.-]+_[0-9][a-zA-Z0-9.+:~-]*$

  (see https://wiki.ubuntu.com/AppStore/Interfaces/ApplicationId for details). 
To consider why, consider the following valid profile names:
/usr/bin/lsb_release
/usr/lib/lightdm/lightdm/lightdm-guest-session-wrapper//chromium_browser
/opt/foo/_bar

To manage notifications about this bug go to:
https://bugs.launchpad.net/thumbnailer/+bug/1235444/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1230391] Re: please provide visual cue during background recording

2014-07-31 Thread Jamie Strandboge
** Changed in: pulseaudio (Ubuntu)
   Importance: Undecided = Medium

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to pulseaudio in Ubuntu.
https://bugs.launchpad.net/bugs/1230391

Title:
  please provide visual cue during background recording

Status in “pulseaudio” package in Ubuntu:
  Confirmed

Bug description:
  After bug #1224756 is fixed, we should provide a visual cue for when
  an app moves to the background and is recording audio. This will allow
  an app like Skype to work normally in the foreground, but if the user
  launches another app into the foreground, the user is able to see that
  he/she is still on the Skype call. In addition to the usability
  benefit, this provides a security benefit because it stops
  eavesdropping because the user will have a visual cue that the
  malicious/misbehaving app is recording audio.

  This needs design.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pulseaudio/+bug/1230391/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1342858] Re: old click packages are not always cleaned out

2014-07-31 Thread Jamie Strandboge
** Attachment added: click_list.phablet
   
https://bugs.launchpad.net/ubuntu/+source/click/+bug/1342858/+attachment/4166749/+files/click_list.phablet

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to click in Ubuntu.
https://bugs.launchpad.net/bugs/1342858

Title:
  old click packages are not always cleaned out

Status in “click” package in Ubuntu:
  New

Bug description:
  /var/lib/apparmor/clicks still has a lot of symlinks pointing to
  security manifests for click packages that are no longer installed. I
  haven't verified this, but I think it might have something to do with
  preinstalled packages and system-image updates. Eg:

  $ ls -1 /var/lib/apparmor/clicks/*json | wc -l
  157

  $ click list | wc -l
  85

  $ sudo click list | wc -l
  19

  None of the symlinks in /var/lib/apparmor/clicks are dangling, so
  while this doesn't actively harm the system AFAICT, the 70+ additional
  and unneeded apparmor profiles means a slower first boot when policy
  regeneration is required.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/click/+bug/1342858/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1342858] Re: old click packages are not always cleaned out

2014-07-31 Thread Jamie Strandboge
Sorry I didn't see this until just now. Attached are the files you
requested.

** Attachment added: _var_lib_apparmor_clicks_json.txt
   
https://bugs.launchpad.net/ubuntu/+source/click/+bug/1342858/+attachment/4166748/+files/_var_lib_apparmor_clicks_json.txt

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to click in Ubuntu.
https://bugs.launchpad.net/bugs/1342858

Title:
  old click packages are not always cleaned out

Status in “click” package in Ubuntu:
  New

Bug description:
  /var/lib/apparmor/clicks still has a lot of symlinks pointing to
  security manifests for click packages that are no longer installed. I
  haven't verified this, but I think it might have something to do with
  preinstalled packages and system-image updates. Eg:

  $ ls -1 /var/lib/apparmor/clicks/*json | wc -l
  157

  $ click list | wc -l
  85

  $ sudo click list | wc -l
  19

  None of the symlinks in /var/lib/apparmor/clicks are dangling, so
  while this doesn't actively harm the system AFAICT, the 70+ additional
  and unneeded apparmor profiles means a slower first boot when policy
  regeneration is required.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/click/+bug/1342858/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1342858] Re: old click packages are not always cleaned out

2014-07-31 Thread Jamie Strandboge
** Attachment added: click_list.root
   
https://bugs.launchpad.net/ubuntu/+source/click/+bug/1342858/+attachment/4166750/+files/click_list.root

** Changed in: click (Ubuntu)
   Status: Incomplete = New

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to click in Ubuntu.
https://bugs.launchpad.net/bugs/1342858

Title:
  old click packages are not always cleaned out

Status in “click” package in Ubuntu:
  New

Bug description:
  /var/lib/apparmor/clicks still has a lot of symlinks pointing to
  security manifests for click packages that are no longer installed. I
  haven't verified this, but I think it might have something to do with
  preinstalled packages and system-image updates. Eg:

  $ ls -1 /var/lib/apparmor/clicks/*json | wc -l
  157

  $ click list | wc -l
  85

  $ sudo click list | wc -l
  19

  None of the symlinks in /var/lib/apparmor/clicks are dangling, so
  while this doesn't actively harm the system AFAICT, the 70+ additional
  and unneeded apparmor profiles means a slower first boot when policy
  regeneration is required.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/click/+bug/1342858/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1350598] Re: apparmor_parser takes a long time

2014-07-31 Thread Jamie Strandboge
Also, bug #1342858 will also aggravate the situation since more policy
is in the device than is required.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/1350598

Title:
  apparmor_parser takes a long time

Status in “apparmor” package in Ubuntu:
  Confirmed

Bug description:
  Just updated my Nexus 7 2013 from #160 to #161. It's been sat at the
  Google logo for 15 minutes now. It looks and feels like it's hung. As
  a user I'd be rebooting it thinking it had crashed by now. I shell in
  and find apparmor_parser  using a lot of cpu for a long time.

  top - 00:14:01 up 15 min,  2 users,  load average: 5.12, 4.85, 3.21
  Tasks: 202 total,   2 running, 200 sleeping,   0 stopped,   0 zombie
  %Cpu(s): 50.5 us,  0.8 sy,  0.0 ni, 48.5 id,  0.2 wa,  0.0 hi,  0.0 si,  0.0 
st
  KiB Mem:   1848024 total,   787400 used,  1060624 free,54216 buffers
  KiB Swap:32764 total,0 used,32764 free.   579228 cached Mem

PID USER  PR  NIVIRTRESSHR S  %CPU %MEM TIME+ COMMAND   

   1970 root  20   04976   3652852 R  99.8  0.2  14:31.04 
apparmor_parser 
  
   2596 phablet   20   05996   1264824 R   1.3  0.1   0:08.79 top   

914 root   0 -207572552396 S   0.7  0.0   0:05.02 
mpdecision  
  
 21 root  20   0   0  0  0 S   0.3  0.0   0:00.92 
kworker/0:1 
  
229 root  20   0   0  0  0 S   0.3  0.0   0:00.10 
jbd2/mmcblk0p30 
  
982 root  20   0   38856   1164868 S   0.3  0.1   0:01.77 adbd  

   2570 phablet   20   0   10540   1456692 S   0.3  0.1   0:02.30 sshd  

  1 root  20   03884   2648   1068 S   0.0  0.1   0:05.98 init  

  2 root  -2   0   0  0  0 S   0.0  0.0   0:00.01 kthreadd  

  3 root  20   0   0  0  0 S   0.0  0.0   0:00.04 
ksoftirqd/0  

  
  ... it eventually finished after 18 minutes.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1350598/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1340345] Re: please use exclusive pipe access for /dev/socket/micshm

2014-07-31 Thread Jamie Strandboge
Regarding the file permissions: since apps run in the user's session
under the user's UID, apps would have this access. Apps with the camera
policy group (a common policy group available to apps without
restriction) would then be able to access the socket. I'm not sure what
you mean by 'as a user by the same name'. Apps can fork and change their
exec line to fake being another app's executable. Can you elaborate?

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to qtubuntu-camera in Ubuntu.
https://bugs.launchpad.net/bugs/1340345

Title:
  please use exclusive pipe access for /dev/socket/micshm

Status in “qtubuntu-camera” package in Ubuntu:
  Triaged

Bug description:
  13:28  jdstrand jhodapp: ok, so, unless there are implementation flaws 
(which are just bugs that we can fix later on), a malicious app with access to 
/android/micshm can't do anything to DoS the service or to record in the 
background, correct?
  13:29  jhodapp jdstrand: correct, because there technically would be a 
reader on the Android side always open, but it won't be doing any reads unless 
triggered by kicking off the recording process
  13:34  jdstrand jhodapp: could a malicious app could in theory interfere 
with an app that is already recording?
  13:35  jhodapp jdstrand: in theory yes...I need to see if I could have the 
active reader/writer pair open the named pipe exclusively
  13:36  jhodapp jdstrand: so that only one writer is allowed
  13:49  jdstrand jhodapp: I think that would be a reasonable security 
improvement. I won't block adding the rule to policy though. pulseaudio itself 
isn't particularly great on this point aiui, and it too will need to be hardened
  13:49  jhodapp jdstrand: indeed...exclusive pipe access would actually be 
an improvement over how AudioFlinger does it...I'm pretty sure it's using an 
unprotected pipe

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/qtubuntu-camera/+bug/1340345/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1350673] Re: System policy cache may become stale after a system image update

2014-07-31 Thread Jamie Strandboge
That said, if the hash operation was very fast, that would be a useful
improvement going forward (I don't think we could do that for rtm). I do
worry that if we compute hashes for all policy on every boot to see if
we need to recompile, that is going to be more costly for the average
user. What we really need to do is fix parser performance (bug #1350598.
I realize we had a lot of improvements, but we are up to ~4 seconds per
click profile on Touch, and users can easily have 100 or more profiles).

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/1350673

Title:
  System policy cache may become stale after a system image update

Status in “apparmor” package in Ubuntu:
  Triaged

Bug description:
  The system policy cache, in /etc/apparmor.d/cache, may become stale if
  a certain sequence of events occur at the correct time.

  1. Ubuntu developer modifies a profile and uploads a new apparmor package
  2. New apparmor package, with an updated profile, is used to build a new 
system image
  3. System policy cache on user's system gets regenerated
  4. User applies image update

  After 4), the timestamps on the files in the user's system policy
  cache will be newer than the timestamps on system profiles. The parser
  will not be able to detect that it ought to regenerate the policy
  cache so it will load the cached, but stale, binary policies.

  This can result in unexpected AppArmor denials if, for example, the
  apparmor package update loosens the confinement. On the flip side, it
  can result in a looser than expected confinement if the update further
  restricts confinement.

  The fix is to update the apparmor.conf upstart job to call
  clear_cache() if the apparmor package has been updated since the last
  time the job was invoked.

  Additionally, we may want to update the parser itself to manually set
  the mtime of a generate binary cache file to the earliest mtime seen
  while compiling the profile (this includes the mtime of the profile
  itself as well as any #include's).

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1350673/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 881137] Re: UFW does not clean iptables setting from /etc/ufw/before.rules

2014-07-31 Thread Jamie Strandboge
@erniecom: as of 0.34 ufw does have route rules now and it also supports
customization scripts via /etc/ufw/before.init and /etc/ufw/after..init.
See 'man ufw-framework' for details.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ufw in Ubuntu.
https://bugs.launchpad.net/bugs/881137

Title:
  UFW does not clean iptables setting from /etc/ufw/before.rules

Status in “ufw” package in Ubuntu:
  Won't Fix

Bug description:
  Adding some additional settings to /etc/ufw/before.rules is not
  deleted when ufw is stopped.

  I added these lines at top of file /etc/ufw/before.rules

  *nat
  :POSTROUTING ACCEPT [0:0]
  -A POSTROUTING -o eth0 -j MASQUERADE
  COMMIT

  Then I reloaded ufw firewall with command: ufw reload. Output from
  iptables-save

  $ iptables-save -t nat
  *nat
  :PREROUTING ACCEPT [4:478]
  :INPUT ACCEPT [4:478]
  :OUTPUT ACCEPT [0:0]
  :POSTROUTING ACCEPT [0:0]
  -A POSTROUTING -o eth0 -j MASQUERADE 
  COMMIT

  Then I reloaded ufw firewall again:

  $ iptables-save -t nat
  *nat
  :PREROUTING ACCEPT [4:478]
  :INPUT ACCEPT [4:478]
  :OUTPUT ACCEPT [0:0]
  :POSTROUTING ACCEPT [0:0]
  -A POSTROUTING -o eth0 -j MASQUERADE 
  -A POSTROUTING -o eth0 -j MASQUERADE 
  COMMIT

  And ufw reload again

  $ iptables-save -t nat
  *nat
  :PREROUTING ACCEPT [4:478]
  :INPUT ACCEPT [4:478]
  :OUTPUT ACCEPT [0:0]
  :POSTROUTING ACCEPT [0:0]
  -A POSTROUTING -o eth0 -j MASQUERADE 
  -A POSTROUTING -o eth0 -j MASQUERADE 
  -A POSTROUTING -o eth0 -j MASQUERADE
  COMMIT

  And again and postrouting is never deleted when ufw is stopped and
  added again when stared. Same happen if I stop ufw firewall with: $
  stop ufw. nat lines are not cleaned.

  UFW should remove all iptables settings specified in config files
  after ufw is stopped! This can be dangerous if apt-get is updating
  some ufw files and scripts needs to reload ufw (some lines will be
  more times).

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ufw/+bug/881137/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1353139] Re: [manta] video playback currently broken (denied by apparmor)

2014-08-06 Thread Jamie Strandboge
** Package changed: apparmor-easyprof-ubuntu (Ubuntu) = media-hub
(Ubuntu)

** Also affects: mediascanner2 (Ubuntu)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor-easyprof-ubuntu
in Ubuntu.
https://bugs.launchpad.net/bugs/1353139

Title:
  [manta] video playback currently broken (denied by apparmor)

Status in “media-hub” package in Ubuntu:
  New
Status in “mediascanner2” package in Ubuntu:
  New

Bug description:
  current build number: 173
  device name: manta
  channel: ubuntu-touch/utopic-proposed
  last update: 2014-08-05 21:10:15
  version version: 173
  version ubuntu: 20140805.2
  version device: 20140805.2

  When trying to scan/play:
  root@ubuntu-phablet:~# grep DENIED /var/log/syslog
  Aug  5 21:21:32 ubuntu-phablet kernel: [   67.561632] type=1400 
audit(1407273692.712:87): apparmor=DENIED operation=file_mmap 
profile=/usr/bin/media-hub-server name=/tmp/orcexec.IdUnsY pid=3673 
comm=aqueue:src requested_mask=m denied_mask=m fsuid=32011 ouid=32011
  Aug  5 21:21:32 ubuntu-phablet kernel: [   67.561956] type=1400 
audit(1407273692.712:88): apparmor=DENIED operation=mknod 
profile=/usr/bin/media-hub-server name=/run/user/32011/orcexec.UVatQM 
pid=3673 comm=aqueue:src requested_mask=c denied_mask=c fsuid=32011 
ouid=32011
  Aug  5 21:21:32 ubuntu-phablet kernel: [   67.562246] type=1400 
audit(1407273692.712:89): apparmor=DENIED operation=mknod 
profile=/usr/bin/media-hub-server name=/home/phablet/orcexec.CiEwdB 
pid=3673 comm=aqueue:src requested_mask=c denied_mask=c fsuid=32011 
ouid=32011
  Aug  5 21:36:48 ubuntu-phablet kernel: [  162.522469] type=1400 
audit(1407274608.938:87): apparmor=DENIED operation=open 
profile=com.ubuntu.gallery_gallery_2.9.1.1025 name=/dev/video6 pid=3688 
comm=CodecLooper requested_mask=w denied_mask=w fsuid=32011 ouid=0
  Aug  5 21:37:58 ubuntu-phablet kernel: [   15.506075] type=1400 
audit(1407274678.859:87): apparmor=DENIED operation=open 
profile=/usr/bin/mediascanner-service-2.0 
name=/sys/devices/platform/s5p-mfc/video4linux/video6/name pid=1739 
comm=CodecLooper requested_mask=r denied_mask=r fsuid=32011 ouid=0
  Aug  5 21:37:58 ubuntu-phablet kernel: [   15.506184] type=1400 
audit(1407274678.859:88): apparmor=DENIED operation=open 
profile=/usr/bin/mediascanner-service-2.0 
name=/sys/devices/platform/s5p-mfc/video4linux/video7/name pid=1739 
comm=CodecLooper requested_mask=r denied_mask=r fsuid=32011 ouid=0
  Aug  5 21:37:58 ubuntu-phablet kernel: [   15.506312] type=1400 
audit(1407274678.859:89): apparmor=DENIED operation=open 
profile=/usr/bin/mediascanner-service-2.0 
name=/sys/devices/virtual/video4linux/video11/name pid=1739 
comm=CodecLooper requested_mask=r denied_mask=r fsuid=32011 ouid=0
  Aug  5 21:37:58 ubuntu-phablet kernel: [   15.506401] type=1400 
audit(1407274678.859:90): apparmor=DENIED operation=open 
profile=/usr/bin/mediascanner-service-2.0 
name=/sys/devices/virtual/video4linux/video12/name pid=1739 
comm=CodecLooper requested_mask=r denied_mask=r fsuid=32011 ouid=0
  Aug  5 21:37:58 ubuntu-phablet kernel: [   15.506508] type=1400 
audit(1407274678.859:91): apparmor=DENIED operation=open 
profile=/usr/bin/mediascanner-service-2.0 
name=/sys/devices/platform/exynos-mdev.0/video4linux/video16/name pid=1739 
comm=CodecLooper requested_mask=r denied_mask=r fsuid=32011 ouid=0
  Aug  5 21:37:58 ubuntu-phablet kernel: [   15.506674] type=1400 
audit(1407274678.859:92): apparmor=DENIED operation=open 
profile=/usr/bin/mediascanner-service-2.0 
name=/sys/devices/platform/exynos-mdev.0/video4linux/video17/name pid=1739 
comm=CodecLooper requested_mask=r denied_mask=r fsuid=32011 ouid=0
  Aug  5 21:43:09 ubuntu-phablet kernel: [  294.183344] type=1400 
audit(1407274989.967:111): apparmor=DENIED operation=open 
profile=/usr/bin/media-hub-server 
name=/sys/devices/platform/s5p-mfc/video4linux/video6/name pid=3535 
comm=CodecLooper requested_mask=r denied_mask=r fsuid=32011 ouid=0
  Aug  5 21:43:09 ubuntu-phablet kernel: [  294.186568] type=1400 
audit(1407274989.972:112): apparmor=DENIED operation=open 
profile=/usr/bin/media-hub-server 
name=/sys/devices/platform/s5p-mfc/video4linux/video7/name pid=3535 
comm=CodecLooper requested_mask=r denied_mask=r fsuid=32011 ouid=0
  Aug  5 21:43:09 ubuntu-phablet kernel: [  294.187156] type=1400 
audit(1407274989.972:113): apparmor=DENIED operation=open 
profile=/usr/bin/media-hub-server 
name=/sys/devices/virtual/video4linux/video11/name pid=3535 
comm=CodecLooper requested_mask=r denied_mask=r fsuid=32011 ouid=0
  Aug  5 21:43:09 ubuntu-phablet kernel: [  294.187560] type=1400 
audit(1407274989.972:114): apparmor=DENIED operation=open 
profile=/usr/bin/media-hub-server 
name=/sys/devices/virtual/video4linux/video12/name pid=3535 
comm=CodecLooper requested_mask=r denied_mask=r fsuid=32011 ouid=0
  Aug  5 21:43:09 ubuntu-phablet kernel: [  294.188111] type=1400 

[Touch-packages] [Bug 1353139] Re: [manta] video playback currently broken (denied by apparmor)

2014-08-06 Thread Jamie Strandboge
mediascanner2 needs to add this to its apparmor policy:
  /sys/devices/**/video4linux/video** r,

media-hub needs to add this to its policy:
  /sys/devices/**/video4linux/video** r,

The media-hub orcexec issue is already fixed, but you may not have the policy 
update loaded due to bug #1350673. This will be fixed in the next apparmor 
upload (scheduled for next week). To workaround the orcexec issue, please do:
$ sudo rm -f /etc/apparmor.d/cache/*
$ sudo reboot

** Changed in: media-hub (Ubuntu)
   Status: New = Triaged

** Changed in: mediascanner2 (Ubuntu)
   Status: New = Triaged

** Changed in: media-hub (Ubuntu)
   Importance: Undecided = Critical

** Changed in: mediascanner2 (Ubuntu)
   Importance: Undecided = Critical

** Tags added: rtm14

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to mediascanner2 in Ubuntu.
https://bugs.launchpad.net/bugs/1353139

Title:
  [manta] video playback currently broken (denied by apparmor)

Status in “media-hub” package in Ubuntu:
  Triaged
Status in “mediascanner2” package in Ubuntu:
  Triaged

Bug description:
  current build number: 173
  device name: manta
  channel: ubuntu-touch/utopic-proposed
  last update: 2014-08-05 21:10:15
  version version: 173
  version ubuntu: 20140805.2
  version device: 20140805.2

  When trying to scan/play:
  root@ubuntu-phablet:~# grep DENIED /var/log/syslog
  Aug  5 21:21:32 ubuntu-phablet kernel: [   67.561632] type=1400 
audit(1407273692.712:87): apparmor=DENIED operation=file_mmap 
profile=/usr/bin/media-hub-server name=/tmp/orcexec.IdUnsY pid=3673 
comm=aqueue:src requested_mask=m denied_mask=m fsuid=32011 ouid=32011
  Aug  5 21:21:32 ubuntu-phablet kernel: [   67.561956] type=1400 
audit(1407273692.712:88): apparmor=DENIED operation=mknod 
profile=/usr/bin/media-hub-server name=/run/user/32011/orcexec.UVatQM 
pid=3673 comm=aqueue:src requested_mask=c denied_mask=c fsuid=32011 
ouid=32011
  Aug  5 21:21:32 ubuntu-phablet kernel: [   67.562246] type=1400 
audit(1407273692.712:89): apparmor=DENIED operation=mknod 
profile=/usr/bin/media-hub-server name=/home/phablet/orcexec.CiEwdB 
pid=3673 comm=aqueue:src requested_mask=c denied_mask=c fsuid=32011 
ouid=32011
  Aug  5 21:36:48 ubuntu-phablet kernel: [  162.522469] type=1400 
audit(1407274608.938:87): apparmor=DENIED operation=open 
profile=com.ubuntu.gallery_gallery_2.9.1.1025 name=/dev/video6 pid=3688 
comm=CodecLooper requested_mask=w denied_mask=w fsuid=32011 ouid=0
  Aug  5 21:37:58 ubuntu-phablet kernel: [   15.506075] type=1400 
audit(1407274678.859:87): apparmor=DENIED operation=open 
profile=/usr/bin/mediascanner-service-2.0 
name=/sys/devices/platform/s5p-mfc/video4linux/video6/name pid=1739 
comm=CodecLooper requested_mask=r denied_mask=r fsuid=32011 ouid=0
  Aug  5 21:37:58 ubuntu-phablet kernel: [   15.506184] type=1400 
audit(1407274678.859:88): apparmor=DENIED operation=open 
profile=/usr/bin/mediascanner-service-2.0 
name=/sys/devices/platform/s5p-mfc/video4linux/video7/name pid=1739 
comm=CodecLooper requested_mask=r denied_mask=r fsuid=32011 ouid=0
  Aug  5 21:37:58 ubuntu-phablet kernel: [   15.506312] type=1400 
audit(1407274678.859:89): apparmor=DENIED operation=open 
profile=/usr/bin/mediascanner-service-2.0 
name=/sys/devices/virtual/video4linux/video11/name pid=1739 
comm=CodecLooper requested_mask=r denied_mask=r fsuid=32011 ouid=0
  Aug  5 21:37:58 ubuntu-phablet kernel: [   15.506401] type=1400 
audit(1407274678.859:90): apparmor=DENIED operation=open 
profile=/usr/bin/mediascanner-service-2.0 
name=/sys/devices/virtual/video4linux/video12/name pid=1739 
comm=CodecLooper requested_mask=r denied_mask=r fsuid=32011 ouid=0
  Aug  5 21:37:58 ubuntu-phablet kernel: [   15.506508] type=1400 
audit(1407274678.859:91): apparmor=DENIED operation=open 
profile=/usr/bin/mediascanner-service-2.0 
name=/sys/devices/platform/exynos-mdev.0/video4linux/video16/name pid=1739 
comm=CodecLooper requested_mask=r denied_mask=r fsuid=32011 ouid=0
  Aug  5 21:37:58 ubuntu-phablet kernel: [   15.506674] type=1400 
audit(1407274678.859:92): apparmor=DENIED operation=open 
profile=/usr/bin/mediascanner-service-2.0 
name=/sys/devices/platform/exynos-mdev.0/video4linux/video17/name pid=1739 
comm=CodecLooper requested_mask=r denied_mask=r fsuid=32011 ouid=0
  Aug  5 21:43:09 ubuntu-phablet kernel: [  294.183344] type=1400 
audit(1407274989.967:111): apparmor=DENIED operation=open 
profile=/usr/bin/media-hub-server 
name=/sys/devices/platform/s5p-mfc/video4linux/video6/name pid=3535 
comm=CodecLooper requested_mask=r denied_mask=r fsuid=32011 ouid=0
  Aug  5 21:43:09 ubuntu-phablet kernel: [  294.186568] type=1400 
audit(1407274989.972:112): apparmor=DENIED operation=open 
profile=/usr/bin/media-hub-server 
name=/sys/devices/platform/s5p-mfc/video4linux/video7/name pid=3535 
comm=CodecLooper requested_mask=r denied_mask=r fsuid=32011 ouid=0
  Aug  5 21:43:09 ubuntu-phablet kernel: [  294.187156] 

[Touch-packages] [Bug 1350673] Re: System policy cache may become stale after a system image update

2014-08-06 Thread Jamie Strandboge
** Changed in: apparmor (Ubuntu)
   Status: Triaged = In Progress

** Changed in: apparmor (Ubuntu)
   Importance: High = Critical

** Tags added: rtm14

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/1350673

Title:
  System policy cache may become stale after a system image update

Status in “apparmor” package in Ubuntu:
  In Progress

Bug description:
  The system policy cache, in /etc/apparmor.d/cache, may become stale if
  a certain sequence of events occur at the correct time.

  1. Ubuntu developer modifies a profile and uploads a new apparmor package
  2. New apparmor package, with an updated profile, is used to build a new 
system image
  3. System policy cache on user's system gets regenerated
  4. User applies image update

  After 4), the timestamps on the files in the user's system policy
  cache will be newer than the timestamps on system profiles. The parser
  will not be able to detect that it ought to regenerate the policy
  cache so it will load the cached, but stale, binary policies.

  This can result in unexpected AppArmor denials if, for example, the
  apparmor package update loosens the confinement. On the flip side, it
  can result in a looser than expected confinement if the update further
  restricts confinement.

  The fix is to update the apparmor.conf upstart job to call
  clear_cache() if the apparmor package has been updated since the last
  time the job was invoked.

  Additionally, we may want to update the parser itself to manually set
  the mtime of a generate binary cache file to the earliest mtime seen
  while compiling the profile (this includes the mtime of the profile
  itself as well as any #include's).

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1350673/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1341548] Re: Online detection does not work with confined apps on Nexus 4

2014-08-06 Thread Jamie Strandboge
Adding apparmor-easyprof-ubuntu task. When indicator-network implements
this, I will update the connectivity policy group accordingly.

** Also affects: apparmor-easyprof-ubuntu (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: apparmor-easyprof-ubuntu (Ubuntu)
   Importance: Undecided = Critical

** Changed in: apparmor-easyprof-ubuntu (Ubuntu)
   Status: New = Confirmed

** Changed in: apparmor-easyprof-ubuntu (Ubuntu)
 Assignee: (unassigned) = Jamie Strandboge (jdstrand)

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor-easyprof-ubuntu
in Ubuntu.
https://bugs.launchpad.net/bugs/1341548

Title:
  Online detection does not work with confined apps on Nexus 4

Status in dekko:
  Incomplete
Status in Network Menu:
  Triaged
Status in “apparmor-easyprof-ubuntu” package in Ubuntu:
  Confirmed

Bug description:
  Dekko is not detecting if Online correctly. If I look at the server
  logs, I don't see anything in the email server logs for dekko to
  connect. If I look in ~/.cache/upstart/application-click-
  com.ubuntu.developer.dpniel.dekko_dekko_0.2.2.log, I don't see
  anything about connecting. If I click the globe in dekko, I see that
  it is in offline mode and selecting one of the others seems to make no
  difference (I see nothing in the server logs and the upstart logs) and
  the setting doesn't stick (ie, it *always* says 'Offline mode').

  I thought this might be bug #1226844, but if I adjust
  /var/lib/apparmor/profiles/*dekko* to remove 'deny' from in front of
  the NetworkManager and ofono rules and run apparmor_parser -r
  /var/lib/apparmor/profiles/*dekko*, there are no denials but it still
  doesn't detect if I am online or not  when on 3G.

  If I get on wifi instead of 3G, dekko can detect if I am online if I
  apply the apparmor changes I mentioned above (though, there are still
  NetworkManager dbus denials).

  For dekko to work as a confined application (ie, shipped in the Ubuntu
  App Store) it is going to need to operate without these NetworkManager
  and ofono DBus APIs, because they are not allowed to app store apps.

  
  Previous description:
  In addidtion to TLS on port 143, it would be nice to support imaps on port 
993.

To manage notifications about this bug go to:
https://bugs.launchpad.net/dekko/+bug/1341548/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1341548] Re: Online detection does not work with confined apps on Nexus 4

2014-08-06 Thread Jamie Strandboge
Actually, I can do this now by simply using this rule:
dbus (receive, send)
  bus=session
  path=/com/ubuntu/connectivity1/NetworkingStatus,

Since the API is simple, we don't need to worry about being more fine-
grained.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor-easyprof-ubuntu
in Ubuntu.
https://bugs.launchpad.net/bugs/1341548

Title:
  Online detection does not work with confined apps on Nexus 4

Status in dekko:
  Incomplete
Status in Network Menu:
  Triaged
Status in “apparmor-easyprof-ubuntu” package in Ubuntu:
  Confirmed

Bug description:
  Dekko is not detecting if Online correctly. If I look at the server
  logs, I don't see anything in the email server logs for dekko to
  connect. If I look in ~/.cache/upstart/application-click-
  com.ubuntu.developer.dpniel.dekko_dekko_0.2.2.log, I don't see
  anything about connecting. If I click the globe in dekko, I see that
  it is in offline mode and selecting one of the others seems to make no
  difference (I see nothing in the server logs and the upstart logs) and
  the setting doesn't stick (ie, it *always* says 'Offline mode').

  I thought this might be bug #1226844, but if I adjust
  /var/lib/apparmor/profiles/*dekko* to remove 'deny' from in front of
  the NetworkManager and ofono rules and run apparmor_parser -r
  /var/lib/apparmor/profiles/*dekko*, there are no denials but it still
  doesn't detect if I am online or not  when on 3G.

  If I get on wifi instead of 3G, dekko can detect if I am online if I
  apply the apparmor changes I mentioned above (though, there are still
  NetworkManager dbus denials).

  For dekko to work as a confined application (ie, shipped in the Ubuntu
  App Store) it is going to need to operate without these NetworkManager
  and ofono DBus APIs, because they are not allowed to app store apps.

  
  Previous description:
  In addidtion to TLS on port 143, it would be nice to support imaps on port 
993.

To manage notifications about this bug go to:
https://bugs.launchpad.net/dekko/+bug/1341548/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1240875] Re: Need to reboot the phone to have it pick up a new language setting

2014-08-06 Thread Jamie Strandboge
** Changed in: apparmor-easyprof-ubuntu (Ubuntu)
   Importance: Undecided = Medium

** Changed in: ubuntu-system-settings (Ubuntu)
   Importance: Undecided = Medium

** Changed in: unity8 (Ubuntu)
   Importance: Undecided = Medium

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor-easyprof-ubuntu
in Ubuntu.
https://bugs.launchpad.net/bugs/1240875

Title:
  Need to reboot the phone to have it pick up a new language setting

Status in Ubuntu UI Toolkit:
  New
Status in “apparmor-easyprof-ubuntu” package in Ubuntu:
  Confirmed
Status in “ubuntu-system-settings” package in Ubuntu:
  Confirmed
Status in “unity8” package in Ubuntu:
  Confirmed

Bug description:
  in ubuntu touch, if you select a language via system-settings, the
  settings app itself as well as all other newly started apps pick up
  the translations for their UI. unity itself does stay in english
  though.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-ui-toolkit/+bug/1240875/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1227818] Re: client apps using qtdeclarative5-ubuntu-contacts0.1 accesses the /org/freedesktop/Telepathy DBus API

2014-08-06 Thread Jamie Strandboge
Workaround policy was added to apparmor-easyprof-ubuntu in 13.10 so
marking Fix Released. This policy was not removed in 14.04 like it
should've been when address-book-app was fixed, so marking Won't Fix.
I'll fix 14.10 policy in 1.2.16.

** Changed in: apparmor-easyprof-ubuntu (Ubuntu Saucy)
   Status: Fix Committed = Fix Released

** Changed in: apparmor-easyprof-ubuntu (Ubuntu Trusty)
   Status: Confirmed = Won't Fix

** Changed in: apparmor-easyprof-ubuntu (Ubuntu)
   Status: Confirmed = In Progress

** Changed in: apparmor-easyprof-ubuntu (Ubuntu)
 Assignee: (unassigned) = Jamie Strandboge (jdstrand)

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor-easyprof-ubuntu
in Ubuntu.
https://bugs.launchpad.net/bugs/1227818

Title:
  client apps using qtdeclarative5-ubuntu-contacts0.1 accesses the
  /org/freedesktop/Telepathy DBus API

Status in “address-book-app” package in Ubuntu:
  Fix Released
Status in “apparmor-easyprof-ubuntu” package in Ubuntu:
  In Progress
Status in “address-book-app” source package in Saucy:
  Won't Fix
Status in “apparmor-easyprof-ubuntu” source package in Saucy:
  Fix Released
Status in “address-book-app” source package in Trusty:
  Fix Released
Status in “apparmor-easyprof-ubuntu” source package in Trusty:
  Won't Fix

Bug description:
  Using this:

  import Ubuntu.Contacts 0.1
  ...
  Tab {
  title: i18n.tr(Contacts)

  page: Page {
  ContactListView {
  anchors.fill: parent
  onContactClicked: console.debug(Contact ID: + contact.contactId)
  }
  }

  In addition to using com.canonical.pim, it also accesses:
  org.freedesktop.Telepathy.AccountManager
  org.freedesktop.Telepathy.ChannelDispatcher

  I saw this when profiling applications for apparmor policy groups. Here are 
the apparmor rules I needed to list the contacts on my desktop system:
  dbus (receive, send)
   bus=session
   path=/org/freedesktop/Telepathy/AccountManager
   peer=(name=org.freedesktop.Telepathy.AccountManager),
  dbus (receive, send)
   bus=session
   path=/org/freedesktop/Telepathy/ChannelDispatcher
   peer=(name=org.freedesktop.Telepathy.ChannelDispatcher),
  dbus (receive, send)
   bus=session
   path=/org/freedesktop/Telepathy/Account/**
   member=Get{,All}
   peer=(name=org.freedesktop.Telepathy.AccountManager),

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/address-book-app/+bug/1227818/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1319546] Re: Remove sync-monitor policy rules

2014-08-06 Thread Jamie Strandboge
Marking apparmor-easyprof-ubuntu task as 'Low' since the contacts policy
group is still reserved.

** Changed in: apparmor-easyprof-ubuntu (Ubuntu)
   Importance: Undecided = Low

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor-easyprof-ubuntu
in Ubuntu.
https://bugs.launchpad.net/bugs/1319546

Title:
  Remove sync-monitor policy rules

Status in Address Book App:
  New
Status in Calendar application for Ubuntu devices:
  New
Status in “apparmor-easyprof-ubuntu” package in Ubuntu:
  New

Bug description:
  Sync monitor should not be accessed by the applications, the sync
  operation should be triggered by the push notification.

  We should remove any policy rules related with sync monitor as soon as
  we get sync monitor integrated with push notification system.

To manage notifications about this bug go to:
https://bugs.launchpad.net/address-book-app/+bug/1319546/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1342129] Re: [webapps] should enable access to dbus org.freedesktop.Application

2014-08-07 Thread Jamie Strandboge
This is going to need a policy update, but it looks like we have
everything needed to do it.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor-easyprof-ubuntu
in Ubuntu.
https://bugs.launchpad.net/bugs/1342129

Title:
  [webapps] should enable access to dbus org.freedesktop.Application

Status in The Savilerow project:
  New
Status in “apparmor-easyprof-ubuntu” package in Ubuntu:
  New

Bug description:
  Webapps recently add the capability to be invoked  open to custom
  urls (not default), but the apparmor profile needs to be updated to
  enable the org.freedesktop.Application dbus if to be accessed/created:

  Jul 15 13:57:14 ubuntu-phablet dbus[2689]: apparmor=DENIED
  operation=dbus_bind  bus=session
  name=org.freedesktop.Application mask=bind pid=28561
  profile=com.ubuntu.developer.webapps.webapp-gmail_webapp-
  gmail_1.0.12

To manage notifications about this bug go to:
https://bugs.launchpad.net/savilerow/+bug/1342129/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1230091] Re: [enhancement] Trusted Session surface management (required for appstore app trust model), modal subwindows

2014-08-08 Thread Jamie Strandboge
What is that bug?

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor-easyprof-ubuntu
in Ubuntu.
https://bugs.launchpad.net/bugs/1230091

Title:
  [enhancement] Trusted Session surface management (required for
  appstore app trust model), modal subwindows

Status in Content sharing/picking infrastructure and service:
  Triaged
Status in Mir:
  Triaged
Status in Unity Mir:
  Triaged
Status in “apparmor-easyprof-ubuntu” package in Ubuntu:
  Confirmed
Status in “signon” package in Ubuntu:
  Confirmed
Status in “unity-mir” package in Ubuntu:
  Confirmed

Bug description:
  (I'm filing this as a bug in order to be able to point other people to
  it, and to track its progress; if there's a blueprint containing this
  task, please let me know)

  Some components (such as the Online Accounts trusted helper) need to
  be able to pop-up a window (typically, a dialog) on top of the running
  application. Such windows should be modal to the application, that is
  the user should not be able to interact with the application while the
  modal window is displayed on top of them. This also means that in the
  task switcher one shouldn't see two windows, but only the topmost
  modal window (and parts of the application window, in case the modal
  window on top is a non-fullscreen dialog).

  For developers, this API already exists in Qt: see 
https://qt-project.org/doc/qt-5.1/qtgui/qwindow.html#fromWinId
  It needs to be implemented in the QPA plugin, so feel free to add the 
relevant projects to the bug report.

  From jdstrand
  This is a hard requirement for application confinement because of our trust 
model-- permission to access sensitive data by AppStore apps is typically 
granted or denied at the time of access (caching the result for later use as 
appropriate), so users have a context for the access being requested. We do 
this instead of throwing up a permissions prompt at installation. However, for 
it to work, trusted helpers like online accounts and location require this 
functionality from unity-mir. A trust-store is also being implemented so other 
services like calendar and contacts can do the same. Because this feature is 
not implemented, the implementation for online accounts, location and the 
trust-store is blocked and appstore apps are therefore able to access these 
services without the user knowing.

To manage notifications about this bug go to:
https://bugs.launchpad.net/content-hub/+bug/1230091/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1351113] Re: password input box after suspend/resume was not focused but looked like it was; keyboard input was being intercepted by another window

2014-08-08 Thread Jamie Strandboge
** Changed in: unity (Ubuntu)
   Status: New = Incomplete

** Changed in: unity
   Status: New = Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unity in Ubuntu.
https://bugs.launchpad.net/bugs/1351113

Title:
  password input box after suspend/resume was not focused but looked
  like it was; keyboard input was being intercepted by another window

Status in Unity:
  Incomplete
Status in “unity” package in Ubuntu:
  Incomplete

Bug description:
  This is a HUGE SECURITY ISSUE.

  I suspended, then I resumed.

  Upon resume, I was presented the usual screen where you have to insert
  the password to unlock the screen.

  The password input box had a blinking cursor, as expected.
  I tried to type the password but it appeared to be not responding to 
keystrokes (from an external usb keyboard), meaning the usual dots would not 
appear at every keystroke.

  I thought the external usb keyboard was not working (due to another
  known bug) so I plugged it to another port, with no luck.

  So I tried to use the builtin keyboard of the laptop, but it wouldn't
  (apparently) respond to keystrokes either.

  So I clicked with the mouse on the language selection indicator in the
  upper right corner of the screen, and selected the (unique and already
  selected) language: spanish. A posteriori I think this was irrelevant.
  What I guess was relevant is that I gave focus to anything other than
  the password input box and then clicked on the password input box
  again.

  So now it worked and I could type my password and unlock the screen.

  AND HERE'S THE TERRIFYING THING: after inserting the password and
  unlocking the screen, Google Chrome was the active window (because it
  had been prior to suspending), and in the active tab there was
  facebook open. In the status-update textarea there were all the keys
  that I had been hitting when trying to input the password.

  Do you realize the enormous security hazard here? If I had typed the
  whole password quickly without looking at the screen and hit Enter
  before realizing the keystrokes were not being intercepted by the
  password input box, I could have posted my password on facebook
  without seeing it. Perhaps even twice. Fortunately, I saw the
  keystrokes were not being registered from the very beginning, and
  reacted by repeating the first few characters several times, and then
  hitting random keys, so I only typed a nonsense sequence of characters
  that doesn't even remotely resemble my password and I never got to hit
  the Enter key anyway.

  
  So, to sum up the issue:
  - after resume, the password input box wasn't focused and it should have been
  - worse: it completely looked like it was focused, with a blinking cursor 
inside, so everything looked like keyboard was not working at all
  - worst of all: keystrokes were actually being intercepted by an active 
application (which was not visible because the screen was locked). NOTHING that 
is behind the locked screen should be able to intercept keystrokes or mouse 
interaction, under any circumstance. If you are not seing something, that 
something must be non-existent to keyboard and mouse interaction.

  
  This is far from systematically reproducible. This is the first time I have 
observed this, ever, and have no idea what triggered this. I suspend and resume 
very often on a daily basis so this must be something pretty rare. Yet it is 
hugely dangerous.
  My very real-life case could have led to posting my password on facebook.
  Imagine if the active window was a terminal and if you happen to have a funny 
password such as sudo rm -f /*

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: unity 7.2.2+14.04.20140714-0ubuntu1
  ProcVersionSignature: Ubuntu 3.13.0-32.57-generic 3.13.11.4
  Uname: Linux 3.13.0-32-generic x86_64
  ApportVersion: 2.14.1-0ubuntu3.2
  Architecture: amd64
  CompizPlugins: No value set for 
`/apps/compiz-1/general/screen0/options/active_plugins'
  CurrentDesktop: Unity
  Date: Fri Aug  1 02:40:29 2014
  InstallationDate: Installed on 2013-10-11 (293 days ago)
  InstallationMedia: Ubuntu 13.04 Raring Ringtail - Release amd64 (20130424)
  SourcePackage: unity
  UpgradeStatus: Upgraded to trusty on 2014-05-24 (68 days ago)

To manage notifications about this bug go to:
https://bugs.launchpad.net/unity/+bug/1351113/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1086058] Re: my unity laucher and environment disappeared when i changed certain permission in dpkg file while installing hadoop.

2014-08-08 Thread Jamie Strandboge
Thanks for your comments. This does not appear to be a bug report and we
are closing it. We appreciate the difficulties you are facing, but it
would make more sense to raise your question in the support tracker.
Please visit https://answers.launchpad.net/ubuntu/+addquestion

** Information type changed from Private Security to Public

** Changed in: unity
   Status: New = Invalid

** Changed in: unity (Ubuntu)
   Status: New = Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unity in Ubuntu.
https://bugs.launchpad.net/bugs/1086058

Title:
  my unity laucher and environment disappeared when i changed certain
  permission in dpkg file while installing hadoop.

Status in Unity:
  Invalid
Status in “unity” package in Ubuntu:
  Invalid

Bug description:
  my settings for flashdrive is not working.
  users and groups are disabled. error: configuration cannot be loaded.

To manage notifications about this bug go to:
https://bugs.launchpad.net/unity/+bug/1086058/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1351180] Re: Python security issue #16039, #16041 and #16042 looks not be fixed on Python 2.7.6 (smtplib/imaplib/poplib of python has a vulnerability due to unlimited readline()

2014-08-08 Thread Jamie Strandboge
This is CVE-2013-1752 which is rated as having a 'Low' priority. It
should be fixed in a future python update.

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-1752

** Changed in: python2.7 (Ubuntu)
   Status: New = Triaged

** Changed in: python2.7 (Ubuntu)
   Importance: Undecided = Low

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to python2.7 in Ubuntu.
https://bugs.launchpad.net/bugs/1351180

Title:
  Python security issue #16039, #16041 and #16042 looks not be fixed on
  Python 2.7.6 (smtplib/imaplib/poplib of python has a vulnerability due
  to unlimited readline() from connection)

Status in “python2.7” package in Ubuntu:
  Triaged

Bug description:
  I found that below Python security issues may not be yet fixed on
  Python 2.7.6 bundled with 14.04LTS. It looks those patches are already
  applied to Python 3.4 on 14.04LTS. It looks those patches are not
  included in upstream souce codes on both 2.7.6 and latest 2.7 version
  (2.7.8).

  http://bugs.python.org/issue16039
  http://bugs.python.org/issue16041
  http://bugs.python.org/issue16042

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/python2.7/+bug/1351180/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1354110] Re: please merge openssl from debian

2014-08-11 Thread Jamie Strandboge
Thanks for the debdiff. What is the justification for the sync? 1.0.1f-
1ubuntu7 in utopic contains all of the security fixes already.
Considering the stabilization effrts for the upcoming phone release, I'd
prefer to not update openssl at this time unless there is very a
compelling reason to do so.

** Changed in: openssl (Ubuntu)
   Status: New = Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1354110

Title:
  please merge openssl from debian

Status in “openssl” package in Ubuntu:
  Incomplete

Bug description:
  debdiff attached

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1354110/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1229066] Re: evince-thumbnailer can't run mktexpk

2014-08-12 Thread Jamie Strandboge
** Package changed: evince (Ubuntu) = apparmor (Ubuntu)

** Changed in: apparmor (Ubuntu)
   Status: Confirmed = Triaged

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/1229066

Title:
  evince-thumbnailer can't run mktexpk

Status in “apparmor” package in Ubuntu:
  Triaged

Bug description:
  On Ubuntu 12.04, when running /usr/bin/evince-thumbnailer on a .dvi
  file that references a font for which there is no PK file on the
  system yet, AppArmor blocks the execution of
  /usr/share/texmf/web2c/mktexnam etc. Here are sample audit log
  messages:

  [ 5720.378549] type=1400 audit(1379921624.784:28): apparmor=DENIED 
operation=exec parent=6181 
profile=/usr/bin/evince-thumbnailer//sanitized_helper 
name=/usr/share/texmf/web2c/mktexnam pid=6204 comm=mktexpk 
requested_mask=x denied_mask=x fsuid=1000 ouid=0
  [ 5720.384833] type=1400 audit(1379921624.788:29): apparmor=DENIED 
operation=exec parent=6181 
profile=/usr/bin/evince-thumbnailer//sanitized_helper 
name=/usr/share/texmf/web2c/mktexupd pid=6209 comm=mktexpk 
requested_mask=x denied_mask=x fsuid=1000 ouid=0

  I suspect this is because the sanitized_helper profile in 
/etc/apparmor.d/abstractions/ubuntu-helpers only covers /bin, /sbin, /usr/bin 
and /usr/sbin, not /usr/share/texmf/web2c . I'm not sure whether this bug 
should be filed against apparmor, evince or texlive-binaries; I can think of at 
least three ways of addressing the issue:
  1) add /usr/share/texmf/web2c/* Pixr to the sanitized_helper profile;
  2) modify the profile for /usr/bin/evince-thumbnailer to use something other 
than sanitized_helper;
  3) provide a separate AppArmor profile for the /usr/bin/mktexpk wrapper (and 
its siblings).

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1229066/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1356302] Re: apparmor DENIED messages in syslog

2014-08-13 Thread Jamie Strandboge
*** This bug is a duplicate of bug 1353591 ***
https://bugs.launchpad.net/bugs/1353591

The mediascanner already has a rule for this. On the emulator with r189 for 
utopic-proposed:
$ grep orcexec /etc/apparmor.d/usr.bin.mediascanner-service-2.0 
  owner /tmp/orcexec* m,
...

Based on the timestamp of the denial (Jan 1 20:35:30), I believe you are
suffering from https://bugs.launchpad.net/ubuntu/+bug/1353591. I am
going to mark this as a duplicate of that. Please adjust if this is in
error.

** This bug has been marked a duplicate of bug 1353591
   Ubuntu Touch devices sometimes come up with hwclock set to 1970

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to mediascanner in Ubuntu.
https://bugs.launchpad.net/bugs/1356302

Title:
  apparmor DENIED messages in syslog

Status in “mediascanner” package in Ubuntu:
  New

Bug description:
  I see messages like this with image 185. The phone is not a Nexus 4.

  Jan  1 20:35:30 ubuntu-phablet kernel: [  880.144484] 
(1)[14171:multiqueue0:src]type=1400 audit(1388608530.011:386): 
  apparmor=DENIED operation=file_mmap 
profile=/usr/bin/mediascanner-service-2.0 name=/tmp/orcexec.omt3ac 
pid=14171 comm=multiqueue0:src requested_mask=m denied_mask=m fsuid=32011 
ouid=32011

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mediascanner/+bug/1356302/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1356457] [NEW] bookmarks not easily found with new design

2014-08-13 Thread Jamie Strandboge
Public bug reported:

I like the new design of the webbrowser-app, but putting bookmarks under
New Tab is non-intuitive. Furthermore, you may want to navigate to a
bookmark from the current tab, but this doesn't seem to be possible.

** Affects: webbrowser-app (Ubuntu)
 Importance: Undecided
 Status: New

** Summary changed:

- can't find bookmarks with new design
+ bookmarks not easily found with new design

** Description changed:

- I like the new design of the webbrowser-app, but I can't seem to find
- where my bookmarks are.
+ I like the new design of the webbrowser-app, but putting bookmarks under
+ New Tab is non-intuitive. Furthermore, you may want to navigate to a
+ bookmark from the current tab, but this doesn't seem to be possible.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to webbrowser-app in Ubuntu.
https://bugs.launchpad.net/bugs/1356457

Title:
  bookmarks not easily found with new design

Status in “webbrowser-app” package in Ubuntu:
  New

Bug description:
  I like the new design of the webbrowser-app, but putting bookmarks
  under New Tab is non-intuitive. Furthermore, you may want to navigate
  to a bookmark from the current tab, but this doesn't seem to be
  possible.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/webbrowser-app/+bug/1356457/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1356516] [NEW] consider shipping apparmor profile for webbrowser-app

2014-08-13 Thread Jamie Strandboge
Public bug reported:

It would be nice if webbrowser-app itself could ship an apparmor
profile. Since we are already confining webapps, we can leverage aa-
easyprof to generate the apparmor profile. Eg, in debian/rules could
have a target :

apparmor:
aa-easyprof --policy-version=1.2 --policy-vendor=ubuntu \
-t ubuntu-webapp \

--policy-groups=accounts,audio,content_exchange,content_exchange_source,location,networking,push-notification-client,video,webview
 \
 --template-var=@{APP_ID_DBUS}=webbrowser_2dapp \
 --template-var=@{APP_PKGNAME_DBUS}=webbrowser_2dapp \
 --template-var=@{APP_PKGNAME}=webbrowser-app \
 --template-var=@{CLICK_DIR}=/usr/share/webbrowser-app \
 --abstraction=user-tmp \
 --read-path=/usr/share/applications/ \
 --read-path=@{HOME}/.local/share/applications/ \
 --profile-name=webbrowser-app \
 --no-verify /usr/bin/webbrowser-app | \
 grep -v CLICK_DIR | \
 sed 's/signal peer=@{APP_PKGNAME}_\*_@{APP_VERSION},/signal 
peer=@{APP_PKGNAME},/g' \
  ./debian/usr.bin.webbrowser-app
 apparmor_parser -QTK ./debian/usr.bin.webbrowser-app

In this manner, you could this to update the apparmor profile:
$ debian/rules apparmor

I use '--no-verify' because we need to very lightly tidy up the profile
with the 'grep -v' and the 'sed', which is why after it is cleaned I run
'apparmor_parser -QTK' on the profile to verify it. This could probably
be done as part of the build too. Once the profile is in place, you can
simply do something along the lines of
http://bazaar.launchpad.net/~jdstrand/ubuntu-system-settings/ubuntu-
system-settings-lp1296415/revision/748.

I have lightly tested this on the phone for the following:
 * http
 * https
 * sharing to messaging app
 * url-dispatcher via messaging-app to open a link (with the browser open and 
closed)
 * maps.google.com (prompted for access)
 * youtube (one denial: apparmor=DENIED operation=dbus_method_call  
bus=system path=/com/canonical/Unity/Screen 
interface=com.canonical.Unity.Screen member=keepDisplayOn mask=send 
name=com.canonical.Unity.Screen pid=12566 profile=webbrowser-app 
peer_pid=1575 peer_profile=unconfined)
 * html5.grooveshark.com
 * grooveshark via music scope

I also even more lightly tested it on the desktop, and it appears to
work ok.

** Affects: webbrowser-app (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to webbrowser-app in Ubuntu.
https://bugs.launchpad.net/bugs/1356516

Title:
  consider shipping apparmor profile for webbrowser-app

Status in “webbrowser-app” package in Ubuntu:
  New

Bug description:
  It would be nice if webbrowser-app itself could ship an apparmor
  profile. Since we are already confining webapps, we can leverage aa-
  easyprof to generate the apparmor profile. Eg, in debian/rules could
  have a target :

  apparmor:
  aa-easyprof --policy-version=1.2 --policy-vendor=ubuntu \
  -t ubuntu-webapp \
  
--policy-groups=accounts,audio,content_exchange,content_exchange_source,location,networking,push-notification-client,video,webview
 \
   --template-var=@{APP_ID_DBUS}=webbrowser_2dapp \
   --template-var=@{APP_PKGNAME_DBUS}=webbrowser_2dapp \
   --template-var=@{APP_PKGNAME}=webbrowser-app \
   --template-var=@{CLICK_DIR}=/usr/share/webbrowser-app \
   --abstraction=user-tmp \
   --read-path=/usr/share/applications/ \
   --read-path=@{HOME}/.local/share/applications/ \
   --profile-name=webbrowser-app \
   --no-verify /usr/bin/webbrowser-app | \
   grep -v CLICK_DIR | \
   sed 's/signal peer=@{APP_PKGNAME}_\*_@{APP_VERSION},/signal 
peer=@{APP_PKGNAME},/g' \
    ./debian/usr.bin.webbrowser-app
   apparmor_parser -QTK ./debian/usr.bin.webbrowser-app

  In this manner, you could this to update the apparmor profile:
  $ debian/rules apparmor

  I use '--no-verify' because we need to very lightly tidy up the
  profile with the 'grep -v' and the 'sed', which is why after it is
  cleaned I run 'apparmor_parser -QTK' on the profile to verify it. This
  could probably be done as part of the build too. Once the profile is
  in place, you can simply do something along the lines of
  http://bazaar.launchpad.net/~jdstrand/ubuntu-system-settings/ubuntu-
  system-settings-lp1296415/revision/748.

  I have lightly tested this on the phone for the following:
   * http
   * https
   * sharing to messaging app
   * url-dispatcher via messaging-app to open a link (with the browser open and 
closed)
   * maps.google.com (prompted for access)
   * youtube (one denial: apparmor=DENIED operation=dbus_method_call  
bus=system path=/com/canonical/Unity/Screen 
interface=com.canonical.Unity.Screen member=keepDisplayOn mask=send 
name=com.canonical.Unity.Screen 

[Touch-packages] [Bug 1356516] Re: consider shipping apparmor profile for webbrowser-app

2014-08-13 Thread Jamie Strandboge
** Description changed:

  It would be nice if webbrowser-app itself could ship an apparmor
  profile. Since we are already confining webapps, we can leverage aa-
  easyprof to generate the apparmor profile. Eg, in debian/rules could
  have a target :
  
  apparmor:
- aa-easyprof --policy-version=1.2 --policy-vendor=ubuntu \
- -t ubuntu-webapp \
- 
--policy-groups=accounts,audio,content_exchange,content_exchange_source,location,networking,push-notification-client,video,webview
 \
-  --template-var=@{APP_ID_DBUS}=webbrowser_2dapp \
-  --template-var=@{APP_PKGNAME_DBUS}=webbrowser_2dapp \
-  --template-var=@{APP_PKGNAME}=webbrowser-app \
-  --template-var=@{CLICK_DIR}=/usr/share/webbrowser-app \
-  --abstraction=user-tmp \
-  --read-path=/usr/share/applications/ \
-  --read-path=@{HOME}/.local/share/applications/ \
-  --profile-name=webbrowser-app \
-  --no-verify /usr/bin/webbrowser-app | \
-  grep -v CLICK_DIR | \
-  sed 's/signal peer=@{APP_PKGNAME}_\*_@{APP_VERSION},/signal 
peer=@{APP_PKGNAME},/g' \
-   ./debian/usr.bin.webbrowser-app
-  apparmor_parser -QTK ./debian/usr.bin.webbrowser-app
+ aa-easyprof --policy-version=1.2 --policy-vendor=ubuntu \
+ -t ubuntu-webapp \
+ 
--policy-groups=accounts,audio,content_exchange,content_exchange_source,location,networking,push-notification-client,video,webview
 \
+  --template-var=@{APP_ID_DBUS}=webbrowser_2dapp \
+  --template-var=@{APP_PKGNAME_DBUS}=webbrowser_2dapp \
+  --template-var=@{APP_PKGNAME}=webbrowser-app \
+  --template-var=@{CLICK_DIR}=/usr/share/webbrowser-app \
+  --abstraction=user-tmp \
+  --read-path=/usr/share/applications/ \
+  --read-path=@{HOME}/.local/share/applications/ \
+  --profile-name=webbrowser-app \
+  --no-verify /usr/bin/webbrowser-app | \
+  grep -v CLICK_DIR | \
+  sed 's/signal peer=@{APP_PKGNAME}_\*_@{APP_VERSION},/signal 
peer=@{APP_PKGNAME},/g' \
+   ./debian/usr.bin.webbrowser-app
+  apparmor_parser -QTK ./debian/usr.bin.webbrowser-app
  
  In this manner, you could this to update the apparmor profile:
  $ debian/rules apparmor
  
  I use '--no-verify' because we need to very lightly tidy up the profile
- with the 'grep -v' and the 'sed'. This could probably be done as part of
- the build too. Once the profile is in place, you can simply do something
- along the lines of http://bazaar.launchpad.net/~jdstrand/ubuntu-system-
- settings/ubuntu-system-settings-lp1296415/revision/748.
+ with the 'grep -v' and the 'sed', which is why after it is cleaned I run
+ 'apparmor_parser -QTK' on the profile to verify it. This could probably
+ be done as part of the build too. Once the profile is in place, you can
+ simply do something along the lines of
+ http://bazaar.launchpad.net/~jdstrand/ubuntu-system-settings/ubuntu-
+ system-settings-lp1296415/revision/748.
  
  I have lightly tested this on the phone for the following:
-  * http
-  * https
-  * sharing to messaging app
-  * url-dispatcher via messaging-app to open a link (with the browser open and 
closed)
-  * maps.google.com (prompted for access)
-  * youtube (one denial: apparmor=DENIED operation=dbus_method_call  
bus=system path=/com/canonical/Unity/Screen 
interface=com.canonical.Unity.Screen member=keepDisplayOn mask=send 
name=com.canonical.Unity.Screen pid=12566 profile=webbrowser-app 
peer_pid=1575 peer_profile=unconfined)
-  * html5.grooveshark.com
-  * grooveshark via music scope
+  * http
+  * https
+  * sharing to messaging app
+  * url-dispatcher via messaging-app to open a link (with the browser open and 
closed)
+  * maps.google.com (prompted for access)
+  * youtube (one denial: apparmor=DENIED operation=dbus_method_call  
bus=system path=/com/canonical/Unity/Screen 
interface=com.canonical.Unity.Screen member=keepDisplayOn mask=send 
name=com.canonical.Unity.Screen pid=12566 profile=webbrowser-app 
peer_pid=1575 peer_profile=unconfined)
+  * html5.grooveshark.com
+  * grooveshark via music scope
  
  I also even more lightly tested it on the desktop, and it appears to
  work ok.

** Description changed:

  It would be nice if webbrowser-app itself could ship an apparmor
  profile. Since we are already confining webapps, we can leverage aa-
  easyprof to generate the apparmor profile. Eg, in debian/rules could
  have a target :
  
  apparmor:
  aa-easyprof --policy-version=1.2 --policy-vendor=ubuntu \
  -t ubuntu-webapp \
  
--policy-groups=accounts,audio,content_exchange,content_exchange_source,location,networking,push-notification-client,video,webview
 \
   --template-var=@{APP_ID_DBUS}=webbrowser_2dapp \
   --template-var=@{APP_PKGNAME_DBUS}=webbrowser_2dapp \
   --template-var=@{APP_PKGNAME}=webbrowser-app \
   

  1   2   3   4   5   6   7   8   9   10   >