[Bug 1840582] Re: aa-genprof crash

2019-09-10 Thread Jamie Strandboge
This was fixed in 2.13.3-5ubuntu1 in Ubunt 19.10 ** Also affects: apparmor (Ubuntu) Importance: Undecided Status: New ** Changed in: apparmor (Ubuntu) Status: New => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed

[Bug 1842651] Re: Regression: after Uprade from udev_237-3ubuntu10.25 to udev_237-3ubuntu10.26 network interfaces don't get renamed by 70-persistent-network.rules

2019-09-09 Thread Jamie Strandboge
@Rex and @Shih-Yuan, I believe Chris is planning to push this through -security in his morning. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1842651 Title: Regression: after Uprade from udev_237-3u

[Bug 1842651] Re: Regression: after Uprade from udev_237-3ubuntu10.25 to udev_237-3ubuntu10.26 network interfaces don't get renamed by 70-persistent-network.rules

2019-09-09 Thread Jamie Strandboge
> Please reject the packages that are currently in the unapproved queue. Done -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1842651 Title: Regression: after Uprade from udev_237-3ubuntu10.25 to u

[Bug 1842651] Re: Regression: after Uprade from udev_237-3ubuntu10.25 to udev_237-3ubuntu10.26 network interfaces don't get renamed by 70-persistent-network.rules

2019-09-09 Thread Jamie Strandboge
FYI, this broke me as well. I have an 18.04 multi-nic system that went through several upgrades and was relying on /etc/udev/rules.d/70 -persistent-net.rules to give me predictable eth* names where each eth* name was used as part of a bridge. The recent change regressed this since non-existent eth*

[Bug 595501] Re: iptables rules for NAT may break ufw setups

2019-09-03 Thread Jamie Strandboge
This should just all happen automatically in ufw based on bug feedback, so marking ufw as "Won't Fix" instead of "Fix Released" since nothing was needed in ufw (could've used Invalid, but that seemed worse than the other two...) ** Changed in: ufw (Ubuntu) Status: Triaged => Won't Fix --

[Bug 1658219] Re: flock not mediated by 'k'

2019-08-26 Thread Jamie Strandboge
After discussing with Field, snapd, kernel and the security team, this will break existing Ubuntu Core devices that use the 4.4 kernel and the network-manager snap in the default channel (per reporter, the 1.10 channel is unaffected). Therefore, the 4.4 kernels snaps that include this change (ie, 4

[Bug 1556419] Re: nf_conntrack: automatic helper assignment is deprecated

2019-08-25 Thread Jamie Strandboge
** Changed in: ufw (Ubuntu) Status: New => Triaged ** Changed in: ufw (Ubuntu) Importance: Undecided => Medium ** Changed in: ufw (Ubuntu) Assignee: (unassigned) => Jamie Strandboge (jdstrand) -- You received this bug notification because you are a member of Ubuntu Bu

[Bug 1833719] Re: UFW 2nd interface incorrectly working

2019-08-25 Thread Jamie Strandboge
Can you perform the following: $ mkdir /tmp/ufw $ sudo ufw show raw > /tmp/ufw/raw $ sudo tar -zcvf /tmp/1833719.tar.gz /tmp/ufw /etc/default/ufw /etc/ufw /lib/ufw then attach to this bug /tmp/1833719.tar.gz? ** Changed in: ufw (Ubuntu) Status: Expired => Incomplete -- You received this

[Bug 1840633] Re: autopkgtests get stuck in Eoan with iptables 1.8.3

2019-08-21 Thread Jamie Strandboge
Indeed, that is exactly what https://git.netfilter.org/iptables/commit/?id=e5cab728c40be88c541f68e4601d39178c36111f did. Are you saying there are other cases where a similar commit is needed? IMO, those should be patched before 1.8.3 goes into eoan. Unless I am missing something, iptables is correc

[Bug 1840633] Re: autopkgtests get stuck in Eoan with iptables 1.8.3

2019-08-21 Thread Jamie Strandboge
It seems like iptables going into a busy loop as non-root is also a bug that should be fixed? At the very least, iptables should bail prior to that condition saying that root is needed. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. h

[Bug 1840633] Re: autopkgtests get stuck in Eoan with iptables 1.8.3

2019-08-20 Thread Jamie Strandboge
Thanks for chasing this down! It seems clear that while the ufw autopkgtest found the issue, the bug is not in ufw. ** Changed in: ufw (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs

[Bug 1840375] [NEW] groupdel doesn't support extrausers

2019-08-15 Thread Jamie Strandboge
Public bug reported: snapd needs the ability to call 'groupdel --extrausers foo' to clean up after itself, but --extrausers is currently unsupported. ** Affects: snapd Importance: Undecided Assignee: Michael Vogt (mvo) Status: New ** Affects: shadow (Ubuntu) Importance: U

[Bug 1824384] Re: libapparmor not built with -fPIC

2019-08-13 Thread Jamie Strandboge
** Changed in: apparmor (Ubuntu) Importance: Undecided => Medium ** Changed in: apparmor (Ubuntu) Status: New => Triaged -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1824384 Title: libap

[Bug 1836722] Re: package ufw 0.35-0ubuntu2 failed to install/upgrade: subprocess installed pre-removal script returned error exit status 127

2019-07-16 Thread Jamie Strandboge
This looks to be a local system issue with python3-minimal being removed and then the prerm scripts from various programs failing due to debhelper scripts that the package use can't find the required binaries. Removing python3.6-minimal (3.6.8-1~16.04.york1) ... Unlinking and removing bytecode for

[Bug 1835912] [NEW] Notmuch package recommends various MUAs, but if NeoMutt is installed, none of the recommended list should be

2019-07-09 Thread Jamie Lokier
Public bug reported: The notmuch package recommends: Recommends: elpa-notmuch | notmuch-vim | notmuch-mutt | alot, gnupg- agent, gpgsm By default it will try to an MUA, and that will be elpa-notmuch if you don't have any other. However, if you already installed NeoMutt, that also works with

[Bug 1834386] Re: Ebooks thumbnails fail in Nemo over SMB

2019-06-27 Thread Jamie Strandboge
(nemo:31811): CinnamonDesktop-WARNING **: 01:08:30.200: Error creating thumbnail for smb://akem- hp.local/comics_bds_mangas/Scrooge/Uncle%20Scrooge%20(001-100)%20GetComics.INFO/029%20Uncle%20Scrooge.cbr: Unrecognized image file format This suggests that the problem is not due to the apparmor profi

[Bug 1820068] Re: specifying -O no-expr-simplify results in cache miss

2019-06-24 Thread Jamie Strandboge
FYI, I tested this and 2.13.2-9ubuntu6.1 fixes this bug. I also executed https://wiki.ubuntu.com/Process/Merges/TestPlans/AppArmor (sans dbus optional bits) and everything passed. Lastly, I wanted to double check the performance impact of no-expr- simplify on amd64 especially as it pertains to cl

[Bug 1833719] Re: UFW 2nd interface incorrectly working

2019-06-21 Thread Jamie Strandboge
Thank you for using ufw and filing a bug. Please keep in mind that the firewall is sensitive to rule order. What is the output of 'sudo ufw show numbered'? ** Changed in: ufw (Ubuntu) Status: New => Incomplete -- You received this bug notification because you are a member of Ubuntu Bugs,

[Bug 1828275] Re: [snap] chromium generates a lot of Apparmor noise

2019-06-21 Thread Jamie Strandboge
Thanks! FYI, for the udev accesses: https://github.com/snapcore/snapd/pull/7019 ** Changed in: snapd (Ubuntu) Status: Incomplete => In Progress ** Changed in: snapd (Ubuntu) Assignee: (unassigned) => Jamie Strandboge (jdstrand) -- You received this bug notification because y

[Bug 1828275] Re: [snap] chromium generates a lot of Apparmor noise

2019-06-20 Thread Jamie Strandboge
You can 'sudo snap connect chromium:mount-observe' for /etc/fstab. /run/mount/utab is more complicated and you can read about it here: https://forum.snapcraft.io/t/namespace-awareness-of-run-mount-utab-and- libmount/5987 For the /run/udev/data accesses, can you paste the output of: $ cat /run/ude

[Bug 1826415] Re: Videos do not play in presentation mode

2019-06-18 Thread Jamie Strandboge
** Tags removed: apparmor -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1826415 Title: Videos do not play in presentation mode To manage notifications about this bug go to: https://bugs.launchpad.n

[Bug 1788929] Re: Debian/Ubuntu AppArmor policy gaps in evince

2019-06-18 Thread Jamie Strandboge
Ubuntu 14.04 LTS is now out of standard support and evince is not included in ESM. ** Changed in: evince (Ubuntu Trusty) Status: In Progress => Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.ne

[Bug 1820068] Re: specifying -O no-expr-simplify results in cache miss

2019-06-18 Thread Jamie Strandboge
** Description changed: + [Impact] + + * AppArmor 2.13 unconditionally invalidates its cache when parser options are specified. To decrease compile times for ARM systems, -O no-expr-simplify has been used in Ubuntu for click and snap policy for many years, but was temporarily disabled during

[Bug 1820068] Re: specifying -O no-expr-simplify results in cache miss

2019-06-06 Thread Jamie Strandboge
** Changed in: apparmor Status: In Progress => Fix Released ** Changed in: apparmor (Ubuntu Disco) Status: Triaged => In Progress ** Changed in: apparmor Assignee: (unassigned) => John Johansen (jjohansen) -- You received this bug notification because you are a member of Ubun

[Bug 1820068] Re: specifying -O no-expr-simplify results in cache miss

2019-06-06 Thread Jamie Strandboge
** Changed in: apparmor (Ubuntu Eoan) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1820068 Title: specifying -O no-expr-simplify results in cache miss T

[Bug 1820068] Re: specifying -O no-expr-simplify results in cache miss

2019-06-06 Thread Jamie Strandboge
riaged ** Also affects: apparmor (Ubuntu Disco) Importance: Undecided Status: New ** Changed in: apparmor (Ubuntu Eoan) Assignee: (unassigned) => Jamie Strandboge (jdstrand) ** Changed in: apparmor (Ubuntu Disco) Assignee: (unassigned) => Jamie Strandboge (jdstrand) *

[Bug 1820068] Re: specifying -O no-expr-simplify results in cache miss

2019-06-06 Thread Jamie Strandboge
** Description changed: With 2.13.2 and the most recent testsuite patches from the 2.13 branch, I find that the cache works correctly when no options are specified. Eg # setup $ mkdir -p /tmp/aa/cache /tmp/aa/profiles $ cp /etc/apparmor.d/sbin.dhclient /tmp/aa/profiles/ # no opti

[Bug 1821625] Re: systemd 237-3ubuntu10.14 ADT test failure on Bionic ppc64el (test-seccomp)

2019-06-03 Thread Jamie Strandboge
FYI, please note that seccomp 2.4.1 was pushed to bionic in https://usn.ubuntu.com/4001-1/ on 2019/05/30. It shouldn't affect this bug report AFAICT because while the 2.4.1 Ubuntu packaging drops these patches, the upstream commits for lp-1815415-arch-update-syscalls-for- Linux-4.9.patch and lp-181

[Bug 1831368] [NEW] Deja-dup asks to install software from un-trusted sources

2019-06-02 Thread Jamie Coombs
Public bug reported: When setting up deja-dup to backup to Google drive, it says that dulicity & python-gi are not installed (this is expected). It gives the option to install these packages, but the system warns that they are from an untrusted source. Installing the same packages from terminal r

[Bug 1695808] Re: tasks killed for nop (-1)

2019-05-31 Thread Jamie Strandboge
This was fixed in upstream 2.3.2 which was fixed in cosmic. As of https://usn.ubuntu.com/4001-1/ pulling back 2.4.1, this is now fixed everywhere. ** Changed in: libseccomp (Ubuntu) Status: Confirmed => Fix Released -- You received this bug notification because you are a member of Ubuntu

[Bug 1586496] Re: Upgrade libseccomp library in main

2019-05-31 Thread Jamie Strandboge
libseccomp was updated in trusty ESM here: https://usn.ubuntu.com/4001-2/ -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1586496 Title: Upgrade libseccomp library in main To manage notifications abo

[Bug 1586496] Re: Upgrade libseccomp library in main

2019-05-31 Thread Jamie Strandboge
This could be argued as Won't Fix since trusty is out of standard support, but it did, in the end, receive an upgrade in trusty esm, so marking Fix Released. ** Changed in: libseccomp (Ubuntu) Status: New => Fix Released -- You received this bug notification because you are a member of Ub

[Bug 1830859] Re: new libseccomp 2.4 (in proposed) makes rebuilds need but not generate a dependency to 2.4

2019-05-30 Thread Jamie Strandboge
FYI, libseccomp is now published: https://usn.ubuntu.com/4001-1/ -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1830859 Title: new libseccomp 2.4 (in proposed) makes rebuilds need but not generate

[Bug 1830502] Re: apparmor fails to start with no parser errors

2019-05-29 Thread Jamie Strandboge
@Ian - how did you generate this profile? Is this something that snapd generated (it doesn't look like typical snap-update-ns profiles...)? If it did, can you attach the snap.yaml (this seems like atypical usage of the layouts feature)? -- You received this bug notification because you are a memb

[Bug 1804314] Re: Wrong WARNING Option 'hash' missing in crypttab

2019-05-24 Thread Jamie Scott
Ah! I followed the same guide, as I also wanted manual disk encryption so I could dual boot and ran into the same issue. The fix above works for me too, after specifying `UUID=xxx` you only need `none luks` and nothing in any of the other 2 files mentioned. Many thanks! -- You received this bug

[Bug 1798091] Re: thumbnailer cannot create tempfiles (with apparmor denials)

2019-05-22 Thread Jamie Strandboge
@Christina - I suggest filing a new bug with more specifics. That said, I suspect you have a .dpkg-dist file in /etc/apparmor.d or /etc/apparmor.d/abstractions that has changes that need to be merged into your evince profile. -- You received this bug notification because you are a member of Ubunt

[Bug 1770082] Re: systemd-networkd not renaming devices on boot

2019-05-13 Thread Jamie Lokier
For what it's worth, I'm still seeing set-name having no affect on a server's only interface. Server is using Ubuntu 19.04, with netplan.io-0.96-0ubuntu4.1, AMD64 arch. It's a bare-metal server with a single "e1000e" ethernet device. No cloud-init installed. Config file /etc/netplan/01-netcfg.ya

[Bug 1743200] Re: No support for interface labels

2019-05-13 Thread Jamie Murphy
Is there any plan to implement this? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1743200 Title: No support for interface labels To manage notifications about this bug go to: https://bugs.launchpa

[Bug 1811824] Re: [MIR] xdg-dbus-proxy

2019-05-10 Thread Jamie Strandboge
;Connect to other bus', choose unix:path=/tmp/test-system and see system bus $ d-feet # 'Connect to other bus', choose unix:path=/tmp/test-session and see session bus $ ls -l /run/user/1000/.dbus-proxy/ total 0 srwxr-xr-x 1 jamie jamie 0 May 10 17:32 a11y-bus-proxy-A5PT1Z srwxr-xr-x 1

[Bug 1827512] Re: --arch=i386 on amd64 results in "Host does not support virtualization type 'hvm' for arch 'i386'"

2019-05-03 Thread Jamie Strandboge
FYI, I used virt-install with --qemu-commandline="--enable-kvm" with --arch=i686 (and qemu-system-i386) and it was not paused during my setup of the VM. I then tried again without --qemu-commandline="--enable-kvm" (ie, just --arch=i686) and it worked fine. I guess the issue with the pausing was unr

[Bug 1827512] Re: --arch=i386 on amd64 results in "Host does not support virtualization type 'hvm' for arch 'i386'"

2019-05-03 Thread Jamie Strandboge
"Also, during the running of my disco i386 vm with qemu-system-i386 it ended up in a paused state during a big 'apt-get install ubuntu-desktop' and could not be unpaused. I had to destroy then start, 'sudo dpkg --configure -a' and then try to resume work. This may be unrelated, but I mention this a

[Bug 1827512] Re: --arch=i386 on amd64 results in "Host does not support virtualization type 'hvm' for arch 'i386'"

2019-05-03 Thread Jamie Strandboge
Let me try that again... Interestingly I just noticed with my previous i386 VMs, they are started with qemu-system-x86_64 (via kvm-spice, a symlink to kvm with started the VM with --enable-kvm), but if I choose --arch=i686 on disco, it is started with qemu-system-i386 (and no --enable-kvm). I thin

[Bug 1827512] Re: --arch=i386 on amd64 results in "Host does not support virtualization type 'hvm' for arch 'i386'"

2019-05-03 Thread Jamie Strandboge
Also, during the running of my disco i386 vm with qemu-system-i386 it ended up in a paused state during a big 'apt-get install ubuntu-desktop' and could not be unpaused. I had to destroy then start, 'sudo dpkg --configure -a' and then try to resume work. This may be unrelated, but I mention this as

[Bug 1827512] Re: --arch=i386 on amd64 results in "Host does not support virtualization type 'hvm' for arch 'i386'"

2019-05-03 Thread Jamie Strandboge
Interestingly I just noticed with my previous i386 VMs, they are started with qemu-system-x86_64, but if I choose --arch=i686 on disco, it is started with qemu-system-x86_64 (via kvm-spice, a symlink to kvm with started the VM with --enable-kvm). I think this suggests that perhaps libvirt perhaps a

[Bug 1827512] [NEW] --arch=i386 on amd64 results in "Host does not support virtualization type 'hvm' for arch 'i386'"

2019-05-03 Thread Jamie Strandboge
Public bug reported: For many years I've been able to create x86 VMs on an x86_64 host with a command line like the following: $ virt-install --connect=qemu:///system --name=sec-disco-i386 --arch=i386 --cpu=host-passthrough --ram=1280 --disk=path=.../sec- disco-i386.qcow2,size=10,format=qcow2,spa

[Bug 1826429] Re: package apparmor 2.13.2-9ubuntu6 failed to install/upgrade: installed apparmor package post-installation script subprocess returned error exit status 1

2019-04-26 Thread Jamie Strandboge
** Changed in: apparmor (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1826429 Title: package apparmor 2.13.2-9ubuntu6 failed to install/upgrade: installed ap

[Bug 1826460] Re: Every snap gives "create user data directory" after upgrade to 19.04

2019-04-25 Thread Jamie Strandboge
** Also affects: snapd Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1826460 Title: Every snap gives "create user data directory" after upgrade to 19.04

[Bug 1816548] Re: [MIR] usbguard

2019-04-18 Thread Jamie Strandboge
The error happened again after a snapd upgrade. I suspect it isn't handling the udev trigger events that snapd does particularly well (even though that is supposed to be safe). -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bu

[Bug 520546] Re: Alt+KEY incorrectly behaves like Ctrl+Alt+KEY

2019-04-17 Thread Jamie Strandboge
I'm also seeing this behavior in gnome-shell on disco. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/520546 Title: Alt+KEY incorrectly behaves like Ctrl+Alt+KEY To manage notifications about this b

[Bug 1824961] Re: AppArmor blocks apport python hook from working

2019-04-16 Thread Jamie Strandboge
"I guess the question is: Shouldn't we have a python-apport abstraction that apps (or local admin) can include to make debugging work under apparmor? It should probably live in apport, I guess, so apport can define which files it needs." Perhaps an abstraction makes sense to optionally add it in f

[Bug 1824961] Re: AppArmor blocks apport python hook from working

2019-04-16 Thread Jamie Strandboge
I might also mention on IRC the exact type of thing why we've had these rules in the profile that ship them: [119698.000187] audit: type=1400 audit(1555405334.985:222): apparmor="DENIED" operation="exec" profile="/usr/sbin/kopano-search" name="/usr/bin/x86_64-linux-gnu-gcc-8" pid=15647 comm="kopan

[Bug 1824961] Re: AppArmor blocks apport python hook from working

2019-04-16 Thread Jamie Strandboge
Traditionally we have actually put these accesses in the packages that ship the profile, like Marc said, because profilers may not want the profile to automatically have everything apport requires. These accesses should *not* be in the python abstraction because the accesses have nothing to do with

[Bug 1824812] Re: apparmor does not start in Disco LXD containers

2019-04-15 Thread Jamie Strandboge
Uploaded 2.13.2-9ubuntu6 with the SFS_MOUNTPOINT change. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1824812 Title: apparmor does not start in Disco LXD containers To manage notifications about t

[Bug 1824812] Re: apparmor does not start in Disco LXD containers

2019-04-15 Thread Jamie Strandboge
Since the apparmor SFS_MOUNTPOINT change is small, I'll prepare an upload for that immediately. We may need another parser update for the other issue. ** Changed in: apparmor (Ubuntu) Status: Triaged => In Progress -- You received this bug notification because you are a member of Ubuntu B

[Bug 1824812] Re: apparmor does not start in Disco LXD containers

2019-04-15 Thread Jamie Strandboge
The following will reproduce the issue in a disco VM with disco LXD container: Initial setup: 1. have an up to date disco vm $ cat /proc/version_signature Ubuntu 5.0.0-11.12-generic 5.0.6 2. sudo snap install lxd 3. sudo adduser `id -un` lxd 4. newgrp lxd 5. sudo lxd init # use defaults 6. . /et

[Bug 1824812] Re: apparmor does not start in Disco LXD containers

2019-04-15 Thread Jamie Strandboge
There are two bugs that are causing trouble for apparmor policy in LXD containers: 1. the rc.apparmor.functions bug (easy fix: define SFS_MOUNTPOINT at the right time 2. there is some sort of an interaction with the 5.0.0 kernel that is causing problems I'll give complete instructions on how to

[Bug 1824812] Re: apparmor does not start in Disco LXD containers

2019-04-15 Thread Jamie Strandboge
** Summary changed: - apparmor no more starting in Disco LXD containers + apparmor does not start in Disco LXD containers -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1824812 Title: apparmor does

[Bug 1824812] Re: apparmor no more starting in Disco LXD containers

2019-04-15 Thread Jamie Strandboge
This is due to a bug in upstream parser/rc.apparmor.functions because SFS_MOUNTPOINT is only set after is_apparmor_loaded() is called, but is_container_with_internal_policy() doesn't call it. /lib/apparmor/apparmor.systemd calls is_container_with_internal_policy() prior to apparmor_start() and it i

[Bug 1824812] Re: apparmor no more starting in Disco LXD containers

2019-04-15 Thread Jamie Strandboge
** Also affects: apparmor Importance: Undecided Status: New ** Changed in: apparmor Status: New => Triaged -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1824812 Title: apparmor no

[Bug 1824812] Re: apparmor no more starting in Disco LXD containers

2019-04-15 Thread Jamie Strandboge
** Changed in: libvirt (Ubuntu) Status: New => Invalid ** Changed in: apparmor (Ubuntu) Status: New => Triaged ** Changed in: apparmor (Ubuntu) Assignee: (unassigned) => Jamie Strandboge (jdstrand) ** Changed in: apparmor (Ubuntu) Importance: Undecided => H

[Bug 1816548] Re: [MIR] usbguard

2019-04-12 Thread Jamie Strandboge
> > Understanding that usbguard is a target for main, I've been running it > > on my laptop for a little while and can say that there is a real issue > > with the daemon stopping which causes all USB inserts to fail closed > > until the daemon is restarted. I've also suspected some external > > Di

[Bug 1815910] Re: Apparmor blocks access to /dev/vhost-net

2019-04-10 Thread Jamie Strandboge
I've stated my preference for upstream: https://www.redhat.com/archives /libvir-list/2019-April/msg00750.html For Ubuntu, if the issue is causing a lot of issues, I'm open to a distro patch that enables the access by default on the condition that /etc/libvirt/qemu.conf is adjusted to have a commen

[Bug 1820114] Re: iptables v1.6.1: can't initialize iptables table `filter': Memory allocation problem

2019-04-10 Thread Jamie Strandboge
To be clear, when I installed linux-modules-extra-5.0.0-8-generic, I no longer saw this error message. Of course, it might not strictly be a duplicate, but I'll let the kernel team figure that out. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed

[Bug 1820114] Re: iptables v1.6.1: can't initialize iptables table `filter': Memory allocation problem

2019-04-10 Thread Jamie Strandboge
FYI, I saw this when looking at https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1823862. In the other bug, the reporter say a different error message, but I saw 'iptables v1.6.1: can't initialize iptables table `filter': Memory allocation problem'. If those in this bug do not have linux-module

[Bug 1823862] Re: disco: unable to enable ufw under -virtual kernel

2019-04-10 Thread Jamie Strandboge
I can confirm that without linux-modules-extra-*, iptables is broken. Reduced test case: $ sudo iptables -L -n iptables: No chain/target/match by that name. Full test case: $ sudo /usr/share/ufw/check-requirements -f ... ERROR: could not create 'ufw-check-requirements'. Aborting FAIL: check your

[Bug 1823862] Re: disco: unable to enable ufw under -virtual kernel

2019-04-10 Thread Jamie Strandboge
Marking the ufw task as Invalid. The kernel doesn't have what is needed to run iptables. ** Changed in: ufw (Ubuntu) Status: New => Invalid ** Changed in: ufw (Ubuntu) Assignee: Jamie Strandboge (jdstrand) => (unassigned) -- You received this bug notification becaus

[Bug 1816548] Re: [MIR] usbguard

2019-04-09 Thread Jamie Strandboge
Understanding that usbguard is a target for main, I've been running it on my laptop for a little while and can say that there is a real issue with the daemon stopping which causes all USB inserts to fail closed until the daemon is restarted. I've also suspected some external keyboard weirdness afte

[Bug 1823862] Re: disco: unable to enable ufw

2019-04-09 Thread Jamie Strandboge
"I can only think this is something cloud-image specific." Can you provide the requested information in the earlier comments? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1823862 Title: disco: una

[Bug 1823862] Re: disco: unable to enable ufw

2019-04-09 Thread Jamie Strandboge
Another thing that might be useful is attaching a tarball of /lib/ufw, /etc/ufw, and /etc/default/ufw. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1823862 Title: disco: unable to enable ufw To ma

[Bug 1823862] Re: disco: unable to enable ufw

2019-04-09 Thread Jamie Strandboge
FYI, I also tried the above with setting /etc/default/ufw to have IPV6=no and everything works fine (and the v6 rules are not added). -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1823862 Title: dis

[Bug 1823862] Re: disco: unable to enable ufw

2019-04-09 Thread Jamie Strandboge
You said that the swift charm is disabling ipv6 in certain situations. Is it updating /etc/default/ufw? Is it disabling it elsewhere? In the failing instance, before trying to setup swift or run ufw or anything, what is the output of 'sudo /usr/share/ufw/check-requirements'? -- You received this

[Bug 1823862] Re: disco: unable to enable ufw

2019-04-09 Thread Jamie Strandboge
The usefulness of the policy aside (it is configured wide open), I still can't reproduce with http://cdimage.ubuntu.com/ubuntu- server/daily/current/disco-server-amd64.iso that I just downloaded: $ sudo ufw default allow incoming Default incoming policy changed to 'allow' (be sure to update your r

[Bug 1823862] Re: disco: unable to enable ufw

2019-04-09 Thread Jamie Strandboge
Ubuntu) Status: New => Incomplete ** Changed in: ufw (Ubuntu) Assignee: (unassigned) => Jamie Strandboge (jdstrand) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1823862 T

[Bug 1811129] Re: update ufw to 0.36

2019-03-28 Thread Jamie Strandboge
I've verified this on cosmic using a combination of test-ufw.py from QRT (which in addition to various smoke/etc tests, runs all the tests in the testsuite, including root/iptables tests): ufw: Installed: 0.36-0ubuntu0.18.10.1 Candidate: 0.36-0ubuntu0.18.10.1 Version table: *** 0.36-0ubuntu

[Bug 1811129] Re: update ufw to 0.36

2019-03-28 Thread Jamie Strandboge
I've verified this on bionic using a combination of test-ufw.py from QRT (which in addition to various smoke/etc tests, runs all the tests in the testsuite, including root/iptables tests): ufw: Installed: 0.36-0ubuntu0.18.04.1 Candidate: 0.36-0ubuntu0.18.04.1 Version table: *** 0.36-0ubuntu

[Bug 1204579] Re: ufw doesn't support concurrent updates

2019-03-28 Thread Jamie Strandboge
Verified this is fixed in bionic: $ apt-cache policy ufw ufw: Installed: 0.36-0ubuntu0.18.04.1 Candidate: 0.36-0ubuntu0.18.04.1 Version table: *** 0.36-0ubuntu0.18.04.1 500 500 http://us.archive.ubuntu.com/ubuntu bionic-proposed/main amd64 Packages 500 http://us.archive.ubu

[Bug 1368411] Re: Cannot insert IPV6 rule before IPV4 rules

2019-03-28 Thread Jamie Strandboge
Verified this is fixed in bionic: $ apt-cache policy ufw ufw: Installed: 0.36-0ubuntu0.18.04.1 Candidate: 0.36-0ubuntu0.18.04.1 Version table: *** 0.36-0ubuntu0.18.04.1 500 500 http://us.archive.ubuntu.com/ubuntu bionic-proposed/main amd64 Packages 500 http://us.archive.ubu

[Bug 1368411] Re: Cannot insert IPV6 rule before IPV4 rules

2019-03-28 Thread Jamie Strandboge
Tested this is fixed in cosmic: $ apt-cache policy ufw ufw: Installed: 0.36-0ubuntu0.18.10.1 Candidate: 0.36-0ubuntu0.18.10.1 Version table: *** 0.36-0ubuntu0.18.10.1 500 500 http://us.archive.ubuntu.com/ubuntu cosmic-proposed/main amd64 Packages 500 http://us.archive.ubunt

[Bug 1204579] Re: ufw doesn't support concurrent updates

2019-03-28 Thread Jamie Strandboge
Tested this is fixed in cosmic: $ apt-cache policy ufw ufw: Installed: 0.36-0ubuntu0.18.10.1 Candidate: 0.36-0ubuntu0.18.10.1 Version table: *** 0.36-0ubuntu0.18.10.1 500 500 http://us.archive.ubuntu.com/ubuntu cosmic-proposed/main amd64 Packages 500 http://us.archive.ubunt

[Bug 1775043] Re: bash completion not working: uses deprecated have()

2019-03-28 Thread Jamie Strandboge
Tested this is fixed in cosmic: $ apt-cache policy ufw ufw: Installed: 0.36-0ubuntu0.18.10.1 Candidate: 0.36-0ubuntu0.18.10.1 Version table: *** 0.36-0ubuntu0.18.10.1 500 500 http://us.archive.ubuntu.com/ubuntu cosmic-proposed/main amd64 Packages 500 http://us.archive.ubunt

[Bug 1775043] Re: bash completion not working: uses deprecated have()

2019-03-28 Thread Jamie Strandboge
Verified this is fixed in bionic: $ apt-cache policy ufw ufw: Installed: 0.36-0ubuntu0.18.04.1 Candidate: 0.36-0ubuntu0.18.04.1 Version table: *** 0.36-0ubuntu0.18.04.1 500 500 http://us.archive.ubuntu.com/ubuntu bionic-proposed/main amd64 Packages 500 http://us.archive.ubu

[Bug 1664133] Re: ipv6 multicast pings don't return

2019-03-28 Thread Jamie Strandboge
Verified this is fixed in bionic: $ apt-cache policy ufw ufw: Installed: 0.36-0ubuntu0.18.04.1 Candidate: 0.36-0ubuntu0.18.04.1 Version table: *** 0.36-0ubuntu0.18.04.1 500 500 http://us.archive.ubuntu.com/ubuntu bionic-proposed/main amd64 Packages 500 http://us.archive.ubu

[Bug 1664133] Re: ipv6 multicast pings don't return

2019-03-28 Thread Jamie Strandboge
Tested this is fixed in cosmic: $ apt-cache policy ufw ufw: Installed: 0.36-0ubuntu0.18.10.1 Candidate: 0.36-0ubuntu0.18.10.1 Version table: *** 0.36-0ubuntu0.18.10.1 500 500 http://us.archive.ubuntu.com/ubuntu cosmic-proposed/main amd64 Packages 500 http://us.archive.ubunt

[Bug 1719211] Re: Bad interface name

2019-03-28 Thread Jamie Strandboge
Verified this is fixed in bionic: $ apt-cache policy ufw ufw: Installed: 0.36-0ubuntu0.18.04.1 Candidate: 0.36-0ubuntu0.18.04.1 Version table: *** 0.36-0ubuntu0.18.04.1 500 500 http://us.archive.ubuntu.com/ubuntu bionic-proposed/main amd64 Packages 500 http://us.archive.ubu

[Bug 1719211] Re: Bad interface name

2019-03-28 Thread Jamie Strandboge
Tested this is fixed in cosmic: $ apt-cache policy ufw ufw: Installed: 0.36-0ubuntu0.18.10.1 Candidate: 0.36-0ubuntu0.18.10.1 Version table: *** 0.36-0ubuntu0.18.10.1 500 500 http://us.archive.ubuntu.com/ubuntu cosmic-proposed/main amd64 Packages 500 http://us.archive.ubunt

[Bug 1821596] Re: firewalld ipset autopkgtest failures

2019-03-28 Thread Jamie Strandboge
** Description changed: - While investigating bug #820317 I noticed that firewalld autopkgtests + While investigating bug #1820317 I noticed that firewalld autopkgtests started failing: 2019-03-24 17:30:19 ERROR: COMMAND_FAILED: '/sbin/ipset add foobar 10.1.2.0/22' failed: ipset v6.38: Ke

[Bug 1817799] Re: [FFe] apparmor 2.13

2019-03-26 Thread Jamie Strandboge
Uploaded to disco-proposed. ** Changed in: apparmor (Ubuntu) Status: Triaged => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1817799 Title: [FFe] apparmor 2.13 To manage noti

[Bug 1817799] Re: [FFe] apparmor 2.13

2019-03-26 Thread Jamie Strandboge
I've confirmed that the "Could not open '/var/lib/snapd/apparmor/snap- confine'" is not present in standard install of disco. This was a local issue. I've also updated the packaging to remove the "dpkg: warning: unable to delete old directory '/etc/apparmor.d/cache': Directory not empty" message.

[Bug 1811129] Re: update ufw to 0.36

2019-03-26 Thread Jamie Strandboge
** Description changed: [Impact] This bug is the master bug for a one time SRU of ufw to the new 0.36 release. Typically patches would be individually backported like normal, but the new 'prepend' command feature is the impetus for this SRU and it - contains most of the code changes. Ot

[Bug 1368411] Re: Cannot insert IPV6 rule before IPV4 rules

2019-03-25 Thread Jamie Strandboge
FYI, I've reuploaded 0.36 to bionic-proposed and cosmic-proposed after updating the master bug's description. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1368411 Title: Cannot insert IPV6 rule bef

[Bug 1811129] Re: update ufw to 0.36

2019-03-25 Thread Jamie Strandboge
FYI, I've reuploaded 0.36 to bionic-proposed and cosmic-proposed after updating this master bug's description. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1811129 Title: update ufw to 0.36 To man

[Bug 1811129] Re: update ufw to 0.36

2019-03-25 Thread Jamie Strandboge
** Description changed: [Impact] This bug is the master bug for a one time SRU of ufw to the new 0.36 release. Typically patches would be individually backported like normal, but the new 'prepend' command feature is the impetus for this SRU and it contains most of the code changes. Ot

[Bug 1821596] Re: firewalld ipset autopkgtest failures

2019-03-25 Thread Jamie Strandboge
The failures are still there https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-disco/disco/amd64/f/firewalld/20190325_151135_3b840@/log.gz: 2019-03-25 15:04:45 ERROR: COMMAND_FAILED: '/sbin/ipset add foobar 10.1.2.0/22' failed: ipset v6.38: Kern

[Bug 1821596] Re: firewalld ipset autopkgtest failures

2019-03-25 Thread Jamie Strandboge
Ah, looks like seb128 was already aware of this since he prepared the ipset 7.1 upload: https://launchpad.net/ubuntu/+source/ipset/7.1-0ubuntu1 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1821596 Ti

[Bug 1820317] Re: The firewalld autopackage tests fail due to iptables

2019-03-25 Thread Jamie Strandboge
$ ./remove-package -m "1.8.2 abandoned, will wait for 1.8.3 (LP: #1820317)" -s disco-proposed iptables Removing packages from disco-proposed: iptables 1.8.2-4ubuntu1 in disco iptables 1.8.2-4ubuntu1 in disco amd64 iptables 1.8.2-4ubuntu1 in disco arm64

[Bug 1821596] [NEW] firewalld ipset autopkgtest failures

2019-03-25 Thread Jamie Strandboge
Public bug reported: While investigating bug #820317 I noticed that firewalld autopkgtests started failing: 2019-03-24 17:30:19 ERROR: COMMAND_FAILED: '/sbin/ipset add foobar 10.1.2.0/22' failed: ipset v6.38: Kernel support protocol versions 6-7 while userspace supports protocol versions 6-6" As

[Bug 1821596] Re: firewalld ipset autopkgtest failures

2019-03-25 Thread Jamie Strandboge
For whoever looks at this, FYI, it looks like the last time these two tests passed was with a 4.19 kernel: testbed running kernel: Linux 4.19.0-13-generic #14-Ubuntu SMP Thu Feb 7 21:51:25 UTC 2019 See: https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac /auto

[Bug 1820317] Re: The firewalld autopackage tests fail due to iptables

2019-03-25 Thread Jamie Strandboge
I upload 0.6.3-5ubuntu4 for the Depends/Recommends update but expect it to fail due to the ipset issues. I filed bug 1821596 for that. ** Changed in: firewalld (Ubuntu) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is sub

[Bug 1820317] Re: The firewalld autopackage tests fail due to iptables

2019-03-25 Thread Jamie Strandboge
I took a look at this and found that: a) firewalld root-unittests autopkgtests fail when using either iptables 1.6 or 1.8 in release due to https://bugzilla.redhat.com/show_bug.cgi?id=1601610 and the failure is: "2019-03-24 17:30:19 ERROR: COMMAND_FAILED: '/sbin/ipset add foobar 10.1.2.0/22' fa

[Bug 1820114] Re: iptables v1.6.1: can't initialize iptables table `filter': Memory allocation problem

2019-03-25 Thread Jamie Strandboge
FYI, I cannot reproduce this with even less memory: $ iptables --version iptables v1.6.1 $ free totalusedfree shared buff/cache available Mem: 265712 114824 667441024 84144 36024 Swap: 0 0

<    1   2   3   4   5   6   7   8   9   10   >