The real bug here is that AppArmor should restrict NFS access only via
the file-path rules, and not via the network rules, since if an
application accesses a file via NFS, all related network traffic is
initiated and controlled by the kernel (or by kernel helper processes
like automount, rpc.gssd and nfsidmap), and not by the application. NFS
access really needs to be fixed in AppArmor and anything else is just a
temporary workaround. Until then, AppArmor is too blunt a tool for
restricting network access.

See also bug #1784499 (AppArmor prevents /usr/bin/man from reading NFS-
mounted man pages)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1662552

Title:
  snaps don't work with NFS home

To manage notifications about this bug go to:
https://bugs.launchpad.net/snapd/+bug/1662552/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to