[apparmor] AppArmor and Samba

John Johansen john.johansen at canonical.com
Wed Aug 17 21:03:53 UTC 2011


On 08/17/2011 01:39 PM, Christian Boltz wrote:
> Hello,
> 
> on Mittwoch, 17. August 2011, Lars Müller wrote:
>> On Wed, Aug 17, 2011 at 08:21:31AM -0700, Roger Luedecke wrote:
>>> On Wednesday, August 17, 2011 04:34:46 AM Marcus Meissner wrote:
> 
>>>> We enabled it for nmbd and smbd in 11.4, which due to very
>>>> flexible nature of smb paths that can be served made it reject
>>>> valid user scenarios. It is kind of hard to confine a service
>>>> which offers read/write access to configurable paths.
>>>
>>> Hmm, sounds like a problematic addition. Maybe the restrictions
>>> should be lifted then.
>>
>> Sounds more like the YaST Samba module needs an enhancement if a new
>> share gets added.  In this case we have to add a fitting AppArmor
>> configuration for this new path too if AppArmor is in use.
> 
> The YaST Samba module is the wrong place IMHO.
> The better place is the Samba initscript (and its systemd equivalent) so 
> that it is also working for people who manually edit smb.conf.
> 
> Copy&paste from my mail from yesterday (shortly before midnight) 
> somewhere else in this thread:
> 
> ---------------------------------------------------------------------
> 
> The main problem is that AppArmor needs to be aware of the location of 
> your shares. The perfect solution would be that Samba or its initscript 
> add the location of all shares (with lrwk permissions) to an AppArmor 
> profile sniplet at startup.
> 
> See also https://bugzilla.novell.com/show_bug.cgi?id=688040 - most 
> interesting comments:
> 
> | Comment 2 - Christian Boltz    2011-04-18 22:11:35 CEST  
> | Agreed. It would still be worth some bonus points if the samba 
> | initscript would auto-generate a profile sniplet with the path of all 
> | shares ;-)
> 
> | Comment 3 - Lars Mueller    2011-04-20 18:30:08 CEST  
> | Free coffee and cake if we see a submit request implementing the 
> | suggestion from comment #2 in a way that it works generic with the 
> | current sysvinit approach and with systemd too.
> 
> Lars didn't write "for the submitter only" - maybe there's someone who 
> wants to make him sponsoring coffee and cake for the conference? *eg*
> 
Another potential solution coming down the pipes are kernel vars and
mount rules.  Basically there could be a solution that doesn't have
to directly update policy but only a single kernel var (easier to auto-gen),
this could be done dynamically without having to reload all of policy.

There are of course lots of details I have left out, and some more
code to handle updating for shares would need to be created but at least
for shares and dynamic filesystems I think there is a better solution
coming than updating packages to do it.


> ---------------------------------------------------------------------
> 
> The bugreport already contains some technical hints - we just need 
> someone who implements it. (If needed, I can help on the AppArmor part.)
> 
> 
> Regards,
> 
> Christian Boltz




More information about the AppArmor mailing list