[apparmor] [PATCH] policy updates for ptrace and signal mediation

Steve Beattie steve at nxnw.org
Mon Jun 23 20:37:00 UTC 2014


On Mon, Jun 23, 2014 at 03:30:08PM -0500, Jamie Strandboge wrote:
> On 06/23/2014 03:06 PM, Steve Beattie wrote:
> > On Mon, Jun 23, 2014 at 02:07:12PM -0500, Jamie Strandboge wrote:
> >>
> ...
> > 
> >> Description: Adjust base abstraction for ptrace and signal mediation
> >>
> >> Acked-By: Jamie Strandboge <jamie at canonical.com>
> >>
> >> === modified file 'profiles/apparmor.d/abstractions/base'
> >> --- profiles/apparmor.d/abstractions/base	2013-04-09 01:11:43 +0000
> >> +++ profiles/apparmor.d/abstractions/base	2014-06-23 18:56:50 +0000
> >> @@ -103,6 +103,27 @@
> >>    # glibc malloc (man 5 proc)
> >>    @{PROC}/sys/vm/overcommit_memory r,
> >>  
> >> +  # Allow other processes to read our /proc entries, futexes, perf tracing and
> >> +  # kcmp for now
> >> +  ptrace (readby),
> >> +
> >> +  # Allow other processes to trace us by default (they will need 'trace' in
> >> +  # the first place). Administrators can override with:
> >> +  #   deny ptrace (tracedby) ...
> >> +  ptrace (tracedby),
> > 
> > Would these two make more sense for peer=unconfined and
> > peer=@{profile_name}? Or is the intent to rely on the peer needing
> > "ptrace read" and "ptrace trace" permissions and not require both
> > profiles be modified?
> > 
> 
> The intent is to rely on the peer needing "ptrace read" and "ptrace trace" for
> the reason you mentioned cause it was pretty unwieldy without these rules.

Okay. Maybe add a similar comment about Administrators being able to
override with 'deny ptrace (readby)' for the readby case. With that,
Acked-by: Steve Beattie <steve at nxnw.org> for everything.

-- 
Steve Beattie
<sbeattie at ubuntu.com>
http://NxNW.org/~steve/
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: Digital signature
URL: <https://lists.ubuntu.com/archives/apparmor/attachments/20140623/1bd09936/attachment.pgp>


More information about the AppArmor mailing list