On 03/31/2017 02:48 PM, Vincas Dargis wrote:
> Hi,
>
> I'm on Kubuntu 16.04 with Apparmor 2.10.95-0ubuntu2.6 and Linux
> 4.8.0-34-generic (HWE)
>
> usr.bin.skype profile has such lines:
>
> deny @{HOME}/.fontconfig/ w,
> deny @{HOME}/.fontconfig/*.cache-*.TMP* w,
>
> When I run:
>
> apparmor_parser -Q -d /etc/apparmor.d/usr.bin.skype
>
> These lines are printed:
>
> Mode: wa:wa Name: ({/home//*,/root}/.fontconfig/)
> Mode: wa:wa Name: ({/home//*,/root}/.fontconfig/*.cache-*.TMP*)
>
> I do not quite follow here. What these wa:wa means exactly? Looking at Wiki
> [0], it kinda seems like if I am owner or not, I am allowed to write..?
> Though of course I expect not to be able to write due to "deny".
>
its showing the internal permissions that the w is mapping to. That is w is
being converted to both write and appaend internally. This due to how
permissions get tested. The colon is used to represent user:!user, which is
again just an internal mapping detail and could change in the future. The
denied info is stored as a separate flag, and I would say it is a bug that
debug is not outputing it.
> How to interpret these debug outputs, how do I audit apparmor profiles?
>
Auditing apparmor profiles is unfortunately a lot harder than it should be atm.
I tend to use apparmor_parser -p, to get a flattened view of the profile with
all the vars etc in one place, but this currently can lead to a lot of
duplication. Depending on what I am looking at I use some of the dump flags as
well
--help=D will provide a list of what the parser supports. This list can change,
it is not considered as stable api, hence it not being documented in the man
pages.
the one that would probably interest you is
[no-]rule-exprs Dump rule to expr tree conversions
which will dump out information about rule conversions
it will dump a whole bunch of stuff like
aare: /proc/stat -> /proc/stat
rule: /proc/stat -> /proc/stat (0x10004/0)< 0x10004>
however this requires you to know even more of the internals and may not be
useful, depending on what you are doing
Overall, I would say auditing profiles is far to hard at the moment and we need
some lint, and auditing tools to help with the process
> Thanks.
>
> [0] http://wiki.apparmor.net/index.php/AppArmorMonitoring - "This listing
> shows the permissions granted when the user owns the resource (file,
> directory, pipe, etc.) and when the user does not own the resource."
>
--
AppArmor mailing list
[email protected]
Modify settings or unsubscribe at:
https://lists.ubuntu.com/mailman/listinfo/apparmor