Control: retitle -1 AppArmor profile should support a per-user instance of Tor
Control: severity -1 normal

Hi Jack,

Jack Wearden wrote (06 Aug 2013 19:00:08 GMT) :
> I'm forwarding this bug report from Ubuntu; the original bug report is
> available here https://bugs.launchpad.net/ubuntu/+source/vidalia/+bug/680192.

> The apparmor-profile is not configured to allow vidalia to have access to the
> tor binary, and so it cannot start or stop tor.

It's correct that the current Vidalia profile only supports the
system-wide instance of Tor setup. I'm glad you're interested in
improving this!

AppArmor isn't enabled by default in Debian yet, so I'm downgrading
the severity to `normal'.

> Adding
>     /usr/sbin/tor Ux,
> to debian/apparmor-profile fixes this issue

Thanks for the suggestion. However, I would find it sad to run Tor
unconfined in this usecase:

  * the system-wide instance already decouples system-wide stuff in
    a `system_tor' profile, and ships `abstractions/tor' for things
    that should be shared with the usecase at hand
  * the whole thing is pretty easy to correctly confine.

How about adding a `vidalia_tor' profile, that's used when running
/usr/sbin/tor from Vidalia? E.g. something like that could be a good
starting point:

  # vim:syntax=apparmor
  #include <tunables/global>
  
  profile vidalia_tor {
    #include <abstractions/tor>
  
    owner @{HOME}/.vidalia/torrc r,
    owner @{HOME}/.tor rw,
    owner @{HOME}/.tor/* rwk,
  
    # Site-specific additions and overrides. See local/README for details.
    #include <local/vidalia_tor>
  }

Are you interested in building upon this?

Cheers,
-- 
  intrigeri
  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to