Hi intrigeri,

On Sun, Dec 16, 2018 at 02:14:54PM +0100, intrigeri wrote:
> IIRC Chromium uses some operation guarded by ptrace to set up its
> sandboxing or for communication between its components. Recent Firefox
> does the same. It's quite common that a sandboxing technology requires
> elevated privileges and here we're stacking 3 different ones
> (Chromium's, Firejail, and AppArmor) so I'm not surprised that one of
> them is broken by one of the 2 others.
> 
> If this problem affects too many Firejail users who opt-in
> for --apparmor, I would recommend documenting this rule in the
> default profile:
> 
>   ptrace (read,readby) peer=firejail-default,
> 
> I'll let the maintainer judge whether this should be enabled
> by default.
> 
> Other than this, it would be good if the "Usually this is needed only
> for debugging" documentation string was updated a little bit to
> reflect common current use cases of ptrace.

Thanks for the suggestion.
I was unfamiliar with the example rule you provided above, so I looked
it up. According to the AppArmor wiki [0] this finer-grained ptrace
control is only available in AppArmor 3.
But I can see it also being used in some profiles installed on my
system. Has this feature been backported to version 2?

Kind regards,
   Reiner

[0] https://gitlab.com/apparmor/apparmor/wikis/TechnicalDoc_Proc_and_ptrace

Attachment: signature.asc
Description: PGP signature

Reply via email to