** Description changed:

+ SRU Justification:
+ 
+ [ Impact ]
+ 
  Configuration of an OpenVPN client with a "remote some_hostname.local"
  rule on Plucky fails because the OpenVPN profile does not allow access
  to /run/avahi-daemon/socket for mDNS lookups.
+ 
+ [ Test Plan ]
+ 
+ Test plan for the openvpn bugs:
+  * This test description assumes no access to existing machines that use 
OpenVPN. Additional testing of OpenVPN in related configurations (other 
virtualization solutions, specifying the server location via IPs or actual 
domains, etc.) is encouraged.
+    - Spin up two Ubuntu Plucky VMs, one of which will be referred to as 
openvpn-client and the other of which will be referred to as openvpn-server
+    - Ensure that the two machines are able to ping each other using a 
[machine hostname].local address
+    - Generate a key using `openvpn --genkey secret secret.key` and transfer 
this key to both machines, somewhere inside the home directory
+    - Place the following configuration onto openvpn-server, next to 
secret.key:
+    dev tun
+    proto udp
+    cipher aes-256-cbc
+    ifconfig 10.4.13.1 10.4.13.2
+    secret static.key
+    - Place the following configuration onto openvpn-client, next to 
secret.key, substituting the remote location:
+    remote openvpn-server.local
+    dev tun
+    proto udp
+    cipher aes-256-cbc
+    ifconfig 10.4.3.2 10.4.13.1
+    secret static.key
+    - Ensure that the "remote" line in the client configuration is using a 
.local address
+    - Launch openvpn on both machines by running `openvpn path_to_config` on 
each
+    - If (openvpn is unable to resolve the domain) and (apparmor is generating 
denials related to (m)DNS lookups), then report verification test failure
+    - Ensure that the two machines are able to ping each other through the 
OpenVPN tunnel
+ 
+ [ Where problems could occur ]
+ 
+ Allowing mDNS access in the openvpn profile is loosening confinement on
+ a profile. However, if a user manually modified the installed profiles,
+ then the package upgrade would cause conflicts, and rejection of the
+ incoming changes (either by hand during an interactive upgrade or
+ automatically during an batch unattended upgrade) would result in end
+ users not getting the packaged fix.
+ 
+ [ Other Info ]

** Description changed:

  SRU Justification:
  
  [ Impact ]
  
  Configuration of an OpenVPN client with a "remote some_hostname.local"
  rule on Plucky fails because the OpenVPN profile does not allow access
  to /run/avahi-daemon/socket for mDNS lookups.
  
  [ Test Plan ]
  
  Test plan for the openvpn bugs:
-  * This test description assumes no access to existing machines that use 
OpenVPN. Additional testing of OpenVPN in related configurations (other 
virtualization solutions, specifying the server location via IPs or actual 
domains, etc.) is encouraged.
-    - Spin up two Ubuntu Plucky VMs, one of which will be referred to as 
openvpn-client and the other of which will be referred to as openvpn-server
-    - Ensure that the two machines are able to ping each other using a 
[machine hostname].local address
-    - Generate a key using `openvpn --genkey secret secret.key` and transfer 
this key to both machines, somewhere inside the home directory
-    - Place the following configuration onto openvpn-server, next to 
secret.key:
-    dev tun
-    proto udp
-    cipher aes-256-cbc
-    ifconfig 10.4.13.1 10.4.13.2
-    secret static.key
-    - Place the following configuration onto openvpn-client, next to 
secret.key, substituting the remote location:
-    remote openvpn-server.local
-    dev tun
-    proto udp
-    cipher aes-256-cbc
-    ifconfig 10.4.3.2 10.4.13.1
-    secret static.key
-    - Ensure that the "remote" line in the client configuration is using a 
.local address
-    - Launch openvpn on both machines by running `openvpn path_to_config` on 
each
-    - If (openvpn is unable to resolve the domain) and (apparmor is generating 
denials related to (m)DNS lookups), then report verification test failure
-    - Ensure that the two machines are able to ping each other through the 
OpenVPN tunnel
+  * This test description assumes no access to existing machines that use 
OpenVPN. Additional testing of OpenVPN in related configurations (other 
virtualization solutions, specifying the server location via IPs or actual 
domains, etc.) is encouraged.
+    - Spin up two Ubuntu Plucky VMs, one of which will be referred to as 
openvpn-client and the other of which will be referred to as openvpn-server
+    - Ensure that the two machines are able to ping each other using a 
[machine hostname].local address
+    - Generate a key using `openvpn --genkey secret secret.key` and transfer 
this key to both machines, somewhere inside the home directory
+    - Place the following configuration onto openvpn-server, next to 
secret.key:
+    dev tun
+    proto udp
+    cipher aes-256-cbc
+    ifconfig 10.4.13.1 10.4.13.2
+    secret static.key
+    - Place the following configuration onto openvpn-client, next to 
secret.key, substituting the remote location:
+    remote openvpn-server.local
+    dev tun
+    proto udp
+    cipher aes-256-cbc
+    ifconfig 10.4.3.2 10.4.13.1
+    secret static.key
+    - Ensure that the "remote" line in the client configuration is using a 
.local address
+    - Launch openvpn on both machines by running `openvpn path_to_config` on 
each
+    - If (openvpn is unable to resolve the domain) and (apparmor is generating 
denials related to (m)DNS lookups), then report verification test failure
+    - Ensure that the two machines are able to ping each other through the 
OpenVPN tunnel
  
  [ Where problems could occur ]
  
  Allowing mDNS access in the openvpn profile is loosening confinement on
  a profile. However, if a user manually modified the installed profiles,
  then the package upgrade would cause conflicts, and rejection of the
  incoming changes (either by hand during an interactive upgrade or
  automatically during an batch unattended upgrade) would result in end
  users not getting the packaged fix.
  
  [ Other Info ]
+ 
+ The OpenVPN setups in the test plans for LP: #2109029 and LP: #2107596
+ are nearly identical.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/2109029

Title:
  AppArmor OpenVPN profile blocks mDNS lookups

Status in apparmor package in Ubuntu:
  Fix Released
Status in apparmor source package in Plucky:
  In Progress
Status in apparmor source package in Questing:
  Fix Released

Bug description:
  SRU Justification:

  [ Impact ]

  Configuration of an OpenVPN client with a "remote some_hostname.local"
  rule on Plucky fails because the OpenVPN profile does not allow access
  to /run/avahi-daemon/socket for mDNS lookups.

  [ Test Plan ]

  Test plan for the openvpn bugs:
   * This test description assumes no access to existing machines that use 
OpenVPN. Additional testing of OpenVPN in related configurations (other 
virtualization solutions, specifying the server location via IPs or actual 
domains, etc.) is encouraged.
     - Spin up two Ubuntu Plucky VMs, one of which will be referred to as 
openvpn-client and the other of which will be referred to as openvpn-server
     - Ensure that the two machines are able to ping each other using a 
[machine hostname].local address
     - Generate a key using `openvpn --genkey secret secret.key` and transfer 
this key to both machines, somewhere inside the home directory
     - Place the following configuration onto openvpn-server, next to 
secret.key:
     dev tun
     proto udp
     cipher aes-256-cbc
     ifconfig 10.4.13.1 10.4.13.2
     secret static.key
     - Place the following configuration onto openvpn-client, next to 
secret.key, substituting the remote location:
     remote openvpn-server.local
     dev tun
     proto udp
     cipher aes-256-cbc
     ifconfig 10.4.3.2 10.4.13.1
     secret static.key
     - Ensure that the "remote" line in the client configuration is using a 
.local address
     - Launch openvpn on both machines by running `openvpn path_to_config` on 
each
     - If (openvpn is unable to resolve the domain) and (apparmor is generating 
denials related to (m)DNS lookups), then report verification test failure
     - Ensure that the two machines are able to ping each other through the 
OpenVPN tunnel

  [ Where problems could occur ]

  Allowing mDNS access in the openvpn profile is loosening confinement
  on a profile. However, if a user manually modified the installed
  profiles, then the package upgrade would cause conflicts, and
  rejection of the incoming changes (either by hand during an
  interactive upgrade or automatically during an batch unattended
  upgrade) would result in end users not getting the packaged fix.

  [ Other Info ]

  The OpenVPN setups in the test plans for LP: #2109029 and LP: #2107596
  are nearly identical.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/2109029/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to     : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to