** Description changed: + [Impact] + + * Certain strongswan based vpn setups fail, especially those based on + network-manager-l2tp or neutron-vpn-netns-wrapper + + * The fix is opening up the apparmor profile slightly for charon and + stroke where paths are disconnected + + [Test Case] + + * valid VPN setup with network-manager-l2tp, then running "sudo ipsec + status" + + or + + * valid neutron-vpn setup and then + # mkdir /tmp/test + # ip netns add testns + # ip netns exec testns neutron-vpn-netns-wrapper --mount_paths "/var/run:/tmp/test" --cmd "ipsec,status" + + In both cases the command fails as it can't reach charon log. + + [Regression Potential] + + * Since the profile for strongswan is opened up a bit (and not more + restricted) the regression potential for strongswan should be minimal. + + * Yet OTOH due to the change there is a slightly higher security risk + now. That said the case seems to be exactly what the feature was + designed for [1] and there are several other packages holding a similar + flag. + + [1]: + http://wiki.apparmor.net/index.php/ReleaseNotes_2_5#path_name_lookup_and_mediation_of + + [Other Info] + + * The part of the "valid VPN setup" both Test cases would need some more + input by the reporters if possible - to easen testing (see comments + #5+#6 and #28+#29 for the current status on tests). + + * Unless this is done we have to rely more than usual on the reporters to + verify this. + + $ lsb_release -rd Description: Ubuntu 16.04 LTS Release: 16.04 $ apt-cache policy strongswan strongswan: - Installed: 5.3.5-1ubuntu3 - Candidate: 5.3.5-1ubuntu3 - Version table: - *** 5.3.5-1ubuntu3 500 - 500 http://au.archive.ubuntu.com/ubuntu xenial/main amd64 Packages - 500 http://au.archive.ubuntu.com/ubuntu xenial/main i386 Packages - 100 /var/lib/dpkg/status - + Installed: 5.3.5-1ubuntu3 + Candidate: 5.3.5-1ubuntu3 + Version table: + *** 5.3.5-1ubuntu3 500 + 500 http://au.archive.ubuntu.com/ubuntu xenial/main amd64 Packages + 500 http://au.archive.ubuntu.com/ubuntu xenial/main i386 Packages + 100 /var/lib/dpkg/status Looks like 'ipsec status' might be causing strongswan's charon to write to run/systemd/journal/dev-log instead of /run/systemd/journal/dev-log and apparmor doesn't like it. Extract from /etc/apparmor.d/abstractions/base : - /{,var/}run/systemd/journal/dev-log w, + /{,var/}run/systemd/journal/dev-log w, With an established ipsec connection, issue the following : $ sudo ipsec status connecting to 'unix:///var/run/charon.ctl' failed: Permission denied failed to connect to stroke socket 'unix:///var/run/charon.ctl' - $ journalctl ... Jun 01 12:15:07 ThinkCentre-M900 kernel: audit: type=1400 audit(1464785297.366:491): apparmor="DENIED" operation="connect" info="Failed name lookup - disconnected path" error=-13 profile="/usr/lib/ipsec/charon" name="run/systemd/journal/dev-log" pid=4994 comm="charon" requested_mask="w" denied_mask="w" fsuid=0 ouid=0 ... ProblemType: Bug DistroRelease: Ubuntu 16.04 Package: strongswan 5.3.5-1ubuntu3 ProcVersionSignature: Ubuntu 4.4.0-22.40-generic 4.4.8 Uname: Linux 4.4.0-22-generic x86_64 NonfreeKernelModules: wl ApportVersion: 2.20.1-0ubuntu2.1 Architecture: amd64 CurrentDesktop: Unity Date: Wed Jun 1 23:06:53 2016 InstallationDate: Installed on 2016-05-11 (21 days ago) InstallationMedia: Ubuntu 16.04 LTS "Xenial Xerus" - Release amd64 (20160420.1) PackageArchitecture: all SourcePackage: strongswan UpgradeStatus: No upgrade log present (probably fresh install)
-- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1587886 Title: strongswan ipsec status issue with apparmor To manage notifications about this bug go to: https://bugs.launchpad.net/hundredpapercuts/+bug/1587886/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs