• Network Access Control
• The
SYS_PTRACE
Capability
• Directory Path Access
The current version of AppArmor mediates file locking and introduces a new permission
mode (
k
) for this. Applications requesting file locking permission might misbehave or
fail altogether if confined by older profiles which do not explicitly contain permissions
to lock files. If you suspect this being the case, check the log file under
/var/log/
audit/audit.log
for entries like the following:
type=APPARMOR_DENIED msg=audit(1188913493.299:9304): operation="file_lock"
requested_mask="::k" denied_mask="::k" fsuid=1000
name="/home/tux/.qt/.qtrc.lock" pid=25736 profile="/usr/bin/opera"
Update the profile using the YaST Update Profile Wizard or the
aa-logprof
com-
mand as outlined below.
The new network access control syntax based on the network family and type specifi-
cation, described in
Section 21.5, “Network Access Control”
(page 245), might cause
application misbehavior or even stop applications from working. If you notice a network-
related application behaving strangely, check the log file under
/var/log/audit/
audit.log
for entries like the following:
type=APPARMOR_DENIED msg=audit(1188894313.206:9123): operation="socket_create"
family="inet" sock_type="raw" protocol=1 pid=23810 profile="/bin/ping"
This log entry means that our example application,
/bin/ping
in this case, failed to
get AppArmor's permission to open a network connection. This permission has to be
explicitly stated to make sure that an application has network access. To update the
profile to the new syntax, use the YaST Update Profile Wizard or the
aa-logprof
command as outlined below.
The current kernel requires the
SYS_PTRACE
capability, if a process tries to access
files in
/proc/
pid
/fd/*
. New profiles need an entry for the file and the capability
where old profiles only needed the file entry. For example:
/proc/*/fd/**
rw,
in the old syntax would translate to the following rules in the new syntax:
Support
361
Summary of Contents for LINUX ENTERPRISE DESKTOP 11
Page 1: ...SUSE Linux Enterprise Server www novell com 11 March 17 2009 Security Guide...
Page 9: ...32 7 Managing Audit Event Records Using Keys 433 33 Useful Resources 435...
Page 10: ......
Page 29: ...Part I Authentication...
Page 30: ......
Page 55: ...Figure 4 2 YaST LDAP Server Configuration LDAP A Directory Service 41...
Page 126: ......
Page 127: ...Part II Local Security...
Page 128: ......
Page 158: ......
Page 173: ...Part III Network Security...
Page 174: ......
Page 194: ......
Page 197: ...Figure 16 2 Scenario 2 Figure 16 3 Scenario 3 Configuring VPN Server 183...
Page 210: ......
Page 228: ......
Page 229: ...Part IV Confining Privileges with Novell AppArmor...
Page 230: ......
Page 274: ......
Page 300: ......
Page 328: ......
Page 340: ......
Page 342: ......
Page 386: ......
Page 387: ...Part V The Linux Audit Framework...
Page 388: ......