[pkg-apparmor] APT 1.1~exp3 released to experimental: First step to sandboxed fetcher methods
Julian Andres Klode
jak at debian.org
Tue Oct 7 13:46:46 UTC 2014
(Adding deity at l.d.o to CC)
On Tue, Oct 07, 2014 at 03:37:54PM +0200, intrigeri wrote:
> Hi,
>
> > Today, we worked, with the help of ioerror on IRC, on reducing the
> > attack surface in our fetcher methods.
>
> \o/
>
> > There are three things that we looked at:
>
> > 1. Reducing privileges by setting a new user and group
> > 2. chroot()
> > 3. seccomp-bpf sandbox
>
> I'm part of the Debian AppArmor team (Cc'd).
>
> Would it be interesting to have AppArmor profiles that ensure that
> e.g. the download methods can only access the files they are supposed
> to access? (I don't have the APT privilege separation big picture
> in mind.)
Sure. Feel free to work on it :)
With the next release it will look like this:
As root: Methods can write to
/var/lib/apt/lists/partial
/var/cache/apt/archives/partial
Sometimes, they also write to directories in /tmp (changelog fetching for
example); and there's apt-get download which downloads to the current
directory.
There might be some other corner cases I am not aware of.
--
Julian Andres Klode - Debian Developer, Ubuntu Member
See http://wiki.debian.org/JulianAndresKlode and http://jak-linux.org/.
Be friendly, do not top-post, and follow RFC 1855 "Netiquette".
- If you don't I might ignore you.
More information about the pkg-apparmor-team
mailing list