Novell LINUX ENTERPRISE DESKTOP 11 - SECURITY GUIDE 17-03-2009 Manual page 333

Hide thumbs Also See for LINUX ENTERPRISE DESKTOP 11 - SECURITY GUIDE 17-03-2009:
Table of Contents

Advertisement

• Network Access Control
• The SYS_PTRACE Capability
• Directory Path Access
The current version of AppArmor mediates file locking and introduces a new permission
mode (k) for this. Applications requesting file locking permission might misbehave or
fail altogether if confined by older profiles which do not explicitly contain permissions
to lock files. If you suspect this being the case, check the log file under /var/log/
audit/audit.log for entries like the following:
type=APPARMOR_DENIED msg=audit(1188913493.299:9304): operation="file_lock"
requested_mask="::k" denied_mask="::k" fsuid=1000
name="/home/tux/.qt/.qtrc.lock" pid=25736 profile="/usr/bin/opera"
Update the profile using the YaST Update Profile Wizard or the aa-logprof com-
mand as outlined below.
The new network access control syntax based on the network family and type specifi-
cation, described in
Section 21.5, "Network Access Control"
application misbehavior or even stop applications from working. If you notice a network-
related application behaving strangely, check the log file under /var/log/audit/
audit.log for entries like the following:
type=APPARMOR_DENIED msg=audit(1188894313.206:9123): operation="socket_create"
family="inet" sock_type="raw" protocol=1 pid=23810 profile="/bin/ping"
This log entry means that our example application, /bin/ping in this case, failed to
get AppArmor's permission to open a network connection. This permission has to be
explicitly stated to make sure that an application has network access. To update the
profile to the new syntax, use the YaST Update Profile Wizard or the aa-logprof
command as outlined below.
The current kernel requires the SYS_PTRACE capability, if a process tries to access
files in /proc/pid/fd/*. New profiles need an entry for the file and the capability
where old profiles only needed the file entry. For example:
/proc/*/fd/**
rw,
in the old syntax would translate to the following rules in the new syntax:
(page 205), might cause
Support
321

Advertisement

Table of Contents
loading

This manual is also suitable for:

Suse linux enterprise desktop 11

Table of Contents