|
Bugzilla – Full Text Bug Listing |
| Summary: | SuSE 10.0 (and not only) supply kernels with no support for grsecurity nor even PaX & w/ this AppArmor is enabled for only some apps. :/ | ||
|---|---|---|---|
| Product: | [openSUSE] openSUSE 11.0 | Reporter: | Olli Artemjev <grey-olli> |
| Component: | AppArmor | Assignee: | Security Team bot <security-team> |
| Status: | RESOLVED WONTFIX | QA Contact: | E-mail List <qa-bugs> |
| Severity: | Enhancement | ||
| Priority: | P3 - Medium | CC: | dazzle.digital, grey-olli, meissner, suse-beta |
| Version: | Alpha 2 | Keywords: | Common_Criteria, documentation, security, Usability |
| Target Milestone: | --- | ||
| Hardware: | i686 | ||
| OS: | SuSE Linux 10.0 | ||
| Whiteboard: | |||
| Found By: | Customer | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
Olli Artemjev
2006-02-19 23:12:16 UTC
AppArmor is nice thing anyway. I like it. Is it possible to 've it w/ parts or all of PaX/grsec stuff? :? It is more a security/AppArmor issue. first, we do not include PAX / grsecurity for various reasons: - its not in the mainline kernel. maintaining such intrusive patches of this kind is very expensive and we decide not to - address space randomization is merged from the mainline kernel to some degree and will continued to be merged specifically MMAP randomization is already part of 10.1 on some platforms - we are of course planning to enhance kernel security in the future, but step by step. as for more apparmor profiles. we ship a lot of profiles, but only some of them are enabled. the reason for this is that we want to make absolutely sure that our profiles cover _all_ use scenarios. so this is mostly a coverage problem. Additional profiles are in /etc/apparmor/extra/profiles/ , you can move them to /etc/apparmor.d/ or so. So in general ... security work is ongoing and we are aware of those developments. Olli. 1. In future please file one bug per problem. 2. As far as AppArmor profiles are concerned, we welcome additions to the profiles that are in the extra directory. AppArmor tools (logprof/genprof) can be used to customise these profiles and you are welcome to submit updates/additions. One mechanism for doing this is by joining the AppArmor mailing lists (http://forge.novell.com/modules/xfmod/project/?apparmor). You will also find documentation there. Most of these docs should also ship in the SL/SLES documentation. 3. If you submit profile changes we would appreciate information on the use case that the change address. 4. If you have specific complaints you may of course open a bug here but please make it specific and targetted. Okay, thanks for info on additional profiles and dox - 'll study that. But there're still some questions: 1. Are there anyone who maintains alternate (not supported officially) version of kernel w/ all SuSE patches and with additionally the grsecurity or PaX applied? Are there any links for download? 2. If there's no such person - are there any interest in making that work together? I mean that I definitely need a grsecurity enabled kernel on my server at work and at my workstation at home. Thus I'll try to apply patches and look for possible rejects and try to fix that anyhow. Though I'd be glad to have a place to discuss this work and tests required - I'm not a professional programmer. If there's no adequate for that mailing list I may create a mailing list myself on some of my servers. Feel free to contact me at [ email olli <At> digger . org . ru ] about that. Anyway since there's an SESUSE page - there're some people already did some work in this way. I've added a folk from SESUSE page to CC list. 3. What's about interferring AppArmor and grsecurity/PaX - is it OK to discuss that in some AppArmor mailing list? BTW: are there an NNTP interface? (I've ipaq 1940 w/ a nice newsreader (didn't see a nice mail client though) - NNTP 'll allow me (and others) to post comments being on road. And are there any cumulative SuSE kernel patches dox/FAQs (see question 4. in 'Description') to get started w/? Well.. any comments on above questions? I'm about to try to apply grsec/pax stuff w/o blocking ability to use apparmor. If I'd get success are anyone interested in that result? I'm about to use resulting thing on my workstation & one of our servers, thus that will be tested well.. Regardiung comment #c6 1. Not at this time to our knowledge. 2. I don't know if there is interest for it ... You can ask on the suse-security mailinglist, or the opensuse@opensuse.org mailinglists for instancen. suse-security is the likely list for suse related security discussions here. 3. AppArmor should not interfere with grsecurity/PaX, or does the latter use its own LSM? This problem that 2 LSMs cannot be loaded at the same time is a generic problem and should probably be taken up to the mainline kernel folks. I don't know about a public NNTP interface. regarding #c7 README.SUSE as contained in the kernel-source packages explain how to add patches. (You basically can just add your patch to the patches.fixes tarball and to series.conf to get it applied.) #c8 again depends on if grsecurity uses an LSM (I dont know). enhancement request Nothing left for use to do AFAICS. The buildservice can nowadays be used to publish custom kernels. |