home bbs files messages ]

Forums before death by AOL, social media and spammers... "We can't have nice things"

   linux.debian.bugs.dist      Ohh some weird Debian bug report thing      28,835 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 28,786 of 28,835   
   intrigeri to All   
   Bug#1128767: /etc/apparmor.d/usr.bin.evi   
   24 Feb 26 16:50:01   
   
   From: intrigeri@riseup.net   
      
   Hi,   
      
   Simon McVittie (2026-02-22):   
   > I'm now questioning whether the benefit of the AppArmor profile is worth    
   > its cost.   
      
   Thank you for asking and thanks a lot for the summary!   
      
   This resonates a lot: in the last few years I've been leaning more and   
   more towards answering "no". I think it might be time to let go and   
   drop the AppArmor profiles that have a non-trivial maintenance cost,   
   while comparatively providing little¹ meaningful security benefit.   
      
   If maintainers choose to drop this kind of AppArmor profiles from   
   their packages, I will understand and fully support their decision.   
      
   [1] I'm writing "little" and not "no" because I'm not 100% convinced   
       these sandbox escapes make the profiles entirely useless:   
       I understand the existing policy raises the bar from "I've   
       exploited poppler, now I have arbitrary code execution" to "I've   
       exploited poppler, now I need to figure out which sort of sandbox   
       the apps that uses the library is running in, and I have to   
       implement the adequate sandbox escape". I suppose some adversaries   
       are happy to pay this cost if this gives them access to high-value   
       targets, who are known to use a given app or OS, so they'll   
       happily adjust their exploit accordingly; while for some other   
       adversaries, it's not worth the effort, considering all the less   
       protected targets that are available elsewhere.   
      
      
   For extra context, my previous hopes for using AppArmor for meaningful   
   confinement of desktop apps, and in particular GTK apps since I've   
   been focused on those much more closely, were based on the hope that   
   a few things would happen quickly enough. Off the top of my head, this   
   included:   
      
    - Fine-grained D-Bus confinement becomes available at a time when   
      there's a healthy dynamics to collaboratively maintain AppArmor   
      policy cross-distro.   
      
      (D-Bus support is finally coming, hopefully in Forky. And for   
      policy maintenance, https://github.com/roddhjav/apparmor.d/ is the   
      new thing that gives me some hope back, but it's a huge and complex   
      beast, I don't know if anyone has figured out how to use this as   
      a distribution.)   
      
    - GTK apps installed from Debian can be easily instructed to behave   
      essentially as if they were running via Flatpak, i.e. using Portals   
      for everything relevant, no direct dconf access, etc., so that we   
      can ship much stricter AppArmor policy in Debian packages.   
      
      (We've experimented with the idea in Tails, starting with the   
      obvious GTK_USE_PORTAL=1, quickly faced limitations that were   
      blockers for us, and ended up running some apps as "fake" Flatpak   
      apps with flatpak-run(1), using our underlying SquashFS as the   
      runtime. This hack works fine for our particular use case, but it's   
      probably not worth generalizing to a context like Debian.   
      
      I'm not complaining: I did not invest any effort into resolving the   
      root causes in GNOME land. My guess is that there would be little   
      interest upstream, and frankly, I find the expected rebuttal pretty   
      convincing: "why don't you just install the app from   
      Flathub then?")   
      
    - Safer accessibility frameworks become the norm   
      
    - AppArmor being enabled by default in Debian raises interest in   
      working on things like the above, as a way to protect our users   
      better, while sparing us the discussion, design & implementation   
      work required to change in depth how we distribute apps.   
      
      
   Cheers,   
   --    
   intrigeri   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca