Novell Open Sources AppArmor 14
Crispin Cowan writes "Novell has announced the release of their AppArmor security system into open source. AppArmor is an application security system that confines programs, enforcing that they are permitted to do only what they are supposed to do, and nothing else. AppArmor is an LSM module that is an alternative to SELinux, but arguably much easier to use. Now in open source, AppArmor is included with every SUSE Linux distro, including openSUSE."
Translation please (Score:5, Interesting)
But I suspect most of us will still need someone to put some things in plain English. I even read the "detailed description" and no go. Call me Dumbo.
*Is it kernel space or userspace?
*What's with those "3rd party config files"? If we wait for [all the] apps to catch up, good luck. See how "widely" the user home config file spec from FDO was implemented, and that one needs just an effort of good will.
*Isn't it a bit strange to let a 3rd app specify its own security config on YOUR machine's context?
*What exactly do they mean by "easy to use"? No, miles long text files where you have to write down what files each program can access are not "easy to use".
Re:Translation please (Score:2)
Re:Translation please (Score:5, Informative)
I'd guess, some userspace tools to do the setting, but the security (enforcement of those rules) has to be implemented in kernel space
*What's with those "3rd party config files"? If we wait for [all the] apps to catch up, good luck. See how "widely" the user home config file spec from FDO was implemented, and that one needs just an effort of good will.
For AppArmor it would already help to do the configuration for the most exposed programs, e.g. mail client, ftp server, browser, etc.
*Isn't it a bit strange to let a 3rd app specify its own security config on YOUR machine's context?
Why? Most people install software as root without a blink. The default properties (e.g. does the ftp server run as root or does it get it's own user ID) are set by the package maintainer. People with knowledge can tweak the settings to match their standards, but per default the package maintainer maintained already security relevant default settings. Strange would it be if the user couldn't change the settings anymore.
*What exactly do they mean by "easy to use"? No, miles long text files where you have to write down what files each program can access are not "easy to use".
I didn't read everyhing about it, but as far as I got it, easy to use means:
You can configure a single application without the need of configuring the whole system
Profiling tools are available to track what an application does, so if You trust Your application for an evaluation period You could build a ruleset from the actions the application was required to perform during the test run
Re:Translation please (Score:5, Informative)
You do not have to "wait for all the apps to catch up." Anyone can create a profile for an application, all you need is a decent use case for the application. You do not need to modify the application at all.
IMHO, it is not so strange that the security policy for an application comse from the provider of the application. Consider that without AppArmor, you are completely trusting the application provider, because the application can do absolutely anything the invoking user can do. Providing an AppArmor profile means that you have an explicit declaration of what the application is permitted to do.
You can even edit it to suit your taste, if you like. For instance, it annoys the crap out of me that Adobe Acrobat actually supports embedded Javascript inside PDF documents. This annoys me because vendors embed Javascript inside documents that act like web-bugs, reporting back to the vendor each time you open the document! Eww! So the Acrobat profile on my personal workstation has been hacked to not provide access to Javascript libraries to the Acrobat program, thus depriving spyware PDF files of the opportunity to execute and squeel on me.
Crispin
The license will be GNU GPL (Score:2, Informative)
Re:The license will be GNU GPL (Score:1)
That says a lot about its capabilities & usabi (Score:2)
That says you can use it - for any purpose, and it's capable of being studied, modified, patched, forked, audited, etc. [compsoc.com]
Managed runtime? (Score:2)
Re:Managed runtime? (Score:2)
You can run your apps under qemu if you want, I however will go with the security module. All those apps are already compiled to the bytecode interpreted by some CPU, so your managed runtime needs to jit compile that as if it were an IL (intermediate language).
Also, nowadays low-level languages like the intel architecture 32 and amd64 i
Useful for TC (Score:2)