scottslowe, to facepalm
@scottslowe@fosstodon.org avatar

Tip of the day: when troubleshooting profiles, don't forget to reload the profile with apparmor_parser every time you make a change to the profile.

Not that I'm speaking from personal experience or anything...

opensuse, to security
@opensuse@fosstodon.org avatar

In less than 30 minutes, you can watch a about switching from to . What are some successes, challenges & future expectations? Find out by watching. https://www.youtube.com/live/4uHmAiluDFo?si=-x0W2GPH71b-CI-C

zygoon, to random
@zygoon@fosstodon.org avatar

The working branch of my userspace parser for binary profiles that are usually parsed by the kernel can now parse any profile I throw at it.

I don't do the DFA unpacking and analysis yet but given that I'm stuck at home (extreme allergy to whatever is in the air recently) I think I will get to that today.

I've been working on improving visibility into what apparmor_parser compiles by effectively de-compiling it back to human-readable data.

The code is up on
https://gitlab.com/zygoon/go-apparmor

nafmo, to debian
@nafmo@vivaldi.net avatar

I don't seem to have enough google-fu to solve this myself: On my installations, is full of logs for . Almost all of them are "ALLOW" entries, which seems completely irrelevant.

Is there a way to get AppArmor not to spam dmesg with messages? I can't find any settings about the amount of log messages in the AppArmor manual page or documentation.

ubuntusecurity, to ubuntu
@ubuntusecurity@fosstodon.org avatar

In this weeks episode of the Security Podcast unprivileged user namespace restrictions are back on the agenda as we survey the latest improvements to this hardening feature in the upcoming Ubuntu 24.04 LTS, plus we discuss SMTP smuggling in Postfix, runC container escapes and Qualys’ recent disclosure of a privilege escalation exploit for GNU libc and more https://ubuntusecuritypodcast.org/episode-218/

governa, to linux
@governa@fosstodon.org avatar

Switches To SHA256 Policy Hashes In 6.8

https://www.phoronix.com/news/AppArmor-Linux-6.8

sharedmuffins, to debian

Dear Debian, please add and enforce AppArmor profiles for important programs such as Mozilla Firefox and LibreOffice.

mxk, to linux
@mxk@hachyderm.io avatar

Given the drive towards using selinux or apparmor more within Linux, I really would be grateful, if applications could actually check, what path exists and not try to open 32 paths in /dev/ just in case they exist.
The same applies to linkers, who don't look into folders, but instead blindly try to open files, which might never exist.
This type of behavior creates a lot of noise and clutter and makes it hard to restrict the access of applications.

roddhjav, to random

Thanks again to @ubuntu for organizing the . It was an honor to me to have presented a talk about building large set of profiles

https://events.canonical.com/event/31/contributions/209/

image/png
image/jpeg

mxk, to linux
@mxk@hachyderm.io avatar

Is there any human readable documentation on how the binary format of works?
I try to figure out, if patching files to have the FORCE_COMPLAIN mode active, without having the play text version is feasible

governa, to random
@governa@fosstodon.org avatar

Adds IO_uring Mediation & Some Performance Optimizations

https://www.phoronix.com/news/Linux-6.7-AppArmor

sonny, (edited ) to linux
@sonny@floss.social avatar

GNOME is shaping up really nicely for privacy

• Background App indicator
• App permissions
• Device Security Settings
• Mic / Camera* indicators
• Screen Sharing indicator
• Remote Desktop indicator
• Location indicator
• Incrementally better app sandboxing
• VPN (incl Wireguard) support
• Quick Network Toggles

Made possible by and our talented community.

  • Available in the upcoming GNOME 45 release
chfkch,
@chfkch@ruhr.social avatar

@sonny
App permissions like or something? Sounds interesting.
Very much needed for aswell.

michelamarie, to debian

Hi, friends! Do any of you run Debian with ? If so, what is your experience like? What are some common issues to watch for?

I see that the Debian kernel supports SELinux, and there is some good documentation for it in the Debian handbook, but it does not seem to be commonly used with the OS ( seems much more common with Debian). So my main concern is that using it in Debian may be unpredictable or more of a challenge than with distributions that use SELinux by default.

michelamarie,

The background for my question is that my workplace mainly runs Red Hat variants, and we are very likely gradually changing our fleet to Debian. So I’m comfortable with SELinux, and I prefer its ‘deny everything by default’ approach over making and carefully testing profiles for individual applications.

I’ve spent quite a bit of time with lately, and it’s good, but there aren’t many ‘official’ profiles for it, and making new ones for some applications can be a real challenge.

roddhjav, to random

The video of my talk on @LinuxSecSummit is available

Warning: really cute French accent included 😄

https://www.youtube.com/watch?v=OzyalrOzxE8

roddhjav, to random

Sometime I release stuff to the world 😄

Here is apparmor.d https://github.com/roddhjav/apparmor.d

A set of over 1500 profiles that can be used to confine most Linux base applications and processes

Have a look at it, it is still in development but it looks promising

  • All
  • Subscribed
  • Moderated
  • Favorites
  • anitta
  • InstantRegret
  • mdbf
  • ngwrru68w68
  • magazineikmin
  • thenastyranch
  • rosin
  • khanakhh
  • osvaldo12
  • Youngstown
  • slotface
  • Durango
  • kavyap
  • DreamBathrooms
  • JUstTest
  • tacticalgear
  • ethstaker
  • provamag3
  • cisconetworking
  • tester
  • GTA5RPClips
  • cubers
  • everett
  • modclub
  • megavids
  • normalnudes
  • Leos
  • lostlight
  • All magazines