mirror of
https://github.com/token2/snapd.git
synced 2026-03-13 11:15:47 -07:00
Newer versions of Qt use socket(AF_NETLINK, SOCK_DGRAM, NETLINK_ROUTE) instead of socket(AF_INET, SOCK_STREAM, IPPROTO_IP) with ioctls in order to obtain interface addresses. AppArmor's nameservice allows 'network netlink raw' for this sort of thing, but 'man 7 netlink' states that "Both SOCK_RAW and SOCK_DGRAM are valid values for socket_type. However, the netlink protocol does not distinguish between datagram and raw sockets". It is therefore a bug in the AppArmor abstraction that it is missing, so add it here. References: https://forum.snapcraft.io/t/auto-connection-request-for-moonlight-network-observe/17576/9
109 lines
4.0 KiB
Go
109 lines
4.0 KiB
Go
// -*- Mode: Go; indent-tabs-mode: t -*-
|
|
|
|
/*
|
|
* Copyright (C) 2016 Canonical Ltd
|
|
*
|
|
* This program is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License version 3 as
|
|
* published by the Free Software Foundation.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*
|
|
*/
|
|
|
|
package builtin
|
|
|
|
const networkBindSummary = `allows operating as a network service`
|
|
|
|
const networkBindBaseDeclarationSlots = `
|
|
network-bind:
|
|
allow-installation:
|
|
slot-snap-type:
|
|
- core
|
|
`
|
|
|
|
// http://bazaar.launchpad.net/~ubuntu-security/ubuntu-core-security/trunk/view/head:/data/apparmor/policygroups/ubuntu-core/16.04/network-bind
|
|
const networkBindConnectedPlugAppArmor = `
|
|
# Description: Can access the network as a server.
|
|
#include <abstractions/nameservice>
|
|
/run/systemd/resolve/stub-resolv.conf rk,
|
|
network netlink dgram, # not yet included in the nameservice abstraction
|
|
|
|
# systemd-resolved (not yet included in nameservice abstraction)
|
|
#
|
|
# Allow access to the safe members of the systemd-resolved D-Bus API:
|
|
#
|
|
# https://www.freedesktop.org/wiki/Software/systemd/resolved/
|
|
#
|
|
# This API may be used directly over the D-Bus system bus or it may be used
|
|
# indirectly via the nss-resolve plugin:
|
|
#
|
|
# https://www.freedesktop.org/software/systemd/man/nss-resolve.html
|
|
#
|
|
#include <abstractions/dbus-strict>
|
|
dbus send
|
|
bus=system
|
|
path="/org/freedesktop/resolve1"
|
|
interface="org.freedesktop.resolve1.Manager"
|
|
member="Resolve{Address,Hostname,Record,Service}"
|
|
peer=(name="org.freedesktop.resolve1"),
|
|
|
|
#include <abstractions/ssl_certs>
|
|
|
|
# These probably shouldn't be something that apps should use, but this offers
|
|
# no information disclosure since the files are in the read-only part of the
|
|
# system.
|
|
/etc/hosts.deny r,
|
|
/etc/hosts.allow r,
|
|
|
|
@{PROC}/sys/net/core/somaxconn r,
|
|
@{PROC}/sys/net/ipv4/ip_local_port_range r,
|
|
|
|
# LP: #1496906: java apps need these for some reason and they leak the IPv6 IP
|
|
# addresses and routes. Until we find another way to handle them (see the bug
|
|
# for some options), we need to allow them to avoid developer confusion.
|
|
@{PROC}/@{pid}/net/if_inet6 r,
|
|
@{PROC}/@{pid}/net/ipv6_route r,
|
|
|
|
# java apps attempt this, presumably to handle interface changes, but a
|
|
# corresponding seccomp socket rule is required to use netlink. When
|
|
# fine-grained netlink mediation is implemented (LP: #1669552), we can perhaps
|
|
# allow 'read' with NETLINK_ROUTE, but for now we omit it here and don't
|
|
# explicitly deny this noisy denial so --devmode isn't broken. LP: #1499897
|
|
#deny network netlink dgram,
|
|
`
|
|
|
|
// http://bazaar.launchpad.net/~ubuntu-security/ubuntu-core-security/trunk/view/head:/data/seccomp/policygroups/ubuntu-core/16.04/network-bind
|
|
const networkBindConnectedPlugSecComp = `
|
|
# Description: Can access the network as a server.
|
|
accept
|
|
accept4
|
|
bind
|
|
listen
|
|
# TODO: remove this rule once seccomp errno with logging is implemented.
|
|
# java apps attempt this, presumably to handle interface changes, but a
|
|
# corresponding AppArmor rule is required (eg, network netlink dgram) to use
|
|
# netlink. We allow it here but not network-bind policy for AppArmor since java
|
|
# falls back gracefully when faced with an EPERM. Without this rule, the
|
|
# application would be KILLed due to our default seccomp policy.
|
|
socket AF_NETLINK - NETLINK_ROUTE
|
|
`
|
|
|
|
func init() {
|
|
registerIface(&commonInterface{
|
|
name: "network-bind",
|
|
summary: networkBindSummary,
|
|
implicitOnCore: true,
|
|
implicitOnClassic: true,
|
|
baseDeclarationSlots: networkBindBaseDeclarationSlots,
|
|
connectedPlugAppArmor: networkBindConnectedPlugAppArmor,
|
|
connectedPlugSecComp: networkBindConnectedPlugSecComp,
|
|
})
|
|
}
|