On 07/01/2017 04:41 PM, John Johansen wrote:
> On 07/01/2017 12:17 AM, Vincas Dargis wrote:
>> 2017.07.01 00:56, John Johansen wrote:
>>> For a tighter policy where enumerating other application etc is not
>>> allowed then we would want to block access. I don't think we can do
>>> that well with applications like firefox until support for delegation
>>> lands.
>>
>> Interesting, what is this mentioned "delegation" ?
>>
> 
> Delegation will allow an application to delegate some of its authority
> (permissions) to other confined task.
> 
> So for example an external file picker could be used to allow the user to
> choose files, and then delegate that access to firefox, so that the firefox
> profile does not need to be given broad access to the users directory.
> 
> For various reasons stacking (think of it as the intersection of profiles
> and hence a way to reduce permissions) has had to land first. That has largely
> happened (4.13 will have most of what is needed) and hopefully the remaining
> issues will be landed by 4.14.
> 
So just to flesh the answer out a little bit more, the documentation is
still very much a wip

stacking is very much intertwined with how apparmor is using policy
namespaces, so you will notice a fair bit of cross referencing between
the documentation of each
http://wiki.apparmor.net/index.php/AppArmorStacking

The delegation documentation is a lot rougher but there is start at
http://wiki.apparmor.net/index.php/AppArmorDelegation

-- 
AppArmor mailing list
AppArmor@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/apparmor

Reply via email to