Hi Laurent & everyone else who's listening!

Laurent Bigonville:
> Le 03/09/17 à 13:01, intrigeri a écrit :
>> Laurent Bigonville:
>>> IMVHO, in regard to the recent proposal of enabling apparmor in debian
>>> by default, this needs to be addressed first.
>> I'm genuinely curious why this should be a blocker for Debian: this is
>> not obvious to me as a number of distros could enable AppArmor by
>> default and can apparently live with this bug.
>>
>> Can you please make it explicit, e.g. describing what exact use cases
>> would be harmed by enabling AppArmor by default without fixing this
>> bug first?

> I think that having the denials of a MAC properly logged is important for 
> both people
> developing their policy and also for intrusion/non conformity detection.

> If someone wants to send their logs to some logging services (ELK/splunk/...) 
> having
> the messages properly logged/categorized seems to be the start here.

I see, thanks for the explanation! I agree it's important and I'm sad
this bug makes AppArmor look a bit rough around the edges (because
that doesn't correctly reflect my experience as a user, sysadmin and
distro maintainer).

I'll look closer at each of these use cases from the "what would we
*break* if we enabled AppArmor by default" perspective:

 * people developing their own AppArmor policy: 100% of the existing
   AppArmor policy was developed without proper audit event IDs;
   I'll be happy to give ausearch(8) a try once AppArmor does the
   right thing, but so far I can very well live without it.

   ⇒ from a user-centric perspective, I don't see why this bug would
   be a blocker as far as this use case is concerned.

 * intrusion detection: the current state of things in Debian (no MAC
   framework enabled by default) does not give any such capability to
   system administrators; the proposal of enabling AppArmor by default
   does not pretend it'll magically give this bonus feature.

   ⇒ AppArmor improves other things, just not this one, or at least
   not in an ideal way; too bad, but I don't see why this limitation
   would be a blocker.

 * centralized logging: enabling AppArmor by default will generate
   audit events; if nothing improves on this front, they'll be
   erroneously tagged type=1400 and thus might land into a SELinux
   bucket or similar by mistake, which can be confusing for sysadmins
   who also run SELinux-enabled systems, and even more so once one can
   stack SELinux and AppArmor.

   ⇒ I understand there *is* definitely potential for painful impact
   here. We'll need to keep an eye on this when evaluating "AppArmor
   by default in Buster?" 1 year after it's been enabled by default
   (as per my proposal on -devel@). But I bet this bug would have been
   fixed a while ago if it was a serious problem in practice:
   apparently, tons of Ubuntu and SUSE sysadmins have apparently
   managed to cope with this bug just fine for many years.

So I see very little ground for arguing this bug is a blocker for
enabling AppArmor by default in testing/sid, and reconsidering a year
later — after all, it's one of the purposes of the evaluation
exercises: nobody claims AppArmor is perfect, and what's at stake is
rather whether it brings more value than costs for Debian and its
users. The best, the good, enemies, etc. :)

If I misunderstood something, sorry! I'm all ears.

Cheers,
-- 
intrigeri

Reply via email to