This bug was fixed in the package lxc-android-config - 0.226
---
lxc-android-config (0.226) wily; urgency=medium
[ Ricardo Salveti de Araujo ]
* etc/dbus-1/system.d/wpa_supplicant_touch.conf: exporting
SetInterfaceFirmware to the phablet user, so it can be used to
enable
** Branch linked: lp:~ken-vandine/ubuntu/wily/lxc-android-
config/wifi_hotspot_fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1426923
Title:
Allow ubuntu-system-settings to set a device's
In silo 13.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1426923
Title:
Allow ubuntu-system-settings to set a device's firmware
To manage notifications about this bug go to:
** Package changed: wpasupplicant (Ubuntu) = lxc-android-config
(Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1426923
Title:
Allow ubuntu-system-settings to set a device's firmware
To
policykit doesn't give you much more over the bus policy as described
here for a single user system, since the policykit configuration would
also simply allow access to SetInterfaceFirmware without password. It
can give you more protection for remote shells (ssh or exploit in
installed software--
Adding
policy user=phablet
allow send_destination=fi.w1.wpa_supplicant1
send_interface=org.freedesktop.DBus.Introspectable
send_member=Introspect
send_type=method_call
From comment #2: Considering the current policy with NM and the phablet
user on Touch, I think it is tolerable to give the phablet user the
ability to use SetInterfaceFirmware(). This dbus bus policy does this
and so it is 'ok'.
That said, it is rather inflexible, is touch-specific and does not
@Jamie
I asked Alfosno to prototype granting access with a DBus configuration
change alone as proof-of-concept. Note, as the script we've been using
for testing is a Python script, the Introspectable fragment was
needed. As system settings is Qt-based, this may not be needed. We'll
need Jonas
** Changed in: wpasupplicant (Ubuntu)
Importance: Undecided = High
** Changed in: wpasupplicant (Ubuntu)
Assignee: (unassigned) = Alfonso Sanchez-Beato (alfonsosanchezbeato)
** Changed in: wpasupplicant (Ubuntu)
Status: Confirmed = In Progress
--
You received this bug
** No longer affects: indicator-network (Ubuntu)
** Summary changed:
- Allow ubuntu-system-settings to set a device's firmware through the private
Connectivity API
+ Allow ubuntu-system-settings to set a device's firmware
** Description changed:
Background:
To do Wi-Fi hotspots on
** Changed in: wpasupplicant (Ubuntu)
Status: Invalid = Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1426923
Title:
Allow ubuntu-system-settings to set a device's firmware
To
Yikes, sorry for just getting back to this now.
1. NetworkManager polkit allows full access to sudo: I assume you meant
that the decision was taken *before* we had proper polkit support on the
phone?
AFAIK, we don't have polkit prompting on the phone still. It doesn't
really matter-- we don't
** Also affects: indicator-network (Ubuntu)
Importance: Undecided
Status: New
** Changed in: wpasupplicant (Ubuntu)
Status: New = Invalid
** Summary changed:
- Allow ubuntu-system-settings to set a device's firmware through wpa_supplicant
+ Allow ubuntu-system-settings to set a
Thanks for the feedback Jamie!
A couple of comments in return...
1. NetworkManager polkit allows full access to sudo: I assume you meant
that the decision was taken *before* we had proper polkit support on the
phone?
2. urfkill polkit - allows active seat to call Block: The policy also
allows
Jonas asked me to take a look at the security implications of this. Some
observations:
* on touch,
/var/lib/polkit-1/localauthority/10-vendor.d/com.ubuntu.touch.NetworkManager.pkla
allows anyone in the 'sudo' group to access all of NetworkManager. This is not
ideal but was the decision taken
** Also affects: wpasupplicant (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1426923
Title:
Allow ubuntu-system-settings to set a device's
** No longer affects: dbus (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1426923
Title:
Allow ubuntu-system-settings to set a device's firmware through
wpa_supplicant
To manage
I'm currently only succeeding with the following policy:
policy user=jonas
allow send_destination=fi.w1.wpa_supplicant1/
allow receive_sender=fi.w1.wpa_supplicant1/
/policy
Being more specific, e.g. adding interface and send_member, gives me
errors
** Description changed:
Background:
- AP hotspots are currently provisioned like this [1]. I don't precisely know
why we need to poke the driver, but AP hotspots on krillin fails without it.
+ To do Wi-Fi hotspots on krillin, we need to poke wifi by doing a call to
wpa_supplicant's
19 matches
Mail list logo