On 8/8/15, intrigeri <intrig...@boum.org> wrote:
> Hi,
>
> Jacob Appelbaum wrote (07 Aug 2015 12:33:10 GMT) :
>> If you hard link a file say, /home/amnesia/.gnupg/secring.gpg into
>> ~/Tor Browser/secring.gpg - you can read it with Tor Browser. AppArmor
>> uses file paths to constrain things. That second file path is allowed
>> by the sandbox, even though the file is also "outside" of that path,
>> AppArmor has no clue.
>
> Right, thanks for refreshing my memories :)

Sure thing.

>
>> Reading the policy for Tor Browser on Tails 1.4.1 - I see the
>> following relevant entries:
>> [...]
>> Note that none of those include the flag "l" - which is what is
>> required to make a hard link. That was why I said "until an attacker
>> figures out how to make a hard link"; if such a hardlink were made,
>> they'd be able to read the contents of the linked file. That is all
>> that I meant with my comment. AppArmor is useful but has some rough
>> edges.
>
> OK. I've filed https://labs.riseup.net/code/issues/9949 about it, and
> after an initial evaluation of our current AppArmor policy, it seems
> everything is good... except the I2P confinement, but that one is
> still WIP (#7724), and the version we currently ship should merely be
> regarded as a technology preview, that's only marginally better
> than nothing.
>

Ok.

> It would be awesome if someone double-checked my findings. E.g.
> the regexp I've used might be buggy and miss some problematic rules.
> Jacob, perhaps?
>

I wouldn't call it an audit but I agree with your initial findings.

All the best,
Jacob
_______________________________________________
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

Reply via email to