Activity log for bug #1278859

Date Who What changed Old value New value Message
2014-02-11 13:00:49 Alberto Mardegan bug added bug
2014-02-11 14:05:08 Jamie Strandboge description Online Accounts can be extended with new account providers and services provided in click packages. A click hook will install these files in the correct place under ~/.local/share/accounts/{provider,services}/ . Indeed, click applications should be able to use the account they install, so they need read access to these directories (the "accounts" apparmor template already gives access to the system locations: "/usr/share/accounts/** r,"). Therefore, I'd like to suggest adding the following line to the apparmor "accounts" template: @{HOME}/.local/share/accounts/** r, (I tested my click application with this line added, and it solved the problem) Ideally, though, we would like that these files were readable only by those applications which installed them: that is, if a click package ships an application and an Online Account service, we'd like only this application to be able to access the file. Given that these files are installed under ~/.local/share/accounts/ as symlinks, I was expecting that apparmor would check the access also on the symlink target file, but that doesn't seem to be the case. This is not a critical issue, but if you can think of some way to achieve what we want, that'd be super. :-) Online Accounts can be extended with new account providers and services provided in click packages. A click hook will install these files in the correct place under ~/.local/share/accounts/{provider,services}/ . Indeed, click applications should be able to use the account they install, so they need read access to these directories (the "accounts" apparmor template already gives access to the system locations: "/usr/share/accounts/** r,"). Therefore, I'd like to suggest adding the following line to the apparmor "accounts" template:     owner @{HOME}/.local/share/accounts/** r, Given that these files are installed under ~/.local/share/accounts/ as symlinks, this means that apps will dereference the symlinks in this directory to access their own accounts provider (which is in an app-specific directory). This is not an information leak on its own because users of this policy group have read access to accounts.db.
2014-02-11 14:05:16 Jamie Strandboge tags application-confinement
2014-02-11 14:05:21 Jamie Strandboge apparmor-easyprof-ubuntu (Ubuntu): status New In Progress
2014-02-11 14:05:24 Jamie Strandboge apparmor-easyprof-ubuntu (Ubuntu): assignee Jamie Strandboge (jdstrand)
2014-02-12 15:18:30 Jamie Strandboge apparmor-easyprof-ubuntu (Ubuntu): importance Undecided High
2014-02-12 21:48:47 Launchpad Janitor branch linked lp:ubuntu/trusty-proposed/apparmor-easyprof-ubuntu
2014-02-12 22:27:59 Launchpad Janitor apparmor-easyprof-ubuntu (Ubuntu): status In Progress Fix Released