[Pkg-dns-devel] Bug#882731: Bug#882731: apparmor policy only accepts root.key in /var/lib/unbound

Robert Edmonds edmonds at debian.org
Tue Jan 30 20:40:01 UTC 2018


Simon Deziel wrote:
> On 2017-11-27 09:22 AM, Peter Palfrader wrote:
> > On Mon, 27 Nov 2017, Simon Deziel wrote:
> > 
> >> On 2017-11-26 03:31 AM, Peter Palfrader wrote:
> >>> The apparmor policy for unbound allows access to
> >>> /var/lib/unbound/root.key*, but it does not allow access to any
> >>> other dynamically updated key the admin might have put there,
> >>> such as debian.org.key on DSA infrastructure.
> >>>
> >>> Please allow access to all key files.
> >>
> >> Please see the attached patch.
> > 
> >>    # chrooted paths
> >>    /var/lib/unbound/** r,
> >> +  owner /var/lib/unbound/*.key* rw,
> >>    owner /var/lib/unbound/**/*.key* rw,
> > 
> > This would allow /var/lib/unbound/root.key "twice", once via root.key,
> > once via *.key.
> 
> Indeed, this patch should be better, thanks Peter.

Hi,

I'm a little bit confused here. The unbound daemon runs as user
'unbound', thus it should have read-write permission to the directory
/var/lib/unbound/, because that's what the permission on the directory
is. Is the apparmor policy intentionally overriding this?

There's no requirement that an auto-trust-anchor-file be configured with
a filename that ends in ".key". Does the apparmor policy break unbound
if a sysadmin doesn't follow this convention?

-- 
Robert Edmonds
edmonds at debian.org



More information about the pkg-dns-devel mailing list