Skip to content

Latest commit

 

History

History
346 lines (258 loc) · 11.6 KB

troubleshoot_security_confinement.md

File metadata and controls

346 lines (258 loc) · 11.6 KB

How to troubleshoot security confinement

The Ubuntu Pro client ships some services with these special security confinement features:

In the git repository, these are located at:

These security features restrict what the service can do on the system, and it's quite common that an application faced with unexpected "permission denied" errors, or unavailability of resources, will either crash or behave unexpectedly.

If you suspect the security confinement might be impacting these services, here are some troubleshooting tips.

Panic: disable everything

To completely remove the security features and verify if they are the cause of the problem you are troubleshooting, we have to disable the AppArmor confinement for that service, and remove the systemd security sandboxing features.

Do the following:

  1. Edit the systemd service unit file in /lib/systemd/system/<name>.service and remove or comment the AppArmorProfile line, and the security isolation lines.

    For example, for apt-news.service, this is what the minimal version of that file should look like:

      [Unit]
      Description=Update APT News
    
      [Service]
      Type=oneshot
      ExecStart=/usr/bin/python3 /usr/lib/ubuntu-advantage/apt_news.py
    

    For esm-cache.service, we would have:

      [Unit]
      Description=Update the local ESM caches
    
      [Service]
      Type=oneshot
      ExecStart=/usr/bin/python3 /usr/lib/ubuntu-advantage/esm_cache.py
    

    An alternative to removing AppArmorProfile from the unit file is to just disable it on the system, or put it in complain mode. See "Troubleshooting Apparmor" below for details.

  2. Reload the systemd units:

    sudo systemctl daemon-reload
    
  3. Use the service and observe if the problem you are troubleshooting is still there. If it's still there, then the security features are not the cause.

Troubleshooting Apparmor

The Apparmor profile for the confined service is loaded via the AppArmorProfile directive in the unit file /lib/systemd/system/<name>.service. For example, for apt-news.service:

  [Service]
  ...
  AppArmorProfile=-ubuntu_pro_apt_news

This will apply the specified AppArmor profile on service startup. If the profile does not exist, the service startup will fail in Pro client versions older than 31.2.2. In newer versions, that failure will be masked (see LP: #2057937 for details) and the service will run unconfined, i.e., without AppArmor protection.

The AppArmor profiles are located in the /etc/apparmor.d directory, and are loaded into the kernel at package install/upgrade time, or when the system boots. While the filename of the profile is an indication about its name, that's not mandatory: the actual name of the profile is defined inside the file.

To verify if the Apparmor profile is causing the issues you are observing, the first troubleshooting attempt should be to put it in "complain" mode. In that mode, it will allow everything, but log if something would have been blocked had the profile been in "enforce" mode.

To place the profile in complain mode, first install the apparmor-utils package, if it's not installed already:

  sudo apt install apparmor-utils

Then run this command to place the ubuntu_pro_apt_news profile in complain mode:

  sudo aa-complain /etc/apparmor.d/ubuntu_pro_apt_news

For ubuntu_pro_esm_cache, the command is:

  sudo aa-complain /etc/apparmor.d/ubuntu_pro_esm_cache

This will both change the profile file to include the complain flag, and reload it into the kernel.

Next, keep an eye on the dmesg output with something like this:

sudo dmesg -wT | grep -E 'apparmor=\".*(profile=\"ubuntu_pro_|name=\"ubuntu_pro_)'

And exercise the service. To make sure the service will run, and this applies to both apt-news and esm-cache, you should remove these files and directories:

sudo rm -rf /var/lib/apt/periodic/update-success-stamp /run/ubuntu-advantage /var/lib/ubuntu-advantage/messages/*

And then start the service:

sudo systemctl start apt-news.service

or, for esm-cache:

sudo systemctl start esm-cache.service

If you see any logs with ALLOWED in them, then that action is something that would have been blocked by the AppArmor profile had it not been in "complain" mode, and is something you should add to the AppArmor profile.

To make changes to the AppArmor profile, edit the respective profile file in the /etc/apparmor.d directory, save, and reload the profile with the following command:

sudo apparmor_parser -r -W -T /etc/apparmor.d/<modified-file>

Explaining the full syntax of the AppArmor profiles is out of scope for this document. You can find more information in the apparmor.d manpage. The Ubuntu Server Guide also has a good introduction on the topic in the AppArmor page.

ATTENTION: be mindful of the differences in Ubuntu Releases regarding the AppArmor profile syntax!

esm-cache specific AppArmor notes

The esm-cache service has an AppArmor profile that is a bit more involved than the one for apt-news. Instead of just one profile, there are multiple profiles, all defined in the same /etc/apparmor.d/ubuntu_pro_esm_cache file:

profile ubuntu_pro_esm_cache flags=(attach_disconnected) {
  profile ps flags=(attach_disconnected) {
  profile cloud_id flags=(attach_disconnected) {
  profile dpkg flags=(attach_disconnected) {
  profile ubuntu_distro_info flags=(attach_disconnected) {
  profile apt_methods flags=(attach_disconnected) {
  profile apt_methods_gpgv flags=(attach_disconnected) {
profile ubuntu_pro_esm_cache_systemctl flags=(attach_disconnected) {
profile ubuntu_pro_esm_cache_systemd_detect_virt flags=(attach_disconnected) {

This was done to avoid having to give the main profile (ubuntu_pro_esm_cache) too many privileges. Therefore, whenever other specific binaries are executed, the main profile switches to another one, which will have different rules just for that new execution.

Troubleshooting systemd sandboxing

Troubleshooting systemd sandboxing is not as straightforward as with AppArmor, because there are no specific logs telling you that a certain action was blocked. It will just be blocked, and it's up to the application to handle the situation. There is no "system" log to help with troubleshooting the sandbox rules.

The only way to troubleshoot this sandboxing is to methodically disable rule by rule in the unit file for the service, and test it.

For example, let's take the /lib/systemd/system/apt-news.service unit file as below:

[Unit]
Description=Update APT News

[Service]
Type=oneshot
ExecStart=/usr/bin/python3 /usr/lib/ubuntu-advantage/apt_news.py
AppArmorProfile=-ubuntu_pro_apt_news
CapabilityBoundingSet=~CAP_SYS_ADMIN
CapabilityBoundingSet=~CAP_NET_ADMIN
CapabilityBoundingSet=~CAP_NET_BIND_SERVICE
CapabilityBoundingSet=~CAP_SYS_PTRACE
CapabilityBoundingSet=~CAP_NET_RAW
PrivateTmp=true
RestrictAddressFamilies=~AF_NETLINK
RestrictAddressFamilies=~AF_PACKET

If you suspect that the PrivateTmp restriction is causing problems, comment it:

...
CapabilityBoundingSet=~CAP_NET_RAW
#PrivateTmp=true
RestrictAddressFamilies=~AF_NETLINK
...

Then reload the unit files:

sudo systemctl daemon-reload

And try the service again:

sudo rm -rf /var/lib/apt/periodic/update-success-stamp /run/ubuntu-advantage /var/lib/ubuntu-advantage/messages/*
sudo systemctl start apt-news.service

If whatever incorrect behavior that you were observing is now gone, then it's likely that that restriction was causing it.

The exact meaning of each sandboxing feature is well documented upstream, in the systemd.exec sandboxing section of the manpage. But as with AppArmor, be mindful of differences between Ubuntu Releases: not all features from the latest releases will be available in, say, Ubuntu Xenial, for example.

There is one additional troubleshooting tip that can be helpful, and that is to run any command with specific sandboxing features enabled.

For example, let's try the PrivateTmp feature. First, let's create a file in /tmp:

touch /tmp/my-file

It should be visible to you. Let's check with ls -la /tmp/my-file:

-rw-r--r-- 1 root root 0 jan  3 16:31 /tmp/my-file

Now let's try it with the PrivateTmp restriction disabled, first. The command is:

systemd-run -qt -p PrivateTmp=no ls -la /tmp/my-file

And the output will be:

-rw-r--r-- 1 root root 0 jan  3 16:31 /tmp/my-file

What happens if we enable the restriction? The command now is:

systemd-run -qt -p PrivateTmp=yes ls -la /tmp/my-file

And we get:

/usr/bin/ls: cannot access '/tmp/my-file': No such file or directory

Interesting! What if we create a file in /tmp with the restriction enabled, will it still be there once the command finishes? Let's try:

systemd-run -qt -p PrivateTmp=yes touch /tmp/other-file

And when we check with ls -la /tmp/other-file:

ls: cannot access '/tmp/other-file': No such file or directory

That's what PrivateTmp=yes means: the service will get a fresh and empty /tmp directory when it starts, and that will be gone when it finishes.

These restrictions can be specified multiple times in the systemd-run command line with the -p parameter.

Here is another example: let's block the CAP_NET_RAW capability, and try the ping command:

systemd-run -qt -p CapabilityBoundingSet=~CAP_NET_RAW ping -c 1 1.1.1.1

That will show nothing, but the exit status $? is 203, so something failed. If we check the journal, we will see:

jan 03 16:36:31 nsnx2 systemd[1]: Started run-u3002.service - /usr/bin/ping -c 1 1.1.1.1.
jan 03 16:36:31 nsnx2 (ping)[575067]: run-u3002.service: Failed to execute /usr/bin/ping: Operation not permitted
jan 03 16:36:31 nsnx2 (ping)[575067]: run-u3002.service: Failed at step EXEC spawning /usr/bin/ping: Operation not permitted
jan 03 16:36:31 nsnx2 systemd[1]: run-u3002.service: Main process exited, code=exited, status=203/EXEC
jan 03 16:36:31 nsnx2 systemd[1]: run-u3002.service: Failed with result 'exit-code'.

Cheat sheet

Here are a few handful AppArmor and systemd tips.

What How
Reload an AppArmor profile from disk sudo apparmor_parser -r -W -T <file>
Place a profile in complain mode sudo aa-complain <file>
Place a profile in enforce mode sudo aa-enforce <file>
List loaded profiles sudo aa-status
Check AppArmor logs sudo dmesg -wT | grep apparmor=
Run a command under an AppArmor profile sudo aa-exec -p <profile> <cmd>
Run a command with a systemd sandboxing property sudo systemd-run -qt -p <property> <cmd>