Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#42910 - [linux] consider re-enabling TOMOYO / SMACK as they don't depend on AUDIT
Attached to Project:
Arch Linux
Opened by Daniel Micay (thestinger) - Wednesday, 26 November 2014, 12:09 GMT
Last edited by Jan Alexander Steffens (heftig) - Tuesday, 09 April 2019, 21:53 GMT
Opened by Daniel Micay (thestinger) - Wednesday, 26 November 2014, 12:09 GMT
Last edited by Jan Alexander Steffens (heftig) - Tuesday, 09 April 2019, 21:53 GMT
|
DetailsHere's the thread where the decision was made to remove these:
https://lists.archlinux.org/pipermail/arch-dev-public/2014-March/026028.html SELinux and AppArmor require CONFIG_AUDIT=y, which makes enabling them an intrusive change with an impact on everyone. I agree with keeping those disabled until upstream provides a way to fully disable audit by default. However, SMACK and TOMOYO don't have the hard dependency on CONFIG_AUDIT=y and are built as entirely optional modules. Enabling these has no impact on people who aren't opting into to using them beyond an insignificant increase in the package size. The TOMOYO tools were included in the repositories when it was disabled, and I'm interested in moving them back. I'm not interested in SMACK, but there are packages for it in the AUR and the current lack of interest in them likely has to do with the need to keep recompiling the kernel whenever it updates... I don't see a good reason to make life harder for people who want to use it. |
This task depends upon
Closed by Jan Alexander Steffens (heftig)
Tuesday, 09 April 2019, 21:53 GMT
Reason for closing: Implemented
Additional comments about closing: Added in trunk, pending next release.
Tuesday, 09 April 2019, 21:53 GMT
Reason for closing: Implemented
Additional comments about closing: Added in trunk, pending next release.
FS#39852, but I'll let the maintainers make that call.Technical decisions should be re-evaluated when new information comes to light. I've verified that TOMOYO works fine without audit support enabled, although it does have the ability to use it for logging enhancements.
CONFIG_SECURITY_APPARMOR=y
CONFIG_SECURITY_APPARMOR_BOOTPARAM_VALUE=1
CONFIG_DEFAULT_SECURITY_APPARMOR=y
So no CONFIG_AUDIT too.
config SECURITY_APPARMOR
bool "AppArmor support"
depends on SECURITY && NET
select AUDIT
select SECURITY_PATH
select SECURITYFS
select SECURITY_NETWORK
default n
help
This enables the AppArmor security module.
Required userspace tools (if they are not included in your
distribution) and further information may be found at
http://apparmor.wiki.kernel.org
If you are unsure how to answer this question, answer N.