Samba AppArmor profile
Ubuntu comes with the AppArmor security module, which provides mandatory access controls. The default AppArmor profile for Samba may need to be adapted to your configuration. More details on using AppArmor can be found in this guide.
There are default AppArmor profiles for
/usr/sbin/nmbd, the Samba daemon binaries, as part of the
To install the package, enter the following command from a terminal prompt:
sudo apt install apparmor-profiles apparmor-utils
This package contains profiles for several other binaries.
AppArmor profile modes
By default, the profiles for
nmbd are set to ‘complain’ mode. In this mode, Samba can work without modifying the profile, and only logs errors or violations. There is no need to add exceptions for the shares, as the
smbd service unit takes care of doing that automatically via a helper script.
This is what an
ALLOWED message looks like. It means that, were the profile not in
complain mode, this action would have been denied instead (formatted into multiple lines here for better visibility):
Jun 30 14:41:09 ubuntu kernel: [ 621.478989] audit:
apparmor="ALLOWED" operation="exec" profile="smbd"
name="/usr/lib/x86_64-linux-gnu/samba/samba-bgqd" pid=4122 comm="smbd"
requested_mask="x" denied_mask="x" fsuid=0 ouid=0
The alternative to ‘complain’ mode is ‘enforce’ mode, where any operations that violate policy are blocked. To place the profile into
enforce mode and reload it, run:
sudo aa-enforce /usr/sbin/smbd
sudo apparmor_parser -r -W -T /etc/apparmor.d/usr.sbin.smbd
It’s advisable to monitor
audit entries that contain AppArmor
DENIED messages, or
/var/log/audit/audit.log if you are running the
auditd daemon. Actions blocked by AppArmor may surface as odd or unrelated errors in the application.
- For more information on how to use AppArmor, including details of the profile modes, the Debian AppArmor guide may be helpful.