Open Bug 1461855 Opened 7 years ago Updated 2 years ago

Snap sandbox seems to break nsNotifyAddrListener::calculateNetworkId

Categories

(Core :: Networking, enhancement, P3)

Unspecified
Linux
enhancement

Tracking

()

People

(Reporter: jld, Unassigned)

References

Details

(Whiteboard: [necko-triaged])

While I was investigating bug 1461848, I noticed this: [ 433.037670] audit: type=1400 audit(1526420842.267:181): apparmor="DENIED" operation="open" profile="snap.firefox.firefox" name="/proc/5205/net/arp" pid=5205 comm=4C696E6B204D6F6E69746F72 requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 The only place in our code that uses that is nsNotifyAddrListener::calculateNetworkId, and it looks like this restriction would cause it to never find a network ID. This appears to be used only for telemetry, but I thought it was worth reporting. I notice that the NETWORK_ID telemetry item isn't marked opt-out, so in practice this would apply only to beta, not release. (There is currently no Snap nightly.)

I see this bug has been inactive for 2 years and a half. I'm going to close it because of inactivity. Feel free to reopen it!

Status: NEW → RESOLVED
Closed: 5 years ago
Flags: needinfo?(ken.vandine)
Resolution: --- → INACTIVE

This might be a problem for DoH.
I'm moving this to the Necko backlog to track it until it becomes necessary.

Blocks: 1581159
Severity: normal → S3
Status: RESOLVED → REOPENED
Component: Release Automation: Snap → Networking
Priority: -- → P3
Product: Release Engineering → Core
QA Contact: jlorenzo
Resolution: INACTIVE → ---
Whiteboard: [necko-triaged]
Status: REOPENED → NEW
You need to log in before you can comment on or make changes to this bug.