apparmor.d/docs/concepts.md

20 lines
1.2 KiB
Markdown
Raw Normal View History

2023-01-29 22:18:22 +01:00
---
title: Concepts
---
*One profile a day keeps the hacker away*
2023-10-27 16:27:23 +02:00
There are over 50000 Linux packages and even more applications. It is simply not possible to write an AppArmor profile for all of them. Therefore, a question arises:
2023-01-29 22:18:22 +01:00
**What to confine and why?**
2024-06-07 21:22:04 +02:00
We take inspiration from the [Android/ChromeOS Security Model](https://arxiv.org/pdf/1904.05572v2.pdf), and we apply it to the Linux world. Modern [Linux security distributions](https://clip-os.org/en/) usually consider an immutable core base image with a carefully selected set of applications. Everything else should be sandboxed. Therefore, this project tries to confine all the *core* applications you will usually find in a Linux system: all systemd services, xwayland, network, bluetooth, your desktop environment, etc. Non-core user applications are out of scope as they should be sandboxed using a dedicated tool (minijail, bubblewrap, toolbox, etc).
2023-10-21 01:13:30 +02:00
This is fundamentally different from how AppArmor is usually used on Linux servers as it is common to only confine the applications that face the internet and/or the users.
2023-01-29 22:18:22 +01:00
2023-10-27 16:27:23 +02:00
[android_model]: https://arxiv.org/pdf/1904.05572v2.pdf
2023-01-29 22:18:22 +01:00
[clipos]: https://clip-os.org/en/
[write xor execute]: https://en.wikipedia.org/wiki/W%5EX