Profile update after tests on Arch.

This commit is contained in:
Alexandre Pujol 2021-04-02 10:18:29 +01:00
parent e4266d9cda
commit 604b184c9d
Failed to generate hash of commit
28 changed files with 121 additions and 12 deletions

View file

@ -10,6 +10,7 @@
/dev/bus/usb/[0-9]*/[0-9]* rw,
@{sys}/class/ r,
@{sys}/class/usbmisc/ r,
@{sys}/bus/ r,
@{sys}/bus/usb/ r,
@ -21,3 +22,4 @@
@{run}/udev/data/+usb:* r,
@{run}/udev/data/c16[6,7]* r,
@{run}/udev/data/c18[0,8,9]* r,
@{run}/udev/data/c8[0-9]:[0-9]* r,

View file

@ -15,6 +15,9 @@
@{sys}/devices/pci[0-9]*/**/block/sd[a-z]/** r,
@{sys}/devices/pci[0-9]*/**/{usb,ata}[0-9]/** r,
# SSD Nvme devices
@{sys}/devices/pci[0-9]*/**/nvme/nvme[0-9]*/{,**} r,
# SD card devices
/dev/mmcblk[0-9]* rk,
/dev/mmcblk[0-9]*p[0-9]* rk,
@ -68,6 +71,7 @@
@{run}/udev/data/b242:[0-9]* r, # for dynamic kernel assignment of block devices
@{run}/udev/data/b241:[0-9]* r, # for dynamic kernel assignment of block devices
@{run}/udev/data/b240:[0-9]* r, # for dynamic kernel assignment of block devices
@{run}/udev/data/b259:[0-9]* r,
@{run}/udev/data/b179:[0-9]* r, # for /dev/mmcblk*
@{run}/udev/data/b11:[0-9]* r, # for /dev/sr*

View file

@ -15,6 +15,10 @@
@{sys}/devices/pci[0-9]*/**/block/sd[a-z]/** r,
@{sys}/devices/pci[0-9]*/**/{usb,ata}[0-9]/** r,
# SSD Nvme devices
/dev/nvme[0-9]* rwk,
@{sys}/devices/pci[0-9]*/**/nvme/nvme[0-9]*/{,**} r,
# SD card devices
/dev/mmcblk[0-9]* rwk,
/dev/mmcblk[0-9]*p[0-9]* rwk,
@ -68,6 +72,7 @@
@{run}/udev/data/b242:[0-9]* r, # for dynamic kernel assignment of block devices
@{run}/udev/data/b241:[0-9]* r, # for dynamic kernel assignment of block devices
@{run}/udev/data/b240:[0-9]* r, # for dynamic kernel assignment of block devices
@{run}/udev/data/b259:[0-9]* r,
@{run}/udev/data/b179:[0-9]* r, # for /dev/mmcblk*
@{run}/udev/data/b11:[0-9]* r, # for /dev/sr*

View file

@ -1,5 +1,6 @@
# apparmor.d - Full set of apparmor profiles
# Copyright (C) 2017-2021 Mikhail Morfikov
# 2021 Alexandre Pujol <alexandre@pujol.io>
# SPDX-License-Identifier: GPL-2.0-only
abi <abi/3.0>,
@ -29,6 +30,7 @@
owner @{user_config_dirs}/gtk-3.0/settings.ini r,
owner @{user_config_dirs}/gtk-3.0/bookmarks r,
owner @{user_config_dirs}/gtk-3.0/gtk.css r,
owner @{user_config_dirs}/gtk-3.0/colors.css r,
# for gtk file dialog
owner @{user_config_dirs}/gtk-2.0/ rw,

View file

@ -19,6 +19,7 @@ profile child-systemctl {
include <abstractions/wutmp>
capability sys_ptrace,
capability net_admin,
ptrace (read),

View file

@ -1,5 +1,6 @@
# apparmor.d - Full set of apparmor profiles
# Copyright (C) 2020-2021 Mikhail Morfikov
# 2021 Alexandre Pujol <alexandre@pujol.io>
# SPDX-License-Identifier: GPL-2.0-only
abi <abi/3.0>,
@ -17,7 +18,11 @@ profile systemd-analyze @{exec_path} {
signal (send) peer=child-pager,
network inet dgram,
network netlink raw,
@{exec_path} mr,
/{usr/,}lib/systemd/system-environment-generators/* rix,
/{usr/,}bin/pager rPx -> child-pager,
/{usr/,}bin/less rPx -> child-pager,
@ -35,6 +40,7 @@ profile systemd-analyze @{exec_path} {
@{sys}/fs/cgroup/{,**} r,
@{sys}/fs/cgroup/{systemd,unified}/**/cgroup.procs rw,
@{sys}/fs/cgroup/unified/**/init.scope/ rw,
@{sys}/firmware/acpi/tables/FPDT r,
@{sys}/module/**/uevent r,
@ -50,6 +56,13 @@ profile systemd-analyze @{exec_path} {
/usr/ r,
/etc/default/locale r,
/etc/locale.conf r,
@{sys}/firmware/efi/efivars/LoaderTimeInitUSec-[0-9a-f]*-[0-9a-f]*-[0-9a-f]*-[0-9a-f]*-[0-9a-f]* r,
@{sys}/firmware/efi/efivars/LoaderTimeExecUSec-[0-9a-f]*-[0-9a-f]*-[0-9a-f]*-[0-9a-f]*-[0-9a-f]* r,
/dev/tty rw,
/dev/pts/1 rw,
include if exists <local/systemd-analyze>
}

View file

@ -1,5 +1,6 @@
# apparmor.d - Full set of apparmor profiles
# Copyright (C) 2018-2021 Mikhail Morfikov
# 2021 Alexandre Pujol <alexandre@pujol.io>
# SPDX-License-Identifier: GPL-2.0-only
abi <abi/3.0>,
@ -21,6 +22,9 @@ profile systemd-hostnamed @{exec_path} {
@{sys}/devices/virtual/dmi/id/board_vendor r,
@{sys}/devices/virtual/dmi/id/bios_vendor r,
@{sys}/devices/virtual/dmi/id/chassis_type r,
@{sys}/devices/virtual/dmi/id/uevent r,
@{run}/udev/data/+dmi:id r,
/etc/hostname rw,
/etc/.#hostname* rw,

View file

@ -1,5 +1,6 @@
# apparmor.d - Full set of apparmor profiles
# Copyright (C) 2020-2021 Mikhail Morfikov
# 2021 Alexandre Pujol <alexandre@pujol.io>
# SPDX-License-Identifier: GPL-2.0-only
abi <abi/3.0>,
@ -13,6 +14,8 @@ profile systemd-journalctl @{exec_path} {
include <abstractions/systemd-common>
capability sys_resource,
capability dac_read_search,
capability dac_override,
signal (send) peer=child-pager,

View file

@ -1,5 +1,6 @@
# apparmor.d - Full set of apparmor profiles
# Copyright (C) 2019-2021 Mikhail Morfikov
# 2021 Alexandre Pujol <alexandre@pujol.io>
# SPDX-License-Identifier: GPL-2.0-only
abi <abi/3.0>,
@ -15,6 +16,7 @@ profile systemd-journald @{exec_path} {
capability syslog,
capability sys_ptrace,
capability dac_read_search,
capability kill,
@{exec_path} mr,
@ -33,6 +35,7 @@ profile systemd-journald @{exec_path} {
@{run}/udev/data/c189:[0-9]* r, # for /dev/bus/usb/**
@{run}/udev/data/c10:224 r, # for /dev/tpm0
@{run}/udev/data/c243:0 r,
@{run}/udev/data/+usb:* r,
@{run}/udev/data/+pci:* r,
@{run}/udev/data/+hid:* r,
@ -42,6 +45,7 @@ profile systemd-journald @{exec_path} {
@{run}/udev/data/+usb-serial:* r,
@{run}/udev/data/+platform:regulatory.[0-9]* r,
@{run}/udev/data/+platform:simple-framebuffer.[0-9]* r,
@{run}/udev/data/+platform:iTCO_wdt r,
@{sys}/devices/**/uevent r,
@{sys}/firmware/efi/efivars/SecureBoot-[0-9a-f]*-[0-9a-f]*-[0-9a-f]*-[0-9a-f]*-[0-9a-f]* r,

View file

@ -1,5 +1,6 @@
# apparmor.d - Full set of apparmor profiles
# Copyright (C) 2018-2021 Mikhail Morfikov
# 2021 Alexandre Pujol <alexandre@pujol.io>
# SPDX-License-Identifier: GPL-2.0-only
abi <abi/3.0>,
@ -21,7 +22,12 @@ profile systemd-localed @{exec_path} {
/etc/default/locale rw,
/etc/default/.#locale* rw,
/etc/locale.conf r,
/etc/vconsole.conf r,
/usr/share/systemd/language-fallback-map r,
/usr/share/X11/xkb/rules/evdev r,
/etc/X11/xorg.conf.d/*.conf r,
}

View file

@ -1,5 +1,6 @@
# apparmor.d - Full set of apparmor profiles
# Copyright (C) 2020-2021 Mikhail Morfikov
# 2021 Alexandre Pujol <alexandre@pujol.io>
# SPDX-License-Identifier: GPL-2.0-only
abi <abi/3.0>,
@ -11,8 +12,7 @@ profile systemd-rfkill @{exec_path} {
include <abstractions/base>
include <abstractions/systemd-common>
# Needed?
audit deny capability net_admin,
capability net_admin,
network netlink raw,

View file

@ -1,5 +1,6 @@
# apparmor.d - Full set of apparmor profiles
# Copyright (C) 2019-2021 Mikhail Morfikov
# 2021 Alexandre Pujol <alexandre@pujol.io>
# SPDX-License-Identifier: GPL-2.0-only
abi <abi/3.0>,
@ -12,6 +13,9 @@ profile systemd-timesyncd @{exec_path} {
include <abstractions/systemd-common>
include <abstractions/nameservice-strict>
network inet dgram,
network inet6 dgram,
capability sys_time,
@{exec_path} mr,

View file

@ -1,5 +1,6 @@
# apparmor.d - Full set of apparmor profiles
# Copyright (C) 2020-2021 Mikhail Morfikov
# 2021 Alexandre Pujol <alexandre@pujol.io>
# SPDX-License-Identifier: GPL-2.0-only
# Note: This profile does not specify an attachment path because it is
@ -24,7 +25,11 @@ profile child-pager {
/{usr/,}bin/less mr,
/{usr/,}bin/more mr,
owner @{HOME}/.lesshs* rw,
owner @{user_cache_dirs}/lesshs* rw,
owner /root/.lesshs* rw,
# Display properly on different host terminals
@{system_share_dirs}/terminfo/{,**} r,
# For shell pwd
/root/ r,

View file

@ -1,5 +1,6 @@
# apparmor.d - Full set of apparmor profiles
# Copyright (C) 2019-2021 Mikhail Morfikov
# 2021 Alexandre Pujol <alexandre@pujol.io>
# SPDX-License-Identifier: GPL-2.0-only
abi <abi/3.0>,
@ -9,12 +10,18 @@ include <tunables/global>
@{exec_path} = /{usr/,}bin/dmesg
profile dmesg @{exec_path} {
include <abstractions/base>
include <abstractions/consoles>
capability syslog,
capability dac_read_search,
@{exec_path} mr,
/{usr/,}bin/{,ba,da}sh rix,
/{usr/,}bin/less rPx -> child-pager,
/dev/kmsg r,
/usr/share/terminfo/{,**} r,
include if exists <local/dmesg>
}

View file

@ -14,6 +14,8 @@ profile hostname @{exec_path} {
capability sys_admin,
network netlink raw,
@{exec_path} mr,
include if exists <local/hostname>

View file

@ -20,6 +20,7 @@ profile lspci @{exec_path} {
@{sys}/bus/pci/slots/ r,
@{sys}/devices/pci[0-9]*/** r,
/usr/share/hwdata/pci.ids r,
/usr/share/misc/pci.ids r,
/usr/share/misc/pci.ids.gz r,

View file

@ -21,6 +21,8 @@ profile mount @{exec_path} flags=(complain) {
capability setgid,
capability setuid,
capability dac_read_search,
mount,
network inet stream,

View file

@ -18,6 +18,9 @@ profile ntfs-3g @{exec_path} {
capability setgid,
capability setuid,
capability sys_admin,
capability dac_read_search,
capability dac_override,
capability mknod,
@{exec_path} mr,
@ -40,6 +43,12 @@ profile ntfs-3g @{exec_path} {
mount fstype=fuseblk /dev/sd[a-z][0-9]* -> /mnt/,
mount fstype=fuseblk /dev/sd[a-z][0-9]* -> /mnt/*/,
# Allow to mount encrypted partition
mount fstype=fuseblk /dev/dm-[0-9]* -> /media/*/,
mount fstype=fuseblk /dev/dm-[0-9]* -> /media/*/*/,
mount fstype=fuseblk /dev/dm-[0-9]* -> /mnt/,
mount fstype=fuseblk /dev/dm-[0-9]* -> /mnt/*/,
# kmod is used to load the fuse kernel module
/{usr/,}bin/kmod rPx,

View file

@ -23,8 +23,7 @@ profile passwd @{exec_path} {
capability chown,
capability fsetid,
# passwd is a SETUID binary, but it looks like it doesn't want this CAP.
#capability setuid,
capability setuid,
network netlink raw,
@ -33,6 +32,10 @@ profile passwd @{exec_path} {
owner @{PROC}/@{pid}/loginuid r,
/etc/shadow rw,
/etc/shadow.[0-9]* rw,
/etc/shadow.lock rwl,
/etc/shadow- rw,
/etc/shadow+ rw,
/etc/nshadow rw,
# A process first uses lckpwdf() to lock the lock file, thereby gaining exclusive rights to

View file

@ -16,5 +16,9 @@ profile pinentry-gtk-2 @{exec_path} {
@{exec_path} mr,
/usr/share/gtk-2.0/gtkrc r,
owner @{run}/user/@{pid}/.mutter-Xwaylandauth.[0-9A-Z]* r,
include if exists <local/pinentry-gtk-2>
}

View file

@ -18,6 +18,7 @@ profile pkexec @{exec_path} flags=(complain) {
capability sys_ptrace,
capability audit_write,
capability dac_read_search,
# gdbus
capability setgid,
@ -36,6 +37,7 @@ profile pkexec @{exec_path} flags=(complain) {
/etc/shells r,
/etc/environment r,
/etc/default/locale r,
/etc/security/limits.d/{,*} r,
@{PROC}/@{pids}/stat r,
owner @{PROC}/@{pid}/fd/ r,

View file

@ -1,5 +1,6 @@
# apparmor.d - Full set of apparmor profiles
# Copyright (C) 2018-2021 Mikhail Morfikov
# 2021 Alexandre Pujol <alexandre@pujol.io>
# SPDX-License-Identifier: GPL-2.0-only
abi <abi/3.0>,
@ -24,6 +25,8 @@ profile polkit-agent-helper @{exec_path} {
# Needed?
deny capability sys_nice,
capability dac_override,
capability net_admin,
network netlink raw,
@ -33,5 +36,7 @@ profile polkit-agent-helper @{exec_path} {
owner /dev/tty[0-9]* rw,
owner @{HOME}/.xsession-errors w,
@{run}/faillock/[a-zA-z0-9]* rw,
include if exists <local/polkit-agent-helper>
}

View file

@ -28,6 +28,7 @@ profile pulseaudio @{exec_path} {
@{exec_path} mrix,
/{usr/,}lib/@{multiarch}/pulse/gconf-helper mrix,
/{usr/,}lib/pulse/gsettings-helper mrix,
# PulseAudio files
/usr/share/pulseaudio/** r,
@ -35,10 +36,15 @@ profile pulseaudio @{exec_path} {
# PulseAudio home config files
owner @{user_config_dirs}/pulse/{,**} rw,
owner @{user_config_dirs}/dconf/user r,
# Needed when PulseAudio is started via the start-pulseaudio-x11 script
owner @{HOME}/.Xauthority r,
# Needed when PulseAudio is started via gdm
owner @{run}/user/[0-9]*/gdm/Xauthority r,
owner @{HOME}/.ICEauthority r,
# TCP wrap
/etc/hosts.{allow,deny} r,
@ -46,6 +52,7 @@ profile pulseaudio @{exec_path} {
owner @{run}/user/[0-9]*/pulse/{,*} rw,
/usr/share/applications/{,**} r,
/usr/share/glib-2.0/schemas/gschemas.compiled r,
@{sys}/bus/ r,
@{sys}/class/ r,
@ -60,6 +67,9 @@ profile pulseaudio @{exec_path} {
@{run}/systemd/users/[0-9]* r,
@{run}/user/1000/dconf/user rw,
@{run}/user/1000/ICEauthority r,
owner @{PROC}/@{pid}/fd/ r,
owner @{PROC}/@{pid}/stat r,

View file

@ -24,6 +24,7 @@ profile sensors @{exec_path} {
@{sys}/devices/virtual/hwmon/hwmon[0-9]* r,
@{sys}/devices/virtual/hwmon/hwmon[0-9]*/ r,
@{sys}/devices/virtual/hwmon/hwmon[0-9]*/{name,temp*} r,
@{sys}/devices/virtual/hwmon/hwmon[0-9]*/fan[0-9]_label r,
@{sys}/devices/**/hwmon*/{,**/} r,
@{sys}/devices/**/hwmon*/{name,temp*,*_input} r,
@{sys}/devices/**/hwmon*/**/{name,temp*,*_input} r,

View file

@ -20,6 +20,9 @@ profile umount @{exec_path} flags=(complain) {
capability setuid,
capability setgid,
capability dac_read_search,
capability chown,
umount,
network inet stream,

View file

@ -1,5 +1,6 @@
# apparmor.d - Full set of apparmor profiles
# Copyright (C) 2018-2021 Mikhail Morfikov
# 2021 Alexandre Pujol <alexandre@pujol.io>
# SPDX-License-Identifier: GPL-2.0-only
abi <abi/3.0>,
@ -12,6 +13,10 @@ profile usbguard @{exec_path} {
include <abstractions/consoles>
include <abstractions/devices-usb>
capability chown,
capability fowner,
capability dac_override,
# Needed to create policy (usbguard generate-policy)
network netlink dgram,

View file

@ -1,5 +1,6 @@
# apparmor.d - Full set of apparmor profiles
# Copyright (C) 2018-2021 Mikhail Morfikov
# 2021 Alexandre Pujol <alexandre@pujol.io>
# SPDX-License-Identifier: GPL-2.0-only
abi <abi/3.0>,
@ -12,9 +13,9 @@ profile usbguard-daemon @{exec_path} {
include <abstractions/nameservice-strict>
include <abstractions/devices-usb>
# Needed? (##FIXME##)
#capability chown,
#capability fowner,
capability chown,
capability fowner,
capability dac_override,
network netlink dgram,

View file

@ -1,5 +1,6 @@
# apparmor.d - Full set of apparmor profiles
# Copyright (C) 2018-2021 Mikhail Morfikov
# 2021 Alexandre Pujol <alexandre@pujol.io>
# SPDX-License-Identifier: GPL-2.0-only
abi <abi/3.0>,
@ -33,15 +34,15 @@ profile wpa-supplicant @{exec_path} {
@{exec_path} mr,
owner @{run}/wpa_supplicant/ rw,
owner @{run}/wpa_supplicant/wlan* rw,
owner @{run}/wpa_supplicant.wlan*.pid rw,
owner @{run}/wpa_supplicant/{,**} rw,
/etc/wpa_supplicant/wpa_supplicant.conf r,
/etc/libnl/{classid,pktloc} r,
/dev/rfkill r,
@{PROC}/sys/net/ipv[4,6]/conf/wlan[0-9]/drop_* rw,
@{PROC}/sys/net/ipv[4,6]/conf/wlp*/drop_* rw,
@{sys}/devices/pci[0-9]*/**/ieee80211/phy[0-9]/name r,