Update profiles.

This commit is contained in:
Alexandre Pujol 2022-03-23 19:56:11 +00:00
parent 2cdd954613
commit d7be27411b
No known key found for this signature in database
GPG Key ID: C5469996F0DF68EC
15 changed files with 49 additions and 89 deletions

View File

@ -9,6 +9,7 @@ include <tunables/global>
@{exec_path} = /{usr/,}bin/aa-enabled
profile aa-enabled @{exec_path} {
include <abstractions/base>
include <abstractions/consoles>
@{exec_path} mr,

View File

@ -1,5 +1,6 @@
# apparmor.d - Full set of apparmor profiles
# Copyright (C) 2021 Mikhail Morfikov
# Copyright (C) 2021-2022 Mikhail Morfikov
# Copyright (C) 2022 Alexandre Pujol <alexandre@pujol.io>
# SPDX-License-Identifier: GPL-2.0-only
abi <abi/3.0>,
@ -10,15 +11,15 @@ include <tunables/global>
@{exec_path} += /{usr/,}lib/android-sdk/platform-tools/adb
profile adb @{exec_path} {
include <abstractions/base>
include <abstractions/nameservice-strict>
include <abstractions/devices-usb>
include <abstractions/nameservice-strict>
include <abstractions/user-download-strict>
# For adb kill-server:
# cannot connect to daemon at tcp:5037: Permission denied
network inet stream,
network inet6 stream,
signal (receive) set=(kill) peer=scrcpy,
@{exec_path} mrix,
/usr/share/scrcpy/scrcpy-server r,

View File

@ -13,14 +13,15 @@ profile apparmor.systemd @{exec_path} flags=(complain) {
@{exec_path} mr,
/{usr/,}bin/{,ba,da}sh rix,
/{usr/,}bin/getconf rix,
/{usr/,}bin/{,e}grep rix,
/{usr/,}bin/ls rix,
/{usr/,}bin/xargs rix,
/{usr/,}{s,}bin/aa-status rPx,
/{usr/,}{s,}bin/apparmor_parser rPx,
/{usr/,}bin/{,ba,da}sh rix,
/{usr/,}bin/{,e}grep rix,
/{usr/,}bin/getconf rix,
/{usr/,}bin/ls rix,
/{usr/,}bin/systemd-detect-virt rPx,
/{usr/,}bin/xargs rix,
/{usr/,}lib/apparmor/rc.apparmor.functions r,
/etc/apparmor.d/ r,

View File

@ -6,7 +6,7 @@ abi <abi/3.0>,
include <tunables/global>
@{exec_path} = /{usr/,}bin/apparmor_parser
@{exec_path} = /{usr/,}{s,}bin/apparmor_parser
profile apparmor_parser @{exec_path} flags=(attach_disconnected) {
include <abstractions/base>
@ -18,6 +18,7 @@ profile apparmor_parser @{exec_path} flags=(attach_disconnected) {
/etc/apparmor.d/{,**} r,
/etc/apparmor.d/cache.d/{,**} rw,
/usr/share/apparmor-features/{,**} r,
/usr/share/apparmor/{,**} r,
owner /var/cache/apparmor/{,**} rw,

View File

@ -57,7 +57,8 @@ profile dhclient-script @{exec_path} {
/{usr/,}bin/ip rix,
# For loadbalance
/etc/iproute2/** r,
/etc/iproute2/rt_tables r,
/etc/iproute2/rt_tables.d/{,*} r,
owner @{PROC}/@{pid}/loginuid r,
# For updating the /etc/resolv.conf file
@ -90,8 +91,7 @@ profile dhclient-script @{exec_path} {
@{run}/chrony-dhcp/ rw,
# file_inherit
/var/lib/dhcp/*.leases r,
/var/lib/dhcp/dhclient.leases r,
profile run-parts {
include <abstractions/base>
@ -101,7 +101,7 @@ profile dhclient-script @{exec_path} {
/etc/dhcp/dhclient-{enter,exit}-hooks.d/ r,
# file_inherit
/var/lib/dhcp/*.leases r,
owner /var/lib/dhcp/dhclient.leases r,
}

View File

@ -1,6 +1,6 @@
# apparmor.d - Full set of apparmor profiles
# Copyright (C) 2019-2021 Mikhail Morfikov
# 2021 Alexandre Pujol <alexandre@pujol.io>
# Copyright (C) 2019-2022 Mikhail Morfikov
# Copyright (C) 2021-2022 Alexandre Pujol <alexandre@pujol.io>
# SPDX-License-Identifier: GPL-2.0-only
abi <abi/3.0>,
@ -23,5 +23,8 @@ profile dmesg @{exec_path} {
/dev/kmsg r,
/usr/share/terminfo/{,**} r,
deny /{usr/,}local/bin/ r,
deny /{usr/,}bin/{,*/} r,
include if exists <local/dmesg>
}

View File

@ -67,6 +67,7 @@ profile exim4 @{exec_path} {
@{run}/exim4/ r,
owner @{run}/exim4/exim.pid rw,
@{run}/resolvconf/resolv.conf r,
owner @{run}/dbus/system_bus_socket rw,
# file_inherit

View File

@ -18,7 +18,6 @@ profile htop @{exec_path} {
capability sys_nice,
capability sys_ptrace,
signal (send),
ptrace (read),
@ -31,6 +30,7 @@ profile htop @{exec_path} {
/etc/sensors.d/ r,
/etc/sensors3.conf r,
owner @{user_config_dirs}/ r,
owner @{user_config_dirs}/htop/ rw,
owner @{user_config_dirs}/htop/htoprc rw,

View File

@ -1,5 +1,6 @@
# apparmor.d - Full set of apparmor profiles
# Copyright (C) 2019-2021 Mikhail Morfikov
# Copyright (C) 2022 Alexandre Pujol <alexandre@pujol.io>
# SPDX-License-Identifier: GPL-2.0-only
abi <abi/3.0>,
@ -10,9 +11,7 @@ include <tunables/global>
profile ifup @{exec_path} {
include <abstractions/base>
# To be able to manage network interfaces.
capability net_admin,
# Needed?
audit deny capability sys_module,
@ -20,13 +19,15 @@ profile ifup @{exec_path} {
@{exec_path} mr,
/{usr/,}{s,}bin/route rix,
/{usr/,}bin/{,ba,da}sh rix,
/{usr/,}bin/ip rix,
/{usr/,}bin/sleep rix,
/{usr/,}bin/seq rix,
/{usr/,}bin/sleep rix,
/{usr/,}bin/wc rix,
/{usr/,}{s,}bin/dhclient rPx,
/{usr/,}bin/macchanger rPx,
/{usr/,}bin/macchanger rPx,
/{usr/,}lib/ifupdown/*.sh rix,
@ -80,9 +81,10 @@ profile ifup @{exec_path} {
/etc/network/if-pre-up.d/random-secret rPUx,
/etc/network/if-up.d/ r,
/etc/network/if-up.d/*resolvconf rPUx,
/etc/network/if-up.d/chrony rPUx,
/etc/network/if-up.d/ethtool rPUx,
/etc/network/if-up.d/ifenslave rPUx,
/etc/network/if-up.d/chrony rPUx,
/etc/network/if-up.d/openvpn rPUx,
/etc/network/if-up.d/wpasupplicant rPUx,
@ -107,7 +109,7 @@ profile ifup @{exec_path} {
include <abstractions/base>
# capability mac_admin,
# capability sys_admin,
capability sys_admin,
# capability sys_resource,
/{usr/,}sbin/sysctl mr,

View File

@ -13,6 +13,8 @@ profile mandb @{exec_path} flags=(complain) {
include <abstractions/consoles>
include <abstractions/nameservice-strict>
capability dac_read_search,
@{exec_path} mr,
/etc/man_db.conf r,

View File

@ -13,6 +13,8 @@ profile nvtop @{exec_path} {
include <abstractions/nameservice-strict>
include <abstractions/opencl-nvidia>
capability sys_ptrace,
ptrace (read),
@{exec_path} mr,

View File

@ -12,8 +12,13 @@ profile resize2fs @{exec_path} {
include <abstractions/disks-write>
include <abstractions/user-download-strict>
capability sys_resource,
@{exec_path} mr,
/ r,
/.ismount-test-file rw,
@{PROC}/swaps r,
owner @{PROC}/@{pid}/mounts r,

View File

@ -27,10 +27,13 @@ profile resolvconf @{exec_path} {
/usr/lib/resolvconf/{,**} r,
/etc/resolv.conf rw,
/etc/resolvconf/{,**} r,
/etc/resolvconf/update.d/libc rix,
owner @{run}/resolvconf/{,**} rw,
owner @{run}/resolvconf/run-lock wk,
/dev/tty rw,
include if exists <local/resolvconf>
}

View File

@ -12,10 +12,13 @@ profile scrcpy @{exec_path} {
include <abstractions/dri-common>
include <abstractions/dri-enumerate>
include <abstractions/mesa>
include <abstractions/opencl>
network inet stream,
network inet6 stream,
signal (send) set=(kill) peer=adb,
@{exec_path} mr,
/{usr/,}bin/adb rPx,

View File

@ -1,65 +0,0 @@
# vim:syntax=apparmor
#include <tunables/global>
profile tcpdump /usr/bin/tcpdump {
#include <abstractions/base>
#include <abstractions/nameservice>
#include <abstractions/user-tmp>
capability net_raw,
capability setuid,
capability setgid,
capability dac_override,
capability chown,
network raw,
network packet,
# for -D
@{PROC}/bus/usb/ r,
@{PROC}/bus/usb/** r,
# for finding an interface
/dev/ r,
@{PROC}/[0-9]*/net/dev r,
/sys/bus/usb/devices/ r,
/sys/class/net/ r,
/sys/devices/**/net/** r,
# for -j
capability net_admin,
# for tracing USB bus, which libpcap supports
/dev/usbmon* r,
/dev/bus/usb/ r,
/dev/bus/usb/** r,
# for init_etherarray(), with -e
/etc/ethers r,
# for USB probing (see libpcap-1.1.x/pcap-usb-linux.c:probe_devices())
/dev/bus/usb/**/[0-9]* w,
# for -z
/{usr/,}bin/gzip ixr,
/{usr/,}bin/bzip2 ixr,
# for -F and -w
audit deny @{HOME}/.* mrwkl,
audit deny @{HOME}/.*/ rw,
audit deny @{HOME}/.*/** mrwkl,
audit deny @{HOME}/bin/ rw,
audit deny @{HOME}/bin/** mrwkl,
owner @{HOME}/ r,
owner @{HOME}/** rw,
# for -r, -F and -w
/**.[pP][cC][aA][pP] rw,
/**.[cC][aA][pP] rw,
# for convenience with -r (ie, read pcap files from other sources)
/var/log/snort/*log* r,
/usr/bin/tcpdump mr,
include if exists <local/usr.sbin.tcpdump>
}