apparmor.d/profiles/openvpn
2021-04-01 16:17:47 +01:00

124 lines
3.2 KiB
Plaintext

# apparmor.d - Full set of apparmor profiles
# Copyright (C) 2019-2021 Mikhail Morfikov
# SPDX-License-Identifier: GPL-2.0-only
#
# The following profile assumes that:
# openvpn is started as root with dropping privileges
# iptables is used
# config files are stored in: /etc/openvpn/*.{conf,ovpn}
# certs/keys are stored in: /etc/openvpn/certs/*.{key,crt}
# auth credentials are stored in: /etc/openvpn/auth/*.auth
# logs are redirected to: /var/log/openvpn/*.log
# DNS/resolver script is stored in: /etc/openvpn/update-resolv-conf{,.sh}
# If a user wants to type user/pass interactively, systemd-ask-password is invoked for that.
abi <abi/3.0>,
include <tunables/global>
@{exec_path} = /{usr/,}sbin/openvpn
profile openvpn @{exec_path} {
include <abstractions/base>
include <abstractions/nameservice-strict>
include <abstractions/openssl>
# Needed to remove the following errors:
# ERROR: Cannot ioctl TUNSETIFF tun: Operation not permitted (errno=1)
# Exiting due to fatal error
capability net_admin,
# These are needed when user/group are set in a OpenVPN config file
capability setuid,
capability setgid,
network inet stream,
network inet6 stream,
network netlink raw,
@{exec_path} mr,
# OpenVPN config
/etc/openvpn/*.{conf,ovpn} r,
/etc/openvpn/auth/*.auth r,
/etc/openvpn/certs/*.{key,crt} r,
/var/log/openvpn/*.log w,
@{run}/openvpn/*.{pid,status} rw,
/{usr/,}bin/ip rix,
/{usr/,}bin/systemd-ask-password rCx -> systemd-ask-password,
/etc/openvpn/update-resolv-conf{,.sh} rCx -> update-resolv,
/etc/openvpn/force-user-traffic-via-vpn.sh rCx -> force-user-traffic-via-vpn,
/dev/net/tun rw,
owner @{PROC}/@{pid}/net/route r,
profile systemd-ask-password {
include <abstractions/base>
include <abstractions/consoles>
/{usr/,}bin/systemd-ask-password mr,
@{PROC}/filesystems r,
owner @{PROC}/@{pid}/stat r,
}
profile update-resolv {
include <abstractions/base>
include <abstractions/consoles>
include <abstractions/nameservice-strict>
# To be able to manage firewall rules.
capability net_admin,
/etc/openvpn/update-resolv-conf.sh r,
/{usr/,}bin/{,ba,da}sh rix,
/{usr/,}bin/cut rix,
/{usr/,}bin/which rix,
/{usr/,}bin/ip rix,
/{usr/,}sbin/xtables-nft-multi rix,
/etc/iproute2/rt_tables r,
/etc/iproute2/rt_tables.d/ r,
}
profile force-user-traffic-via-vpn {
include <abstractions/base>
include <abstractions/consoles>
include <abstractions/nameservice-strict>
# To be able to manage firewall rules.
capability net_admin,
network netlink raw,
/etc/openvpn/ r,
/etc/openvpn/force-user-traffic-via-vpn.sh r,
/{usr/,}bin/{,ba,da}sh rix,
/{usr/,}bin/sed rix,
/{usr/,}bin/cut rix,
/{usr/,}bin/{,e}grep rix,
/{usr/,}bin/ip rix,
/{usr/,}sbin/nft rix,
/{usr/,}bin/env rix,
/etc/iproute2/rt_realms r,
/etc/iproute2/group r,
/etc/iproute2/rt_tables.d/ r,
/etc/iproute2/rt_tables rw,
/etc/iproute2/sed* rw,
owner @{PROC}/sys/net/ipv{4,}/route/flush w,
}
include if exists <local/openvpn>
}