mirror of
https://gitlab.com/apparmor/apparmor.git
synced 2025-03-06 17:31:01 +01:00

Local policy may want to extend or override abstractions, so add support for including local updates to them. Acked-by: Christian Boltz <apparmor@cboltz.de> Acked-by: intrigeri <intrigeri@boum.org> Signed-off-by: John Johansen <john.johansen@canonical.com>
28 lines
1.1 KiB
Text
28 lines
1.1 KiB
Text
# vim:syntax=apparmor
|
|
# privacy-violations-strict contains additional rules for sensitive
|
|
# files that you want to explicitly deny access
|
|
|
|
#include <abstractions/private-files>
|
|
|
|
# potentially extremely sensitive files
|
|
audit deny @{HOME}/.aws/{,**} mrwkl,
|
|
audit deny @{HOME}/.gnupg/{,**} mrwkl,
|
|
audit deny @{HOME}/.ssh/{,**} mrwkl,
|
|
audit deny @{HOME}/.gnome2_private/{,**} mrwkl,
|
|
audit deny @{HOME}/.gnome2/ w,
|
|
audit deny @{HOME}/.gnome2/keyrings/{,**} mrwkl,
|
|
# don't allow access to any gnome-keyring modules
|
|
audit deny /{,var/}run/user/[0-9]*/keyring** mrwkl,
|
|
audit deny @{HOME}/.mozilla/{,**} mrwkl,
|
|
audit deny @{HOME}/.config/ w,
|
|
audit deny @{HOME}/.config/chromium/{,**} mrwkl,
|
|
audit deny @{HOME}/.config/evolution/{,**} mrwkl,
|
|
audit deny @{HOME}/.evolution/{,**} mrwkl,
|
|
audit deny @{HOME}/.{,mozilla-}thunderbird/{,**} mrwkl,
|
|
audit deny @{HOME}/.kde{,4}/{,share/,share/apps/} w,
|
|
audit deny @{HOME}/.kde{,4}/share/apps/kmail{,2}/{,**} mrwkl,
|
|
audit deny @{HOME}/.kde{,4}/share/apps/kwallet/{,**} mrwkl,
|
|
|
|
|
|
# Include additions to the abstraction
|
|
#include if exists <abstractions/private-files-strict.d>
|