mirror of
https://gitlab.com/apparmor/apparmor.git
synced 2025-03-07 09:51:01 +01:00
![]() Lenient profile that is intended to be used when 'Ux' is desired but does not provide enough environment sanitizing. This effectively is an open profile that blacklists certain known dangerous files and also does not allow any capabilities. For example, it will not allow 'm' on files owned be the user invoking the program. While this provides some additional protection, please use with care as applications running under this profile are effectively running without any AppArmor protection. Use this profile only if the process absolutely must be run (effectively) unconfined. Limitations: 1. This does not work for root owned processes, because of the way we use owner matching in the sanitized helper. We could do a better job with this to support root, but it would make the policy harder to understand and going unconfined as root is not desirable anyway. 2. For this sanitized_helper to work, the program running in the sanitized environment must open symlinks directly in order for AppArmor to mediate it. This is confirmed to work with: - compiled code which can load shared libraries - python imports It is known not to work with: - perl includes 3. Going forward it might be useful to try sanitizing ruby and java Use at your own risk. This profile was developed as an interim workaround for LP: #851986 until AppArmor implements proper environment filtering. Acked-by: Jamie Strandboge <jamie@canonical.com> Adjust ubuntu abstractions to use sanitized_helper instead of (P)Ux. Acked-by: Jamie Strandboge <jamie@canonical.com> Update launchpad-integration to use a sanitized helper in a similar manner as that in ubuntu-helpers. Acked-by: Jamie Strandboge <jamie@canonical.com> |
||
---|---|---|
.. | ||
apparmor/profiles/extras | ||
apparmor.d | ||
apparmor-profiles.spec.in | ||
Makefile |