
• You can avoid adding the helper applications, such as tar and rpm, to the
/usr/
bin/mail
profile so that when
/usr/bin/mail
runs
/usr/bin/less
in
this context, the less program is far less dangerous than it would be without App-
Armor protection.
In other circumstances, you might instead want to use the Profile option. This has two
effects on aa-logprof:
• The rule written into the profile uses px, which forces the transition to the child's
own profile.
• aa-logprof constructs a profile for the child and starts building it, in the same way
that it built the parent profile, by assigning events for the child process to the child's
profile and asking the aa-logprof user questions.
If a confined program forks and executes another program, aa-logprof sees this and
asks the user which execution mode should be used when launching the child process.
The execution modes of inherit, profile, unconfined or an option to deny the execution
are presented.
If a separate profile exists for the child process, the default selection is profile. If a
profile does not exist, the default is inherit. The inherit option, or
ix
, is described in
Section 21.7, “File Permission Access Modes”
(page 249).
The profile option indicates that the child program should run in its own profile—a
secondary question asks whether to sanitize the environment that the child program
inherits from the parent. If you choose to sanitize the environment, this places the exe-
cution modifier
Px
in your AppArmor profile. If you select not to sanitize,
px
is placed
in the profile and no environment sanitizing occurs. The default for the execution mode
is
px
if you select profile execution mode.
The unconfined execution mode is not recommended and should only be used in cases
where there is no other option to generate a profile for a program reliably. Selecting
unconfined opens a warning dialog asking for confirmation of the choice. If you are
sure and choose Yes, a second dialog ask whether to sanitize the environment. Choosing
Yes uses the execution mode
Ux
in your profile. Choosing No uses the execution mode
ux
for your profile. The default value selected is
Ux
for unconfined execution mode.
Building Profiles from the Command Line
311
Summary of Contents for LINUX ENTERPRISE DESKTOP 11
Page 1: ...SUSE Linux Enterprise Server www novell com 11 March 17 2009 Security Guide...
Page 9: ...32 7 Managing Audit Event Records Using Keys 433 33 Useful Resources 435...
Page 10: ......
Page 29: ...Part I Authentication...
Page 30: ......
Page 55: ...Figure 4 2 YaST LDAP Server Configuration LDAP A Directory Service 41...
Page 126: ......
Page 127: ...Part II Local Security...
Page 128: ......
Page 158: ......
Page 173: ...Part III Network Security...
Page 174: ......
Page 194: ......
Page 197: ...Figure 16 2 Scenario 2 Figure 16 3 Scenario 3 Configuring VPN Server 183...
Page 210: ......
Page 228: ......
Page 229: ...Part IV Confining Privileges with Novell AppArmor...
Page 230: ......
Page 274: ......
Page 300: ......
Page 328: ......
Page 340: ......
Page 342: ......
Page 386: ......
Page 387: ...Part V The Linux Audit Framework...
Page 388: ......