Once a profile has been built and is loaded, there are two ways in which it can get pro-
cessed:
aa-complain
/
complain
In complain mode, violations of AppArmor profile rules, such as the profiled pro-
gram accessing files not permitted by the profile, are detected. The violations are
permitted, but also logged. To improve the profile, turn complain mode on, run the
program through a suite of tests to generate log events that characterize the program's
access needs, then postprocess the log with the AppArmor tools (YaST or aa-log-
prof) to transform log events into improved profiles.
aa-enforce
/
enforce
In enforce mode, violations of AppArmor profile rules, such as the profiled program
accessing files not permitted by the profile, are detected. The violations are logged
and not permitted. The default is for enforce mode to be enabled. To log the viola-
tions only, but still permit them, use complain mode. Enforce toggles with complain
mode.
20.2 Determining Programs to
Immunize
Now that you have familiarized yourself with AppArmor, start selecting the applications
for which to build profiles. Programs that need profiling are those that mediate privilege.
The following programs have access to resources that the person using the program
does not have, so they grant the privilege to the user when used:
cron Jobs
Programs that are run periodically by cron. Such programs read input from a variety
of sources and can run with special privileges, sometimes with as much as
root
privilege. For example, cron can run
/usr/sbin/logrotate
daily to rotate,
compress, or even mail system logs. For instructions for finding these types of
programs, refer to
Section 20.3, “Immunizing cron Jobs”
(page 231).
Web Applications
Programs that can be invoked through a Web browser, including CGI Perl scripts,
PHP pages, and more complex Web applications. For instructions for finding these
230
Security Guide
Содержание LINUX ENTERPRISE DESKTOP 11
Страница 1: ...SUSE Linux Enterprise Server www novell com 11 March 17 2009 Security Guide...
Страница 9: ...32 7 Managing Audit Event Records Using Keys 433 33 Useful Resources 435...
Страница 10: ......
Страница 29: ...Part I Authentication...
Страница 30: ......
Страница 55: ...Figure 4 2 YaST LDAP Server Configuration LDAP A Directory Service 41...
Страница 126: ......
Страница 127: ...Part II Local Security...
Страница 128: ......
Страница 158: ......
Страница 173: ...Part III Network Security...
Страница 174: ......
Страница 194: ......
Страница 197: ...Figure 16 2 Scenario 2 Figure 16 3 Scenario 3 Configuring VPN Server 183...
Страница 210: ......
Страница 228: ......
Страница 229: ...Part IV Confining Privileges with Novell AppArmor...
Страница 230: ......
Страница 274: ......
Страница 300: ......
Страница 328: ......
Страница 340: ......
Страница 342: ......
Страница 386: ......
Страница 387: ...Part V The Linux Audit Framework...
Страница 388: ......