
4. Marks the log with a beginning marker of log events to consider. For exam-
ple:
Sep 13 17:48:52 figwit root: GenProf:
e2ff78636296f16d0b5301209a04430d
3
When prompted by the tool, run the application to profile in another terminal
window and perform as many of the application functions as possible. Thus, the
learning mode can log the files and directories to which the program requires
access in order to function properly. For example, in a new terminal window,
enter
rcapache2 start
.
4
Select from the following options that are available in the aa-logprof terminal
window after you have executed the program function:
•
S
runs aa-logprof on the system log from where it was marked when aa-
genprof was started and reloads the profile. If system events exist in the log,
AppArmor parses the learning mode log files. This generates a series of
questions that you must answer to guide aa-genprof in generating the security
profile.
•
F
exits the tool and returns to the main menu.
NOTE
If requests to add hats appear, proceed to
Chapter 25, Profiling Your Web
Applications Using ChangeHat
(page 315).
5
Answer two types of questions:
• A resource is requested by a profiled program that is not in the profile (see
Example 24.1, “Learning Mode Exception: Controlling Access to Specific
Resources”
(page 300)).
• A program is executed by the profiled program and the security domain
transition has not been defined (see
Example 24.2, “Learning Mode Excep-
tion: Defining Execute Permissions for an Entry”
(page 302)).
Building Profiles from the Command Line
299
Содержание LINUX ENTERPRISE DESKTOP 11
Страница 1: ...SUSE Linux Enterprise Server www novell com 11 March 17 2009 Security Guide...
Страница 9: ...32 7 Managing Audit Event Records Using Keys 433 33 Useful Resources 435...
Страница 10: ......
Страница 29: ...Part I Authentication...
Страница 30: ......
Страница 55: ...Figure 4 2 YaST LDAP Server Configuration LDAP A Directory Service 41...
Страница 126: ......
Страница 127: ...Part II Local Security...
Страница 128: ......
Страница 158: ......
Страница 173: ...Part III Network Security...
Страница 174: ......
Страница 194: ......
Страница 197: ...Figure 16 2 Scenario 2 Figure 16 3 Scenario 3 Configuring VPN Server 183...
Страница 210: ......
Страница 228: ......
Страница 229: ...Part IV Confining Privileges with Novell AppArmor...
Страница 230: ......
Страница 274: ......
Страница 300: ......
Страница 328: ......
Страница 340: ......
Страница 342: ......
Страница 386: ......
Страница 387: ...Part V The Linux Audit Framework...
Страница 388: ......