Select
Enter
Allows access to the selected directory path.
Allow
Allows access to the specified directory path entries. AppArmor suggests
file permission access. For more information, refer to
Section 21.7, “File
Permission Access Modes”
(page 249).
Deny
Prevents the program from accessing the specified directory path entries.
AppArmor then continues to the next event.
New
Prompts you to enter your own rule for this event, allowing you to
specify a regular expression. If the expression does not actually satisfy
the event that prompted the question in the first place, AppArmor asks
for confirmation and lets you reenter the expression.
Glob
Select a specific path or create a general rule using wild cards that match
a broader set of paths. To select any of the offered paths, enter the
number that is printed in front of the path then decide how to proceed
with the selected item.
For more information about globbing syntax, refer to
Section 21.6, “Paths
and Globbing”
(page 246).
Glob w/Ext
This modifies the original directory path while retaining the filename
extension. For example,
/etc/apache2/file.ext
becomes
/etc/
apache2/*.ext
, adding the wild card (asterisk) in place of the file-
name. This allows the program to access all files in the suggested direc-
tory that end with the
.ext
extension.
Abort
Aborts aa-logprof, losing all rule changes entered so far and leaving all
profiles unmodified.
Finish
Closes aa-logprof, saving all rule changes entered so far and modifying
all profiles.
Building Profiles from the Command Line
303
Содержание LINUX ENTERPRISE DESKTOP 11
Страница 1: ...SUSE Linux Enterprise Server www novell com 11 March 17 2009 Security Guide...
Страница 9: ...32 7 Managing Audit Event Records Using Keys 433 33 Useful Resources 435...
Страница 10: ......
Страница 29: ...Part I Authentication...
Страница 30: ......
Страница 55: ...Figure 4 2 YaST LDAP Server Configuration LDAP A Directory Service 41...
Страница 126: ......
Страница 127: ...Part II Local Security...
Страница 128: ......
Страница 158: ......
Страница 173: ...Part III Network Security...
Страница 174: ......
Страница 194: ......
Страница 197: ...Figure 16 2 Scenario 2 Figure 16 3 Scenario 3 Configuring VPN Server 183...
Страница 210: ......
Страница 228: ......
Страница 229: ...Part IV Confining Privileges with Novell AppArmor...
Страница 230: ......
Страница 274: ......
Страница 300: ......
Страница 328: ......
Страница 340: ......
Страница 342: ......
Страница 386: ......
Страница 387: ...Part V The Linux Audit Framework...
Страница 388: ......