![Novell LINUX ENTERPRISE DESKTOP 11 Скачать руководство пользователя страница 326](http://html1.mh-extra.com/html/novell/linux-enterprise-desktop-11/linux-enterprise-desktop-11_manual_1711827326.webp)
IMPORTANT: Running Unconfined
Choosing
ux
is very dangerous and provides no enforcement of policy from a
security perspective of resulting execution behavior of the child program.
aa-unconfined—Identifying Unprotected Processes
The
aa-unconfined
command examines open network ports on your system,
compares that to the set of profiles loaded on your system, and reports network services
that do not have AppArmor profiles. It requires
root
privileges and that it not be
confined by an AppArmor profile.
aa-unconfined must be run as
root
to retrieve the process executable link from the
/proc
file system. This program is susceptible to the following race conditions:
• An unlinked executable is mishandled
• A process that dies between
netstat(8)
and further checks is mishandled
NOTE
This program lists processes using TCP and UDP only. In short, this program is
unsuitable for forensics use and is provided only as an aid to profiling all net-
work-accessible processes in the lab.
24.7 Important Filenames and
Directories
The following list contains the most important files and directories used by the App-
Armor framework. If you intend to manage and troubleshoot your profiles manually,
make sure that you know about these files and directories:
/sys/kernel/security/apparmor/profiles
Virtualized file representing the currently loaded set of profiles.
312
Security Guide
Содержание LINUX ENTERPRISE DESKTOP 11
Страница 1: ...SUSE Linux Enterprise Server www novell com 11 March 17 2009 Security Guide...
Страница 9: ...32 7 Managing Audit Event Records Using Keys 433 33 Useful Resources 435...
Страница 10: ......
Страница 29: ...Part I Authentication...
Страница 30: ......
Страница 55: ...Figure 4 2 YaST LDAP Server Configuration LDAP A Directory Service 41...
Страница 126: ......
Страница 127: ...Part II Local Security...
Страница 128: ......
Страница 158: ......
Страница 173: ...Part III Network Security...
Страница 174: ......
Страница 194: ......
Страница 197: ...Figure 16 2 Scenario 2 Figure 16 3 Scenario 3 Configuring VPN Server 183...
Страница 210: ......
Страница 228: ......
Страница 229: ...Part IV Confining Privileges with Novell AppArmor...
Страница 230: ......
Страница 274: ......
Страница 300: ......
Страница 328: ......
Страница 340: ......
Страница 342: ......
Страница 386: ......
Страница 387: ...Part V The Linux Audit Framework...
Страница 388: ......