21.5
Network Access Control . . . . . . . . . . . . . . . . . . . . .
245
21.6
Paths and Globbing . . . . . . . . . . . . . . . . . . . . . . .
246
21.7
File Permission Access Modes . . . . . . . . . . . . . . . . . . .
249
21.8
Execute Modes . . . . . . . . . . . . . . . . . . . . . . . . .
252
21.9
Resource Limit Control . . . . . . . . . . . . . . . . . . . . . .
257
21.10 Auditing Rules . . . . . . . . . . . . . . . . . . . . . . . . . .
258
21.11 Setting Capabilities per Profile . . . . . . . . . . . . . . . . . . .
259
2 2 AppArmor Profile Repositories
261
22.1
Using the Local Repository . . . . . . . . . . . . . . . . . . . .
261
22.2
Using the External Repository . . . . . . . . . . . . . . . . . . .
262
2 3 Building and Managing Profiles with YaST
265
23.1
Adding a Profile Using the Wizard . . . . . . . . . . . . . . . . .
267
23.2
Manually Adding a Profile . . . . . . . . . . . . . . . . . . . . .
275
23.3
Editing Profiles . . . . . . . . . . . . . . . . . . . . . . . . .
275
23.4
Deleting a Profile . . . . . . . . . . . . . . . . . . . . . . . .
281
23.5
Updating Profiles from Log Entries . . . . . . . . . . . . . . . . .
281
23.6
Managing Novell AppArmor and Security Event Status . . . . . . . . .
283
2 4 Building Profiles from the Command Line
287
24.1
Checking the AppArmor Module Status . . . . . . . . . . . . . . .
287
24.2
Building AppArmor Profiles . . . . . . . . . . . . . . . . . . . .
289
24.3
Adding or Creating an AppArmor Profile . . . . . . . . . . . . . .
290
24.4
Editing an AppArmor Profile . . . . . . . . . . . . . . . . . . . .
290
24.5
Deleting an AppArmor Profile . . . . . . . . . . . . . . . . . . .
290
24.6
Two Methods of Profiling . . . . . . . . . . . . . . . . . . . . .
291
24.7
Important Filenames and Directories . . . . . . . . . . . . . . . .
312
2 5 Profiling Your Web Applications Using ChangeHat
315
25.1
Apache ChangeHat . . . . . . . . . . . . . . . . . . . . . . . .
316
25.2
Configuring Apache for mod_apparmor . . . . . . . . . . . . . . .
322
2 6 Confining Users with pam_apparmor
327
2 7 Managing Profiled Applications
329
27.1
Monitoring Your Secured Applications . . . . . . . . . . . . . . .
329
27.2
Configuring Security Event Notification . . . . . . . . . . . . . . .
330
27.3
Configuring Reports . . . . . . . . . . . . . . . . . . . . . . .
333
Содержание LINUX ENTERPRISE DESKTOP 11
Страница 1: ...SUSE Linux Enterprise Server www novell com 11 March 17 2009 Security Guide...
Страница 9: ...32 7 Managing Audit Event Records Using Keys 433 33 Useful Resources 435...
Страница 10: ......
Страница 29: ...Part I Authentication...
Страница 30: ......
Страница 55: ...Figure 4 2 YaST LDAP Server Configuration LDAP A Directory Service 41...
Страница 126: ......
Страница 127: ...Part II Local Security...
Страница 128: ......
Страница 158: ......
Страница 173: ...Part III Network Security...
Страница 174: ......
Страница 194: ......
Страница 197: ...Figure 16 2 Scenario 2 Figure 16 3 Scenario 3 Configuring VPN Server 183...
Страница 210: ......
Страница 228: ......
Страница 229: ...Part IV Confining Privileges with Novell AppArmor...
Страница 230: ......
Страница 274: ......
Страница 300: ......
Страница 328: ......
Страница 340: ......
Страница 342: ......
Страница 386: ......
Страница 387: ...Part V The Linux Audit Framework...
Страница 388: ......