^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1) ========
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2) AppArmor
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3) ========
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 4)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 5) What is AppArmor?
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 6) =================
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 7)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 8) AppArmor is MAC style security extension for the Linux kernel. It implements
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 9) a task centered policy, with task "profiles" being created and loaded
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 10) from user space. Tasks on the system that do not have a profile defined for
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 11) them run in an unconfined state which is equivalent to standard Linux DAC
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 12) permissions.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 13)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 14) How to enable/disable
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 15) =====================
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 16)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 17) set ``CONFIG_SECURITY_APPARMOR=y``
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 18)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 19) If AppArmor should be selected as the default security module then set::
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 20)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 21) CONFIG_DEFAULT_SECURITY="apparmor"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 22) CONFIG_SECURITY_APPARMOR_BOOTPARAM_VALUE=1
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 23)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 24) Build the kernel
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 25)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 26) If AppArmor is not the default security module it can be enabled by passing
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 27) ``security=apparmor`` on the kernel's command line.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 28)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 29) If AppArmor is the default security module it can be disabled by passing
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 30) ``apparmor=0, security=XXXX`` (where ``XXXX`` is valid security module), on the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 31) kernel's command line.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 32)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 33) For AppArmor to enforce any restrictions beyond standard Linux DAC permissions
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 34) policy must be loaded into the kernel from user space (see the Documentation
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 35) and tools links).
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 36)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 37) Documentation
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 38) =============
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 39)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 40) Documentation can be found on the wiki, linked below.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 41)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 42) Links
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 43) =====
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 44)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 45) Mailing List - apparmor@lists.ubuntu.com
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 46)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 47) Wiki - http://wiki.apparmor.net
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 48)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 49) User space tools - https://gitlab.com/apparmor
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 50)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 51) Kernel module - git://git.kernel.org/pub/scm/linux/kernel/git/jj/linux-apparmor