OXIESEC PANEL
- Current Dir:
/
/
etc
/
apparmor.d
/
abstractions
/
ubuntu-browsers.d
Server IP: 139.59.38.164
Upload:
Create Dir:
Name
Size
Modified
Perms
📁
..
-
05/09/2024 07:14:29 AM
rwxr-xr-x
📄
java
3.79 KB
09/27/2018 06:20:54 PM
rw-r--r--
📄
kde
248 bytes
09/27/2018 06:20:54 PM
rw-r--r--
📄
mailto
324 bytes
09/27/2018 06:20:54 PM
rw-r--r--
📄
multimedia
1.73 KB
09/27/2018 06:20:54 PM
rw-r--r--
📄
plugins-common
334 bytes
09/27/2018 06:20:54 PM
rw-r--r--
📄
productivity
993 bytes
09/27/2018 06:20:54 PM
rw-r--r--
📄
text-editors
654 bytes
09/27/2018 06:20:54 PM
rw-r--r--
📄
ubuntu-integration
1.4 KB
09/27/2018 06:20:54 PM
rw-r--r--
📄
ubuntu-integration-xul
168 bytes
09/27/2018 06:20:54 PM
rw-r--r--
📄
user-files
862 bytes
09/27/2018 06:20:54 PM
rw-r--r--
Editing: user-files
Close
# vim:syntax=apparmor # Allow read to all files user has DAC access to and write access to all # files owned by the user in $HOME. @{HOME}/ r, @{HOME}/** r, owner @{HOME}/** w, # Do not allow read and/or write to particularly sensitive/problematic files #include <abstractions/private-files> audit deny @{HOME}/.ssh/{,**} mrwkl, audit deny @{HOME}/.gnome2_private/{,**} mrwkl, audit deny @{HOME}/.kde{,4}/{,share/,share/apps/} w, audit deny @{HOME}/.kde{,4}/share/apps/kwallet/{,**} mrwkl, # Comment this out if using gpg plugin/addons audit deny @{HOME}/.gnupg/{,**} mrwkl, # Allow read to all files user has DAC access to and write for files the user # owns on removable media and filesystems. /media/** r, /mnt/** r, /srv/** r, /net/** r, owner /media/** w, owner /mnt/** w, owner /srv/** w, owner /net/** w,