OXIESEC PANEL
- Current Dir:
/
/
snap
/
core24
/
988
/
etc
/
apparmor.d
/
abstractions
/
ubuntu-browsers.d
Server IP: 139.59.38.164
Upload:
Create Dir:
Name
Size
Modified
Perms
📁
..
-
05/04/2025 04:37:49 PM
rwxr-xr-x
📄
chromium-browser
1018 bytes
03/19/2025 06:09:43 PM
rw-r--r--
📄
java
3.8 KB
03/19/2025 06:09:43 PM
rw-r--r--
📄
kde
381 bytes
03/19/2025 06:09:43 PM
rw-r--r--
📄
mailto
339 bytes
03/19/2025 06:09:43 PM
rw-r--r--
📄
multimedia
1.38 KB
03/19/2025 06:09:43 PM
rw-r--r--
📄
plugins-common
351 bytes
03/19/2025 06:09:43 PM
rw-r--r--
📄
productivity
894 bytes
03/19/2025 06:09:43 PM
rw-r--r--
📄
text-editors
672 bytes
03/19/2025 06:09:43 PM
rw-r--r--
📄
ubuntu-integration
1.11 KB
03/19/2025 06:09:43 PM
rw-r--r--
📄
ubuntu-integration-xul
185 bytes
03/19/2025 06:09:43 PM
rw-r--r--
📄
user-files
935 bytes
03/19/2025 06:09:43 PM
rw-r--r--
Editing: user-files
Close
# vim:syntax=apparmor abi <abi/4.0>, # Allow read to all files user has DAC access to and write access to all # files owned by the user in $HOME. @{HOME}/ r, @{HOME}/** r, owner @{HOME}/** w, # Do not allow read and/or write to particularly sensitive/problematic files include <abstractions/private-files> audit deny @{HOME}/.ssh/{,**} mrwkl, audit deny @{HOME}/.gnome2_private/{,**} mrwkl, audit deny @{HOME}/.kde{,4}/{,share/,share/apps/} w, audit deny @{HOME}/.kde{,4}/share/apps/kwallet/{,**} mrwkl, audit deny @{HOME}/.local/share/kwalletd/{,**} mrwkl, # Comment this out if using gpg plugin/addons audit deny @{HOME}/.gnupg/{,**} mrwkl, # Allow read to all files user has DAC access to and write for files the user # owns on removable media and filesystems. /media/** r, /mnt/** r, /srv/** r, /net/** r, owner /media/** w, owner /mnt/** w, owner /srv/** w, owner /net/** w,