OXIESEC PANEL
- Current Dir:
/
/
snap
/
core
/
17210
/
etc
/
apparmor.d
/
abstractions
/
ubuntu-browsers.d
Server IP: 139.59.38.164
Upload:
Create Dir:
Name
Size
Modified
Perms
📁
..
-
10/02/2024 07:52:55 PM
rwxr-xr-x
📄
java
3.5 KB
06/29/2023 11:30:41 AM
rw-r--r--
📄
kde
248 bytes
06/29/2023 11:30:41 AM
rw-r--r--
📄
mailto
324 bytes
06/29/2023 11:30:41 AM
rw-r--r--
📄
multimedia
1.67 KB
06/29/2023 11:30:41 AM
rw-r--r--
📄
plugins-common
334 bytes
06/29/2023 11:30:41 AM
rw-r--r--
📄
productivity
993 bytes
06/29/2023 11:30:41 AM
rw-r--r--
📄
text-editors
654 bytes
06/29/2023 11:30:41 AM
rw-r--r--
📄
ubuntu-integration
1.4 KB
06/29/2023 11:30:41 AM
rw-r--r--
📄
ubuntu-integration-xul
168 bytes
06/29/2023 11:30:41 AM
rw-r--r--
📄
user-files
862 bytes
06/29/2023 11:30:41 AM
rw-r--r--
Editing: user-files
Close
# vim:syntax=apparmor # Allow read to all files user has DAC access to and write access to all # files owned by the user in $HOME. @{HOME}/ r, @{HOME}/** r, owner @{HOME}/** w, # Do not allow read and/or write to particularly sensitive/problematic files #include <abstractions/private-files> audit deny @{HOME}/.ssh/{,**} mrwkl, audit deny @{HOME}/.gnome2_private/{,**} mrwkl, audit deny @{HOME}/.kde{,4}/{,share/,share/apps/} w, audit deny @{HOME}/.kde{,4}/share/apps/kwallet/{,**} mrwkl, # Comment this out if using gpg plugin/addons audit deny @{HOME}/.gnupg/{,**} mrwkl, # Allow read to all files user has DAC access to and write for files the user # owns on removable media and filesystems. /media/** r, /mnt/** r, /srv/** r, /net/** r, owner /media/** w, owner /mnt/** w, owner /srv/** w, owner /net/** w,