Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Feature request] Add sandboxing options and apparmor profile #43

Open
knlnlo opened this issue Nov 22, 2021 · 4 comments
Open

[Feature request] Add sandboxing options and apparmor profile #43

knlnlo opened this issue Nov 22, 2021 · 4 comments

Comments

@knlnlo
Copy link

knlnlo commented Nov 22, 2021

Hi!

The systemd services can now use sandboxing options, which has a positive effect on security. I would like noisy to use these settings as well. Also, additionally consider creating an apparmor profile.

Thanks for noisy!

@fireneat
Copy link

fireneat commented Nov 27, 2021

I have already done it in my fork fireneat/Noisy here also I think it would be better to have seccomp profile because you can use ioctl which I don't think apparmor has. And if you want to sandbox Noisy then I think you would need to sandbox Python3 completly, anyways here is the profile if you're still interested:

#include <tunables/global>

/usr/bin/python3.9 {
  #include <abstractions/base>
  #include <abstractions/nameservice>
  #include <abstractions/openssl>
  #include <abstractions/python>

  /usr/bin/python3.9 mr,
  owner /noisy/ r,
  owner /noisy/config.json r,
  owner /noisy/noisy.py r,

}

@knlnlo
Copy link
Author

knlnlo commented Nov 28, 2021

Thank you very much. I understand that this version is no longer in development?

@Zbergen-cli
Copy link

@fireneat,You do realize that you are restricting all python and all scripts written in it, right?

@fireneat
Copy link

@Zbergen-cli Yes, I've also mentioned it, therefore I think it's only use case would be in Docker

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants