X-Git-Url: https://git.lizzy.rs/?a=blobdiff_plain;f=apparmor%2Ftorbrowser.Browser.firefox;h=41fb76afe2de172659688c65a27474849a5c8e1d;hb=d44475f041457818f93f47906878356c28de9fe6;hp=25a438ba0dbe35a745dfab49ced7078fe811cffa;hpb=4290066b056757a32e3ac472bedd5834b3e2c92c;p=torbrowser-launcher.git diff --git a/apparmor/torbrowser.Browser.firefox b/apparmor/torbrowser.Browser.firefox index 25a438b..41fb76a 100644 --- a/apparmor/torbrowser.Browser.firefox +++ b/apparmor/torbrowser.Browser.firefox @@ -1,17 +1,29 @@ #include #include -/home/*/.local/share/torbrowser/tbb/{i686,x86_64}/tor-browser_*/Browser/firefox { +@{torbrowser_firefox_executable} = /home/*/.local/share/torbrowser/tbb/{i686,x86_64}/tor-browser_*/Browser/firefox.real + +profile torbrowser_firefox @{torbrowser_firefox_executable} { + #include #include + #include + #include if exists # Uncomment the following lines if you want to give the Tor Browser read-write # access to most of your personal files. # #include # @{HOME}/ r, + # Audio support + /{,usr/}bin/pulseaudio Pixr, + #dbus, + network netlink raw, network tcp, + ptrace (trace) peer=@{profile_name}, + signal (receive, send) set=("term") peer=@{profile_name}, + deny /etc/host.conf r, deny /etc/hosts r, deny /etc/nsswitch.conf r, @@ -20,9 +32,15 @@ deny /etc/group r, deny /etc/mailcap r, - deny /etc/machine-id r, - deny /var/lib/dbus/machine-id r, + /etc/machine-id r, + /var/lib/dbus/machine-id r, + + /dev/ r, + /dev/shm/ r, + owner @{PROC}/@{pid}/cgroup r, + owner @{PROC}/@{pid}/environ r, + owner @{PROC}/@{pid}/fd/ r, owner @{PROC}/@{pid}/mountinfo r, owner @{PROC}/@{pid}/stat r, owner @{PROC}/@{pid}/status r, @@ -39,23 +57,36 @@ owner @{torbrowser_home_dir}.bak/ rwk, owner @{torbrowser_home_dir}.bak/** rwk, owner @{torbrowser_home_dir}/*.so mr, - owner @{torbrowser_home_dir}/components/*.so mr, - owner @{torbrowser_home_dir}/browser/components/*.so mr, + owner @{torbrowser_home_dir}/.cache/fontconfig/ rwk, + owner @{torbrowser_home_dir}/.cache/fontconfig/** rwkl, + owner @{torbrowser_home_dir}/browser/** r, + owner @{torbrowser_home_dir}/{,browser/}components/*.so mr, + owner @{torbrowser_home_dir}/Downloads/ rwk, + owner @{torbrowser_home_dir}/Downloads/** rwk, owner @{torbrowser_home_dir}/firefox rix, - owner @{torbrowser_home_dir}/plugin-container px -> torbrowser_plugin_container, - owner @{torbrowser_home_dir}/{,TorBrowser/UpdateInfo/}updates/[0-9]*/updater ix, - owner @{torbrowser_home_dir}/{,TorBrowser/UpdateInfo/}updates/0/MozUpdater/bgupdate/updater ix, + owner @{torbrowser_home_dir}/{,TorBrowser/UpdateInfo/}updates/[0-9]*/* rw, + owner @{torbrowser_home_dir}/{,TorBrowser/UpdateInfo/}updates/[0-9]*/{,MozUpdater/bgupdate/}updater ix, + owner @{torbrowser_home_dir}/updater ix, + owner @{torbrowser_home_dir}/TorBrowser/Data/Browser/.parentwritetest rw, owner @{torbrowser_home_dir}/TorBrowser/Data/Browser/profiles.ini r, - owner @{torbrowser_home_dir}/TorBrowser/Data/Browser/profile.default/ r, + owner @{torbrowser_home_dir}/TorBrowser/Data/Browser/profile.default/{,**} rwk, + owner @{torbrowser_home_dir}/TorBrowser/Data/fontconfig/fonts.conf r, + owner @{torbrowser_home_dir}/fonts/* l, owner @{torbrowser_home_dir}/TorBrowser/Tor/tor px, owner @{torbrowser_home_dir}/TorBrowser/Tor/ r, owner @{torbrowser_home_dir}/TorBrowser/Tor/*.so mr, owner @{torbrowser_home_dir}/TorBrowser/Tor/*.so.* mr, + owner @{torbrowser_home_dir}/TorBrowser/Tor/libstdc++/*.so mr, + owner @{torbrowser_home_dir}/TorBrowser/Tor/libstdc++/*.so.* mr, + + # parent Firefox process when restarting after upgrade, Web Content processes + owner @{torbrowser_firefox_executable} pxmr -> torbrowser_firefox, /etc/mailcap r, /etc/mime.types r, /usr/share/ r, + /usr/share/glib-2.0/schemas/gschemas.compiled r, /usr/share/mime/ r, /usr/share/themes/ r, /usr/share/applications/** rk, @@ -71,6 +102,7 @@ /sys/devices/system/cpu/present r, /sys/devices/system/node/ r, /sys/devices/system/node/node[0-9]*/meminfo r, + /sys/fs/cgroup/cpu,cpuacct/{,user.slice/}cpu.cfs_quota_us r, deny /sys/devices/virtual/block/*/uevent r, # Should use abstractions/gstreamer instead once merged upstream @@ -81,6 +113,10 @@ # Required for multiprocess Firefox (aka Electrolysis, i.e. e10s) owner /{dev,run}/shm/org.chromium.* rw, + owner /dev/shm/org.mozilla.ipc.[0-9]*.[0-9]* rw, # for Chromium IPC + + # Required for Wayland display protocol support + owner /dev/shm/wayland.mozilla.ipc.[0-9]* rw, # Deny access to DRM nodes, that's granted by the X abstraction, which is # sourced by the gnome abstraction, that we include. @@ -88,9 +124,19 @@ # Silence denial logs about permissions we don't need deny /dev/dri/ rwklx, + deny @{HOME}/.cache/fontconfig/ rw, + deny @{HOME}/.cache/fontconfig/** rw, + deny @{HOME}/.config/gtk-2.0/ rw, + deny @{HOME}/.config/gtk-2.0/** rw, deny @{PROC}/@{pid}/net/route r, deny /sys/devices/system/cpu/cpufreq/policy[0-9]*/cpuinfo_max_freq r, deny /sys/devices/system/cpu/*/cache/index[0-9]*/size r, + deny /run/user/[0-9]*/dconf/user rw, + deny /usr/bin/lsb_release x, + + # Silence denial logs about PulseAudio + deny /etc/pulse/client.conf r, + deny /usr/bin/pulseaudio x, # KDE 4 owner @{HOME}/.kde/share/config/* r, @@ -99,5 +145,20 @@ /etc/xfce4/defaults.list r, /usr/share/xfce4/applications/ r, + # u2f (tested with Yubikey 4) + /sys/class/ r, + /sys/bus/ r, + /sys/class/hidraw/ r, + /run/udev/data/c24{5,7,9}:* r, + /dev/hidraw* rw, + # Yubikey NEO also needs this: + /sys/devices/**/hidraw/hidraw*/uevent r, + + # Needed for Firefox sandboxing via unprivileged user namespaces + capability sys_admin, + capability sys_chroot, + owner @{PROC}/@{pid}/{gid,uid}_map w, + owner @{PROC}/@{pid}/setgroups w, + #include }