aboutsummaryrefslogtreecommitdiffstats
path: root/etc/inc/disable-common.inc
diff options
context:
space:
mode:
Diffstat (limited to 'etc/inc/disable-common.inc')
-rw-r--r--etc/inc/disable-common.inc113
1 files changed, 72 insertions, 41 deletions
diff --git a/etc/inc/disable-common.inc b/etc/inc/disable-common.inc
index 2dc53d311..ae84ee38a 100644
--- a/etc/inc/disable-common.inc
+++ b/etc/inc/disable-common.inc
@@ -159,20 +159,23 @@ blacklist ${RUNUSER}/gsconnect
159# systemd 159# systemd
160blacklist ${HOME}/.config/systemd 160blacklist ${HOME}/.config/systemd
161blacklist ${HOME}/.local/share/systemd 161blacklist ${HOME}/.local/share/systemd
162blacklist /var/lib/systemd 162blacklist ${PATH}/systemctl
163blacklist ${PATH}/systemd-run 163blacklist ${PATH}/systemd-run
164blacklist ${RUNUSER}/systemd 164blacklist ${RUNUSER}/systemd
165blacklist /etc/systemd/network
166blacklist /etc/systemd/system
167blacklist /var/lib/systemd
165# creates problems on Arch where /etc/resolv.conf is a symlink to /var/run/systemd/resolve/resolv.conf 168# creates problems on Arch where /etc/resolv.conf is a symlink to /var/run/systemd/resolve/resolv.conf
166#blacklist /var/run/systemd 169#blacklist /var/run/systemd
167 170
168# openrc 171# openrc
169blacklist /etc/runlevels/ 172blacklist /etc/init.d
170blacklist /etc/init.d/
171blacklist /etc/rc.conf 173blacklist /etc/rc.conf
174blacklist /etc/runlevels
172 175
173# VirtualBox 176# VirtualBox
174blacklist ${HOME}/.VirtualBox
175blacklist ${HOME}/.config/VirtualBox 177blacklist ${HOME}/.config/VirtualBox
178blacklist ${HOME}/.VirtualBox
176blacklist ${HOME}/VirtualBox VMs 179blacklist ${HOME}/VirtualBox VMs
177 180
178# GNOME Boxes 181# GNOME Boxes
@@ -242,20 +245,34 @@ blacklist /var/spool/cron
242blacklist /var/spool/mail 245blacklist /var/spool/mail
243 246
244# etc 247# etc
248blacklist /etc/adduser.conf
245blacklist /etc/anacrontab 249blacklist /etc/anacrontab
250blacklist /etc/apparmor*
246blacklist /etc/cron* 251blacklist /etc/cron*
252blacklist /etc/default
253blacklist /etc/dkms
254blacklist /etc/grub*
255blacklist /etc/kernel*
256blacklist /etc/logrotate*
257blacklist /etc/modules*
247blacklist /etc/profile.d 258blacklist /etc/profile.d
248blacklist /etc/rc.local 259blacklist /etc/rc.local
249# rc1.d, rc2.d, ... 260# rc1.d, rc2.d, ...
250blacklist /etc/rc?.d 261blacklist /etc/rc?.d
251blacklist /etc/kernel* 262blacklist /etc/sysconfig
252blacklist /etc/grub* 263
253blacklist /etc/dkms 264# hide config for various intrusion detection systems
254blacklist /etc/apparmor* 265blacklist /etc/aide
255blacklist /etc/selinux 266blacklist /etc/aide.conf
256blacklist /etc/modules* 267blacklist /etc/chkrootkit.conf
257blacklist /etc/logrotate* 268blacklist /etc/fail2ban.conf
258blacklist /etc/adduser.conf 269blacklist /etc/logcheck
270blacklist /etc/lynis
271blacklist /etc/rkhunter.*
272blacklist /etc/snort
273blacklist /etc/suricata
274blacklist /etc/tripwire
275blacklist /var/lib/rkhunter
259 276
260# Startup files 277# Startup files
261read-only ${HOME}/.antigen 278read-only ${HOME}/.antigen
@@ -335,15 +352,15 @@ read-only ${HOME}/_vimrc
335read-only ${HOME}/dotfiles 352read-only ${HOME}/dotfiles
336 353
337# Make directories commonly found in $PATH read-only 354# Make directories commonly found in $PATH read-only
355read-only ${HOME}/.bin
356read-only ${HOME}/.cargo/bin
338read-only ${HOME}/.gem 357read-only ${HOME}/.gem
358read-only ${HOME}/.local/bin
339read-only ${HOME}/.luarocks 359read-only ${HOME}/.luarocks
340read-only ${HOME}/.npm-packages 360read-only ${HOME}/.npm-packages
341read-only ${HOME}/.nvm 361read-only ${HOME}/.nvm
342read-only ${HOME}/bin
343read-only ${HOME}/.bin
344read-only ${HOME}/.local/bin
345read-only ${HOME}/.cargo/bin
346read-only ${HOME}/.rustup 362read-only ${HOME}/.rustup
363read-only ${HOME}/bin
347 364
348# Write-protection for desktop entries 365# Write-protection for desktop entries
349read-only ${HOME}/.config/menus 366read-only ${HOME}/.config/menus
@@ -362,14 +379,32 @@ read-only ${HOME}/.local/share/thumbnailers
362blacklist /tmp/ssh-* 379blacklist /tmp/ssh-*
363 380
364# top secret 381# top secret
382blacklist /.fscrypt
383blacklist /etc/davfs2/secrets
384blacklist /etc/group+
385blacklist /etc/group-
386blacklist /etc/gshadow
387blacklist /etc/gshadow+
388blacklist /etc/gshadow-
389blacklist /etc/passwd+
390blacklist /etc/passwd-
391blacklist /etc/shadow
392blacklist /etc/shadow+
393blacklist /etc/shadow-
394blacklist /etc/ssh
395blacklist /etc/ssh/*
396blacklist /home/.ecryptfs
397blacklist /home/.fscrypt
365blacklist ${HOME}/*.kdb 398blacklist ${HOME}/*.kdb
366blacklist ${HOME}/*.kdbx 399blacklist ${HOME}/*.kdbx
367blacklist ${HOME}/*.key 400blacklist ${HOME}/*.key
401blacklist ${HOME}/Private
368blacklist ${HOME}/.Private 402blacklist ${HOME}/.Private
369blacklist ${HOME}/.caff 403blacklist ${HOME}/.caff
370blacklist ${HOME}/.cargo/credentials 404blacklist ${HOME}/.cargo/credentials
371blacklist ${HOME}/.cargo/credentials.toml 405blacklist ${HOME}/.cargo/credentials.toml
372blacklist ${HOME}/.cert 406blacklist ${HOME}/.cert
407blacklist ${HOME}/.config/hub
373blacklist ${HOME}/.config/keybase 408blacklist ${HOME}/.config/keybase
374blacklist ${HOME}/.davfs2/secrets 409blacklist ${HOME}/.davfs2/secrets
375blacklist ${HOME}/.ecryptfs 410blacklist ${HOME}/.ecryptfs
@@ -379,40 +414,36 @@ blacklist ${HOME}/.git-credential-cache
379blacklist ${HOME}/.git-credentials 414blacklist ${HOME}/.git-credentials
380blacklist ${HOME}/.gnome2/keyrings 415blacklist ${HOME}/.gnome2/keyrings
381blacklist ${HOME}/.gnupg 416blacklist ${HOME}/.gnupg
382blacklist ${HOME}/.config/hub
383blacklist ${HOME}/.kde/share/apps/kwallet 417blacklist ${HOME}/.kde/share/apps/kwallet
384blacklist ${HOME}/.kde4/share/apps/kwallet 418blacklist ${HOME}/.kde4/share/apps/kwallet
385blacklist ${HOME}/.local/share/keyrings 419blacklist ${HOME}/.local/share/keyrings
386blacklist ${HOME}/.local/share/kwalletd 420blacklist ${HOME}/.local/share/kwalletd
421blacklist ${HOME}/.local/share/pki
387blacklist ${HOME}/.local/share/plasma-vault 422blacklist ${HOME}/.local/share/plasma-vault
423blacklist ${HOME}/.minisign
388blacklist ${HOME}/.msmtprc 424blacklist ${HOME}/.msmtprc
389blacklist ${HOME}/.mutt 425blacklist ${HOME}/.mutt
390blacklist ${HOME}/.muttrc 426blacklist ${HOME}/.muttrc
391blacklist ${HOME}/.netrc 427blacklist ${HOME}/.netrc
392blacklist ${HOME}/.nyx 428blacklist ${HOME}/.nyx
393blacklist ${HOME}/.pki 429blacklist ${HOME}/.pki
394blacklist ${HOME}/.local/share/pki
395blacklist ${HOME}/.smbcredentials 430blacklist ${HOME}/.smbcredentials
396blacklist ${HOME}/.ssh 431blacklist ${HOME}/.ssh
397blacklist ${HOME}/.vaults 432blacklist ${HOME}/.vaults
398blacklist /.fscrypt
399blacklist /etc/davfs2/secrets
400blacklist /etc/group+
401blacklist /etc/group-
402blacklist /etc/gshadow
403blacklist /etc/gshadow+
404blacklist /etc/gshadow-
405blacklist /etc/passwd+
406blacklist /etc/passwd-
407blacklist /etc/shadow
408blacklist /etc/shadow+
409blacklist /etc/shadow-
410blacklist /etc/ssh
411blacklist /etc/ssh/*
412blacklist /home/.ecryptfs
413blacklist /home/.fscrypt
414blacklist /var/backup 433blacklist /var/backup
415 434
435# Remove environment variables with auth tokens.
436# Note however that the sandbox might still have access to the
437# files where these variables are set.
438rmenv GH_TOKEN
439rmenv GITHUB_TOKEN
440rmenv GH_ENTERPRISE_TOKEN
441rmenv GITHUB_ENTERPRISE_TOKEN
442rmenv CARGO_REGISTRY_TOKEN
443rmenv RESTIC_KEY_HINT
444rmenv RESTIC_PASSWORD_COMMAND
445rmenv RESTIC_PASSWORD_FILE
446
416# cloud provider configuration 447# cloud provider configuration
417blacklist ${HOME}/.aws 448blacklist ${HOME}/.aws
418blacklist ${HOME}/.boto 449blacklist ${HOME}/.boto
@@ -473,10 +504,12 @@ blacklist /tmp/.lxterminal-socket*
473blacklist /tmp/tmux-* 504blacklist /tmp/tmux-*
474 505
475# disable terminals running as server resulting in sandbox escape 506# disable terminals running as server resulting in sandbox escape
476blacklist ${PATH}/lxterminal
477blacklist ${PATH}/gnome-terminal 507blacklist ${PATH}/gnome-terminal
478blacklist ${PATH}/gnome-terminal.wrapper 508blacklist ${PATH}/gnome-terminal.wrapper
509# blacklist ${PATH}/konsole
510# konsole doesn't seem to have this problem - last tested on Ubuntu 16.04
479blacklist ${PATH}/lilyterm 511blacklist ${PATH}/lilyterm
512blacklist ${PATH}/lxterminal
480blacklist ${PATH}/mate-terminal 513blacklist ${PATH}/mate-terminal
481blacklist ${PATH}/mate-terminal.wrapper 514blacklist ${PATH}/mate-terminal.wrapper
482blacklist ${PATH}/pantheon-terminal 515blacklist ${PATH}/pantheon-terminal
@@ -488,8 +521,6 @@ blacklist ${PATH}/urxvtc
488blacklist ${PATH}/urxvtcd 521blacklist ${PATH}/urxvtcd
489blacklist ${PATH}/xfce4-terminal 522blacklist ${PATH}/xfce4-terminal
490blacklist ${PATH}/xfce4-terminal.wrapper 523blacklist ${PATH}/xfce4-terminal.wrapper
491# blacklist ${PATH}/konsole
492# konsole doesn't seem to have this problem - last tested on Ubuntu 16.04
493 524
494# kernel files 525# kernel files
495blacklist /initrd* 526blacklist /initrd*
@@ -505,17 +536,17 @@ noblacklist ${HOME}/.local/share/flatpak/exports
505read-only ${HOME}/.local/share/flatpak/exports 536read-only ${HOME}/.local/share/flatpak/exports
506blacklist ${HOME}/.local/share/flatpak/* 537blacklist ${HOME}/.local/share/flatpak/*
507blacklist ${HOME}/.var 538blacklist ${HOME}/.var
508blacklist ${RUNUSER}/app 539# most of the time bwrap is SUID binary
509blacklist ${RUNUSER}/doc 540blacklist ${PATH}/bwrap
510blacklist ${RUNUSER}/.dbus-proxy 541blacklist ${RUNUSER}/.dbus-proxy
511blacklist ${RUNUSER}/.flatpak 542blacklist ${RUNUSER}/.flatpak
512blacklist ${RUNUSER}/.flatpak-cache 543blacklist ${RUNUSER}/.flatpak-cache
513blacklist ${RUNUSER}/.flatpak-helper 544blacklist ${RUNUSER}/.flatpak-helper
545blacklist ${RUNUSER}/app
546blacklist ${RUNUSER}/doc
514blacklist /usr/share/flatpak 547blacklist /usr/share/flatpak
515noblacklist /var/lib/flatpak/exports 548noblacklist /var/lib/flatpak/exports
516blacklist /var/lib/flatpak/* 549blacklist /var/lib/flatpak/*
517# most of the time bwrap is SUID binary
518blacklist ${PATH}/bwrap
519 550
520# snap 551# snap
521blacklist ${RUNUSER}/snapd-session-agent.socket 552blacklist ${RUNUSER}/snapd-session-agent.socket