Ubuntu Unleashed 2019 Edition: Covering 18.04, 18.10, 19.04

(singke) #1

should be allowed or denied. The program then writes a text file in
/etc/apparmor.d, using the name of the program and its path (in this
case, opt.google.chrome.google-chrome, which in this case was
installed directly from Google [www.google.com/chrome?platform=linux], so
no premade AppArmor profile exists on the system used in this example).
You may then edit the text file as desired, which you must do if you want to
change from complain mode to enforce mode.


When you have a set of profiles that cover what you need, these are the
commands you will use most often:


start:  Use the start   command as  follows:

Click here to view code image
matthew@seymour~:$ sudo service apparmor start


stop:   Use the stop    command as  follows:

Click here to view code image
matthew@seymour~:$ sudo service apparmor stop


reload: Use the reload  command as  follows:

Click here to view code image
matthew@seymour~:$ sudo service apparmor reload (or restart)


show    status: Use the show    status  command as  follows:

Click here to view code image
matthew@seymour~:$ sudo service apparmor status


This section has just scratched the surface of AppArmor, but hopefully you
have learned enough information that your appetite has been whetted, and you
are ready to do some further reading.


Forming a Disaster Recovery Plan


No one likes planning for the worst, which probably explains why two-thirds
of people do not have wills. It is a scary thing to have your systems hacked:
One or more criminals has broken through your carefully laid blocks and
caused untold damage to the machine. Your boss, if you have one, wants a
full report of what happened and why, and your users want their email when
they sit down at their desks in the morning. What to do?


If you ever do get hacked, nothing will take the stress away entirely.
However, if you take the time to prepare a proper response in advance, you

Free download pdf