Hello,

First of all, I'd like to thank you for such a nice product. I was
working before with selinux (on centos servers) and apparmor (on my
desktop machine) and tomoyo is definitely the most easy one to setup,
and yet it is quite powerful (much more then apparmor). I especially
like how the process tree is displayed and I can see which execution
path is doing what.

I'm setting it up my desktop machine to "isolate" firefox and similar
programs from the rest of the system (mandriva 2009.1, tomoyo 1.6.7).
I've put:

initialize_domain /home/vladap/software/firefox/firefox
keep_domain /home/vladap/software/firefox/firefox

so I can easily "isolate" firefox. I would like to give permission to
firefox to do whatever it wants in the
/home/vladap/data/firefox directory.  But, I couldn't find the easy
way except repeating many times:

path_group FIREFOX <path>/\*
path_group FIREFOX <path>\*\
path_group FIREFOX <paht>/\*/\*
path_group FIREFOX <path>/\*/\*/
path_group FIREFOX <path>/\*/\*/\*
...

and then for subdirectories, and so on. Maybe I didn't find the right
way, but I think it would be much more usable if tomoyo would support
something like ** (in apparmour) which would match any character
including the / (no matter how many subdirectories are there).

Also, then in the domain_policy I have to say
allow_read/write @FIREFOX
allow_create @FIREFOX
allow_unlink ...
alllow_symlink ...
allow_rename ...

I also think it would be good to have "allow_everything" option. I
know that for "proper" security you should not use such "general"
approach, but for deskop systems I think they would be very useful. Or
maybe something like that exists and I just couldn't find it :-)

best regards,
Vladimir

_______________________________________________
tomoyo-users-en mailing list
[email protected]
http://lists.sourceforge.jp/mailman/listinfo/tomoyo-users-en

Reply via email to