summaryrefslogtreecommitdiff
path: root/debian/usr.sbin.charon-systemd
AgeCommit message (Collapse)Author
2018-09-24Remove redundant capabilities in charon Apparmor profilesSimon Deziel
2018-09-24Fix typo in comment of charon Apparmor profilesSimon Deziel
2018-08-07update AppArmor templates to handle usr mergeYves-Alexis Perez
Thanks Christian Ehrhardt for the patch closes: #905082
2018-04-27update charon-systemd AppArmor profileYves-Alexis Perez
allow access to {,/var}/run/notify closes: #896813
2017-06-30Install AppArmor profiles for /usr/sbin/swanctl and /usr/sbin/charon-systemd.Gerald Turner
The AppArmor profile for charon-systemd was copied from the existing profile for /usr/lib/ipsec/charon without much scrutiny other than testing basic IPsec tunnels (no fancy plugin options were tested). It appears that the team at Canonical that had written the /usr/lib/ipsec/charon policy had done extensive testing with several plugins, and it seems likely that applying the same profile to charon-systemd will allow those plugins to continue to work. The AppArmor profile for swanctl was written from scratch and well tested. It turns out that swanctl unnecessarily loads plugins by default, so a bit of frivolous access has been granted.