/etc/apparmor.d/usr.sbin.unbound is in unbound 1.6.7-1ubuntu2.
This file is owned by root:root, with mode 0o644.
The actual contents of the file can be viewed below.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 | # Author: Simon Deziel
# vim:syntax=apparmor
#include <tunables/global>
/usr/sbin/unbound {
#include <abstractions/base>
#include <abstractions/nameservice>
#include <abstractions/openssl>
# chown the PID/Unix control socket
capability chown,
# chmod the Unix control socket
capability fowner,
capability fsetid,
# added to abstractions/nameservices in Apparmor 2.12
/var/lib/sss/mc/initgroups r,
capability net_bind_service,
capability setgid,
capability setuid,
capability sys_chroot,
capability sys_resource,
# root trust anchor
owner /var/lib/unbound/root.key* rw,
# root hints from dns-data-root
/usr/share/dns/root.* r,
# non-chrooted paths
/etc/unbound/** r,
owner /etc/unbound/*.key* rw,
audit deny /etc/unbound/unbound_control.{key,pem} rw,
audit deny /etc/unbound/unbound_server.key w,
# chrooted paths
/var/lib/unbound/** r,
owner /var/lib/unbound/**/*.key* rw,
audit deny /var/lib/unbound/**/unbound_control.{key,pem} rw,
audit deny /var/lib/unbound/**/unbound_server.key w,
/usr/sbin/unbound mr,
/{,var/}run/systemd/notify w,
/{,var/}run/{unbound/,}unbound.pid rw,
# Unix control socket
/{,var/}run/unbound.ctl rw,
#include <local/usr.sbin.unbound>
}
|