diff options
author | Marc Kleine-Budde <mkl@pengutronix.de> | 2015-06-11 12:18:01 +0200 |
---|---|---|
committer | Marc Kleine-Budde <mkl@pengutronix.de> | 2015-06-18 16:22:13 +0200 |
commit | 28db1773524eb763569939d4066e32dbf50c69a0 (patch) | |
tree | 964e2f4165b48179d7ac39ac8d472788d60f99f0 /projectroot/etc/dbus-1 | |
parent | 878707bd943a04fc8e3a55a151499359e81ce780 (diff) | |
download | ptxdist-28db1773524eb763569939d4066e32dbf50c69a0.tar.gz ptxdist-28db1773524eb763569939d4066e32dbf50c69a0.tar.xz |
generic: rename generic -> projectroot
Signed-off-by: Marc Kleine-Budde <mkl@pengutronix.de>
Diffstat (limited to 'projectroot/etc/dbus-1')
-rw-r--r-- | projectroot/etc/dbus-1/session.conf | 61 | ||||
-rw-r--r-- | projectroot/etc/dbus-1/system.conf | 83 | ||||
-rw-r--r-- | projectroot/etc/dbus-1/system.d/avahi-dbus.conf | 28 |
3 files changed, 172 insertions, 0 deletions
diff --git a/projectroot/etc/dbus-1/session.conf b/projectroot/etc/dbus-1/session.conf new file mode 100644 index 000000000..df9d433cc --- /dev/null +++ b/projectroot/etc/dbus-1/session.conf @@ -0,0 +1,61 @@ +<!-- This configuration file controls the per-user-login-session message bus. + Add a session-local.conf and edit that rather than changing this + file directly. --> + +<!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN" + "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd"> +<busconfig> + <!-- Our well-known bus type, don't change this --> + <type>session</type> + + <!-- If we fork, keep the user's original umask to avoid affecting + the behavior of child processes. --> + <keep_umask/> + + <listen>unix:tmpdir=/tmp</listen> + + <standard_session_servicedirs /> + + <policy context="default"> + <!-- Allow everything to be sent --> + <allow send_destination="*" eavesdrop="true"/> + <!-- Allow everything to be received --> + <allow eavesdrop="true"/> + <!-- Allow anyone to own anything --> + <allow own="*"/> + </policy> + + <!-- Config files are placed here that among other things, + further restrict the above policy for specific services. --> + <includedir>session.d</includedir> + + <!-- This is included last so local configuration can override what's + in this standard file --> + <include ignore_missing="yes">session-local.conf</include> + + <include if_selinux_enabled="yes" selinux_root_relative="yes">contexts/dbus_contexts</include> + + <!-- For the session bus, override the default relatively-low limits + with essentially infinite limits, since the bus is just running + as the user anyway, using up bus resources is not something we need + to worry about. In some cases, we do set the limits lower than + "all available memory" if exceeding the limit is almost certainly a bug, + having the bus enforce a limit is nicer than a huge memory leak. But the + intent is that these limits should never be hit. --> + + <!-- the memory limits are 1G instead of say 4G because they can't exceed 32-bit signed int max --> + <limit name="max_incoming_bytes">1000000000</limit> + <limit name="max_outgoing_bytes">1000000000</limit> + <limit name="max_message_size">1000000000</limit> + <limit name="service_start_timeout">120000</limit> + <limit name="auth_timeout">240000</limit> + <limit name="max_completed_connections">100000</limit> + <limit name="max_incomplete_connections">10000</limit> + <limit name="max_connections_per_user">100000</limit> + <limit name="max_pending_service_starts">10000</limit> + <limit name="max_names_per_connection">50000</limit> + <limit name="max_match_rules_per_connection">50000</limit> + <limit name="max_replies_per_connection">50000</limit> + <limit name="reply_timeout">300000</limit> + +</busconfig> diff --git a/projectroot/etc/dbus-1/system.conf b/projectroot/etc/dbus-1/system.conf new file mode 100644 index 000000000..553efaf60 --- /dev/null +++ b/projectroot/etc/dbus-1/system.conf @@ -0,0 +1,83 @@ +<!-- This configuration file controls the systemwide message bus. + Add a system-local.conf and edit that rather than changing this + file directly. --> + +<!-- Note that there are any number of ways you can hose yourself + security-wise by screwing up this file; in particular, you + probably don't want to listen on any more addresses, add any more + auth mechanisms, run as a different user, etc. --> + +<!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN" + "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd"> +<busconfig> + + <!-- Our well-known bus type, do not change this --> + <type>system</type> + + <!-- Run as special user --> + <user>messagebus</user> + + <!-- Fork into daemon mode --> + <fork/> + + <!-- We use system service launching using a helper --> + <standard_system_servicedirs/> + + <!-- This is a setuid helper that is used to launch system services --> + <servicehelper>/usr/libexec/dbus-daemon-launch-helper</servicehelper> + + <!-- Write a pid file --> + <pidfile>/var/run/dbus/pid</pidfile> + + <!-- Enable logging to syslog --> + <syslog/> + + <!-- Only allow socket-credentials-based authentication --> + <auth>EXTERNAL</auth> + + <!-- Only listen on a local socket. (abstract=/path/to/socket + means use abstract namespace, don't really create filesystem + file; only Linux supports this. Use path=/whatever on other + systems.) --> + <listen>unix:path=/var/run/dbus/system_bus_socket</listen> + + <policy context="default"> + <!-- All users can connect to system bus --> + <allow user="*"/> + + <!-- Holes must be punched in service configuration files for + name ownership and sending method calls --> + <deny own="*"/> + <deny send_type="method_call"/> + + <!-- Signals and reply messages (method returns, errors) are allowed + by default --> + <allow send_type="signal"/> + <allow send_requested_reply="true" send_type="method_return"/> + <allow send_requested_reply="true" send_type="error"/> + + <!-- All messages may be received by default --> + <allow receive_type="method_call"/> + <allow receive_type="method_return"/> + <allow receive_type="error"/> + <allow receive_type="signal"/> + + <!-- Allow anyone to talk to the message bus --> + <allow send_destination="org.freedesktop.DBus"/> + <!-- But disallow some specific bus services --> + <deny send_destination="org.freedesktop.DBus" + send_interface="org.freedesktop.DBus" + send_member="UpdateActivationEnvironment"/> + </policy> + + <!-- Config files are placed here that among other things, punch + holes in the above policy for specific services. --> + <includedir>system.d</includedir> + + <!-- This is included last so local configuration can override what's + in this standard file --> + <include ignore_missing="yes">system-local.conf</include> + + <include if_selinux_enabled="yes" selinux_root_relative="yes">contexts/dbus_contexts</include> + +</busconfig> diff --git a/projectroot/etc/dbus-1/system.d/avahi-dbus.conf b/projectroot/etc/dbus-1/system.d/avahi-dbus.conf new file mode 100644 index 000000000..ecea91430 --- /dev/null +++ b/projectroot/etc/dbus-1/system.d/avahi-dbus.conf @@ -0,0 +1,28 @@ +<!DOCTYPE busconfig PUBLIC + "-//freedesktop//DTD D-BUS Bus Configuration 1.0//EN" + "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd"> +<busconfig> + + <!-- Only root or user avahi can own the Avahi service --> + <policy user="avahi"> + <allow own="org.freedesktop.Avahi"/> + </policy> + <policy user="root"> + <allow own="org.freedesktop.Avahi"/> + </policy> + + <!-- Allow anyone to invoke methods on Avahi server, except SetHostName --> + <policy context="default"> + <allow send_destination="org.freedesktop.Avahi"/> + <allow receive_sender="org.freedesktop.Avahi"/> + + <deny send_destination="org.freedesktop.Avahi" + send_interface="org.freedesktop.Avahi.Server" send_member="SetHostName"/> + </policy> + + <!-- Allow everything, including access to SetHostName to users of the group "netdev" --> + <policy group="netdev"> + <allow send_destination="org.freedesktop.Avahi"/> + <allow receive_sender="org.freedesktop.Avahi"/> + </policy> +</busconfig> |