Enabling AppArmor on a Linode VPS in enforcement mode


Enabling AppArmor on a Debian Linode VPS is not entirely straightforward. Here's what I had to do in order to make it work. Packages to install - The easy bit was to install a few packages: and then adding apparmor=1 security=apparmor ...



Onion Details



Page Clicks: 0

First Seen: 03/11/2024

Last Indexed: 10/21/2024

Domain Index Total: 195



Onion Content



Enabling AppArmor on a Debian Linode VPS is not entirely straightforward. Here's what I had to do in order to make it work. Packages to install The easy bit was to install a few packages: apt install grub2 apparmor-profiles-extra apparmor-profiles apparmor and then adding apparmor=1 security=apparmor to the kernel command line ( GRUB_CMDLINE_LINUX ) in /etc/default/grub . Move away from using Linode's kernels As mentioned in this blog post , I found out that these parameters are ignored by the Linode kernels. I had to: login to the Linode Manager (i.e. https://cloud.linode.com/linodes/ /configurations ), click the node relevant node, click "Edit" next to the configuration profile , and change the kernel to "GRUB 2". Fix grub Next I found out that grub doesn't actually install itself properly because it can't be installed directly on the virtual drives provided by Linode (KVM). Manually running this hack worked for me: grub-install --grub-setup=/bin/true /dev/null Unbound + Let's Encrypt fix Finally, my local Unbound installation stopped working because it couldn't access the Let's Encrypt certificates anymore. The solution to this was pretty straightforward. All I needed to do was to add the following to /etc/apparmor.d/local/usr.sbin.unbound : /etc/letsencrypt/archive/** r, /etc/letsencrypt/live/** r, Add a comment