1 <!-- This configuration file controls the systemwide message bus. 2 Add a system-local.conf and edit that rather than changing this 3 file directly. --> 4 5 <!-- Note that there are any number of ways you can hose yourself 6 security-wise by screwing up this file; in particular, you 7 probably don't want to listen on any more addresses, add any more 8 auth mechanisms, run as a different user, etc. --> 9 10 <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-BUS Bus Configuration 1.0//EN" 11 "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd"> 12 <busconfig> 13 14 <!-- Our well-known bus type, do not change this --> 15 <type>system</type> 16 17 <!-- Run as special user --> 18 <user>@DBUS_USER@</user> 19 20 <!-- Fork into daemon mode --> 21 <fork/> 22 23 <!-- Write a pid file --> 24 <pidfile>@DBUS_SYSTEM_PID_FILE@</pidfile> 25 26 <!-- Only allow socket-credentials-based authentication --> 27 <auth>EXTERNAL</auth> 28 29 <!-- Only listen on a local socket. (abstract=/path/to/socket 30 means use abstract namespace, don't really create filesystem 31 file; only Linux supports this. Use path=/whatever on other 32 systems.) --> 33 <listen>@DBUS_SYSTEM_BUS_DEFAULT_ADDRESS@</listen> 34 35 <policy context="default"> 36 <!-- Deny everything then punch holes --> 37 <deny send_interface="*"/> 38 <deny receive_interface="*"/> 39 <deny own="*"/> 40 <!-- But allow all users to connect --> 41 <allow user="*"/> 42 <!-- Allow anyone to talk to the message bus --> 43 <!-- FIXME I think currently these allow rules are always implicit 44 even if they aren't in here --> 45 <allow send_destination="org.freedesktop.DBus"/> 46 <allow receive_sender="org.freedesktop.DBus"/> 47 <!-- valid replies are always allowed --> 48 <allow send_requested_reply="true"/> 49 <allow receive_requested_reply="true"/> 50 </policy> 51 52 <!-- Config files are placed here that among other things, punch 53 holes in the above policy for specific services. --> 54 <includedir>system.d</includedir> 55 56 <!-- This is included last so local configuration can override what's 57 in this standard file --> 58 <include ignore_missing="yes">system-local.conf</include> 59 60 <include if_selinux_enabled="yes" selinux_root_relative="yes">contexts/dbus_contexts</include> 61 62 </busconfig> | 1 <!-- @(#)system.conf.in 1.3 05/10/07 SMI --> 2 <!-- This configuration file controls the systemwide message bus. --> 3 4 <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-BUS Bus Configuration 1.0//EN" 5 "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd"> 6 <busconfig> 7 8 <!-- Our well-known bus type, do not change this --> 9 <type>system</type> 10 11 <!-- Run as special user --> 12 <user>@DBUS_USER@</user> 13 14 <!-- Fork into daemon mode --> 15 <fork/> 16 17 <!-- Write a pid file --> 18 <pidfile>@DBUS_SYSTEM_PID_FILE@</pidfile> 19 20 <!-- Only allow socket-credentials-based authentication --> 21 <auth>EXTERNAL</auth> 22 23 <!-- Only listen on a local socket. (abstract=/path/to/socket 24 means use abstract namespace, don't really create filesystem 25 file; only Linux supports this. Use path=/whatever on other 26 systems.) --> 27 <listen>@DBUS_SYSTEM_BUS_DEFAULT_ADDRESS@</listen> 28 29 <policy context="default"> 30 <!-- Allow everything --> 31 <allow send_interface="*"/> 32 <allow receive_interface="*"/> 33 <allow own="*"/> 34 <!-- Allow all users to connect --> 35 <allow user="*"/> 36 <!-- Allow anyone to talk to the message bus --> 37 <!-- FIXME I think currently these allow rules are always implicit 38 even if they aren't in here --> 39 <allow send_destination="org.freedesktop.DBus"/> 40 <allow receive_sender="org.freedesktop.DBus"/> 41 <!-- valid replies are always allowed --> 42 <allow send_requested_reply="true"/> 43 <allow receive_requested_reply="true"/> 44 </policy> 45 46 <!-- .service files are placed here --> 47 <servicedir>@DBUS_SESSION_SOCKET_DIR@/services</servicedir> 48 49 </busconfig> |