📚 Security Policy Configuration

Reference for cella's security policy system: seccomp profiles, AppArmor, and egress control.

Seccomp Profiles

cella provides three built-in seccomp profile tiers:

Strict

Default action: SCMP_ACT_ALLOW. Targeted SCMP_ACT_NOTIFY on dangerous syscalls — every flagged call triggers the operator approval overlay.

Moderate

Default action: SCMP_ACT_ALLOW. Dangerous syscalls are blocked outright with SCMP_ACT_ERRNO (returns EPERM). No approval overlay.

Permissive

Default action: SCMP_ACT_LOG. All syscalls are allowed but logged for visibility. No blocking, no approval.

AppArmor

cella reads AppArmor profile status from the LXD API (raw.apparmor config key). The Policy panel displays the active AppArmor profile per container.

Egress Control (nftables)

Per-container nftables rules are managed through the transparent proxy system:

DNS Monitoring

The DNS Monitor panel (D) captures DNS queries and supports per-domain allow/deny rules independent of the HTTP proxy.

LXD Config Keys Used

KeyPurpose
raw.lxcSeccomp profile path (lxc.seccomp.profile)
security.syscalls.denyBPF-based syscall deny list (set by Z)
raw.apparmorAppArmor profile override
security.nestingAllow nesting containers
security.privilegedPrivileged container mode