Commit graph

33 commits

Author SHA1 Message Date
netblue30
018d75775e reorganize github etc directory 2020-04-21 08:24:28 -04:00
rusty-snake
a3cc09e5d9 add 'blacklist ${RUNUSER}/wayland-*' to all profi…
…les with 'blacklist /tmp/.X11-unix'
2020-01-18 11:20:32 +01:00
glitsj16
a88f59362a
Prevent quiet option output leakage (#2913)
* nano: add quiet option

* ffmpegthumbnailer: fix quiet leakage

* ffplay: fix quiet leakage

* ffprobe: fix quiet leakage

* rnano: fix quiet leakage

* qt-faststart: fix quiet leakage

* scp: fix quiet leakage

* sftp: fix quiet leakage

* transmission-create: fix quiet leakage

* transmission-edit: fix quiet leakage

* transmission-remote-cli: fix quiet leakage

* transmission-remote-gtk: fix quiet leakage

* dnscrypt-proxy: add quiet option

* dnsmasq: add quiet option

* seahorse-daemon: add quiet option

* xpra: add quiet option

* Xephyr: add quiet option

* Xvfb: add quiet option
2019-08-14 20:13:52 +00:00
rusty-snake
f413040c5e
many profile cleanups (2) 2019-06-02 17:36:19 +02:00
netblue30
92bff8a23c
Merge pull request #2201 from SkewedZeppelin/u2f-ap
Add nou2f to all profiles
2018-10-17 08:00:00 -05:00
Glenn Washburn
7c533c9aa5 Remove "/etc/firejail/" from all include paths, now that profile_read will search for the file. 2018-10-17 00:43:54 -05:00
Tad
284e0750e5 Add nou2f to all profiles
- Closes #2194
2018-10-15 13:14:15 -04:00
Tad
40330b246d Add descriptions to profiles, pulled from Ubuntu 18.04 2018-08-13 21:48:41 -04:00
Tad
e5aba00d01 Add disable-xdg.inc to ~100 profiles 2018-07-24 12:52:13 -04:00
Tad
b885aec301 Add private-cache to many profiles
grep "cache" -L $(grep "redirect" -iL $(grep "whitelist" -RL))
2018-06-14 17:28:34 -04:00
Fred Barclay
2d8ff695ad
WIP: Blacklist common programming interpreters. (#1837)
* Use path variable instead of full path when blacklisting devel tools.

* Part 1: blacklist python, perl, ruby, etc in disable-interpreters.inc

* Part 2: allow access to java as needed

* Typo: missing blacklist

* Part 3: allow perl access as needed

* typo

* Add xreader thumbnailer and previewer profiles

* Add xplayer audio-preview and thumbnailer profiles

* Add atril thumbnailer and previewer profiles

* More fixups after adding disable-interpreters.inc

* Blacklist javac

* More javac noblacklisting

* Remove javac from dex2jar, libreoffice, multimc5, and pdfsam profiles

* --nodbus, first draft for #1825

* dbus.c

* rework akonadi integration

the usr.sbin.mysqld-akonadi apparmor profile, enforced by default in ubuntu and
debian testing (and probably opensuse), doesn't play well with a number of firejail options.
the reason for this is that once the no_new_privs bit is set, apparmor profile
transitions are forbidden.

enforcing our own apparmor policy instead is also no solution, because
these programs don't even start without d-bus.

relaxing the kmail profile was necessary so that kmail can fire up akonadi itself,
just in case akonadi has not been started earlier already by another program.
this is always an issue when kmail is the only installed akonadi client, but
there may be more circumstances. for reasons outlined above this doesn't help
debian and ubuntu (opensuse?) users though :-/

a brief summary of the seccomp exceptions: chroot is needed for qt webengine,
io_prioset for the akonadi indexing agent, io_getevents, io_submit, io_setup
are needed for mysqld. when akonadi has an sqlite3 backend, less exceptions
to the seccomp filter are necessary, but mysqld is the default.

in the future all kontact suite profiles  (itm only kmail, knotes) should
probably be redirections to akonadi_control, but the issues with apparmor
make this somewhat impractical for now (options like 'protocol' couldn't go to
akonadi_control.local any more, if current kmail redirected to there).

* Add nodbus to some profiles - part 1

* Spotify works with nodbus on Arch

* Enable nodbus for keepassx and keepassxc profiles.

I've tested on keepassxc but should work for keepassx as well. Settings are not immutable.

* recalibrate dbus access, deploy nodbus option

see #1822 and #1825. also systematically replaces
'blacklist /run/user/*/bus' with 'nodbus'.

with contributions from @Fred-Barclay

* various blacklist additions

* Add a profile for ncdu, enable private-etc in Steam again, and fixup gnome-recipes

* comment nodbus where it interferes with dconf

pending further discussion

* Add a disabled and extensive private-bin for Steam

* Further improve private-bin in steam

* comment apparmor, net where they interfere with dconf - #1843

* gnome-calculator fixup

* spectre support for clang compiler

* spectre clang support

* enable/disable dbus handling in /etc/firejail/firejail.config

* nodbus man pages, etc.

* redirect knotes to kmail, some tweaks

* testing

* gimp fixup

* Even more fixups after adding disable-interpreters.inc

* AWS and GCP store credentials in local directories as part of project setup.

Configuration for cloud providers is sensitive information; it should be
in the default block list. I didn't see profiles for gcloud or awscli,
so haven't added any exclusions.

boto and kubectl are not provider-specific, but also store credentials for
whichever platforms they happen to be being used with.

* testing

* consolidate makefiles

* gitignore

* Use path variable instead of full path when blacklisting devel tools.

* Part 1: blacklist python, perl, ruby, etc in disable-interpreters.inc

* Part 2: allow access to java as needed

* Typo: missing blacklist

* Part 3: allow perl access as needed

* typo

* More fixups after adding disable-interpreters.inc

* Blacklist javac

* More javac noblacklisting

* Remove javac from dex2jar, libreoffice, multimc5, and pdfsam profiles

* Cleanup rebase leftovers

* imagej doesn't need javac access

* Add cc to blacklisted compilers

* Use wildcards when blacklisting some gcc paths

* Blacklist lua in disable-interpreters

* Correct blacklist for node.js

* Fred Barclay note: some of these commits (all of the ones that don't affect files inside etc/) aren't mine but were added during a rebase + squash
2018-04-02 10:56:55 -05:00
smitsohu
c6ce7577ca some profile enhancements 2017-10-08 01:51:06 +02:00
smitsohu
9b99215a1e various profile enhancements
* okular needs kdeinit4 for open file dialog since recently
* memory-deny-write-execute should be a safe addition for
  desktop use of dnscrypt and unbound
* cleanup works
2017-09-25 15:57:50 +02:00
smitsohu
29d8dca6be cap_dac_override not available to root 2017-09-04 13:27:57 +02:00
smitsohu
e58fd99ad8 caps.keep for dnsmasq 2017-09-03 21:53:18 +02:00
netblue30
64eb690ea1 Merge pull request #1511 from smitsohu/servers
improve servers, harden musescore
2017-09-02 11:31:37 -04:00
Tad
84a9b9727a Fix logging for servers 2017-08-31 21:50:49 -04:00
smitsohu
24934a4710 improve servers, harden musescore 2017-08-31 23:18:45 +02:00
smitsohu
a6a8241c95 profile enhancements (mostly novideo) 2017-08-29 14:30:28 +02:00
Tad
104dde49c0 Fix nodvd placement 2017-08-13 15:53:04 -04:00
netblue30
647b6a220e added nodvd to most profiles 2017-08-13 07:36:06 -04:00
Tad
71f838b5ba Fix notv placement 2017-08-11 21:03:13 -04:00
netblue30
b97ca53e7b added notv to most profiles 2017-08-11 10:21:18 -04:00
Tad
9e3ba319be Unify all profiles 2017-08-07 01:22:08 -04:00
Tad
5354f20012 Harden 50 profiles
Hardened many profiles using disable-mnt and novideo
Fixed gnome-font-viewer
2017-07-04 11:35:29 -04:00
netblue30
dce9b9b9eb added /etc/firejail/globals.local for global customizations 2017-05-23 12:02:22 -04:00
netblue30
975c6f327f persistent support for all profile files 2017-02-09 10:53:33 -05:00
netblue30
9498f2313e profile cleanup 2016-09-28 10:29:01 -04:00
netblue30
442655366f nosound 2016-07-08 09:00:27 -04:00
netblue30
3597df9bc0 merged Various #542 pull request from Fred-Barclay 2016-05-31 21:40:55 -04:00
The Fox in the Shell
845bd06665 profiles: Add nonewprivs where sensible 2016-05-25 15:01:13 +02:00
netblue30
42bb614018 added dnsmasq profile 2016-04-07 12:07:41 -04:00
netblue30
7d452d9a55 added dnsmasq profile 2016-04-07 12:05:17 -04:00