mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #1610] Allow blocking gpg agent #1077
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#1077
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @ltworf on GitHub (Oct 20, 2017).
Original GitHub issue: https://github.com/netblue30/firejail/issues/1610
I have this env var:
If I let a software use unix socket, then it can connect to that, and if I had used my key recently, it could use the agent to do things I don't want it to do.
It would be nice to have a syntax to allow arbitrary variables rather than just ${HOME}, so one could just do
blacklist ${GPG_AGENT_INFO}to block it.Also having a ${UID} variable would be nice, and could be used to solve the same problem, so one could block
/run/user/${UID}/gnupg. and potentially other paths inside there.@smitsohu commented on GitHub (Oct 21, 2017):
/run/user/$UID/gnupgshould be blacklisted by default. Is it not working for you?@smitsohu commented on GitHub (Oct 21, 2017):
👍 for ${UID}
@ltworf commented on GitHub (Oct 21, 2017):
Ah I am running this proprietary application for work and I am not including the default profile, so the profile I use won't get silent changes from updates of the package.
@smitsohu commented on GitHub (Oct 22, 2017):
The /run/user/$UID/gnupg blacklist was introduced in 0.9.46, but it is hardcoded and not in the profiles.
In case you are running an older version and upgrading is not an option,
blacklist /run/user/*/gnupgshould actually work, too.