mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #1649] Folder /files is Accessible in Chrome #1111
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#1111
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @cryptogun on GitHub (Nov 16, 2017).
Original GitHub issue: https://github.com/netblue30/firejail/issues/1649
Isn't whitelist mode the default mode and block anything in the list?
I created a folder
filesunder Linux root directory/and stored all organized files in it.Now I found that besides
~/Downloads, I can access the new folder/filesin Chrome.I'd prefer a whitelist mode for all applications.
Tried re-clone and install, no help.
@chiraag-nataraj commented on GitHub (Nov 16, 2017):
The easiest way to resolve this is to create local profiles in
~/.config/firejail, which will then take precedent. Recently the default profiles were strengthened considerably, especially when it comes to access to files in the home directory. If you want to set up a whitelist mode, you could create/etc/firejail/globals.local(which I believe is sourced by most/all profiles) or/etc/firejail/default.local(which is sourced by the default profile only). I think the reason this isn't the default is that it has the potential to break many more things by default (right @netblue30?) and the idea is that firejail should be easy and painless to use.@curiosity-seeker commented on GitHub (Nov 16, 2017):
Yes, this is expected. The
whitelistswitch does not apply to that new folder.man firejailexplicitly says:So to prevent any access to that folder you should create this rule:
blacklist /filesin
/etc/firejail/globals.localas suggested by @chiraag-nataraj@cryptogun commented on GitHub (Nov 17, 2017):
Got it. My
globalsis under/usr/local/etc/firejail/Maybe I should move my folders to home directory. Because Dropbox failed to start today...
Error: only directories in user home or /tmp are supported by mkdirError: invalid whitelist path /files/secret__dropbox/Dropbox