mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #1769] How to globally block networking, camera, microphone, etc. and allow by exception? #1198
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#1198
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @ghost on GitHub (Feb 8, 2018).
Original GitHub issue: https://github.com/netblue30/firejail/issues/1769
@SkewedZeppelin commented on GitHub (Feb 8, 2018):
Add the following lines to /etc/firejail/globals.local
then in all the profiles you don't want it you can either comment out
include /etc/firejail/globals.localin/etc/firejail/[program].profileor
individually using
ignore [option]eg.ignore novideoin/etc/firejail/[program].local.Be warned that
net nonewill prevent apps from saving settings with D-Conf, howeverprotocol unixwill still block network access.@SkewedZeppelin commented on GitHub (Feb 8, 2018):
I guess I overlooked that part, I do no think there is currently a way to achieve that then.
@chiraag-nataraj commented on GitHub (Jul 9, 2018):
I wonder if it would be easier to basically allow mixing whitelist and blacklist in the same directive (as
systemddoes) - for example, if this were implemented, you could just doprotocol unix,~tcp(meaning whitelistunixand blacklisttcp) or something to override whatever is inglobals.local.@chiraag-nataraj commented on GitHub (Jul 24, 2018):
@rekixex The solution I came up with worked when I was designing my own profiles, and I guess it might be useful for you as well. I split up the specific predicates I might need to undo later into different files. In my case, I wanted to be able to independently use
noexecon~and/tmp. But yeah, right now it's tedious. I think we should move discussion of the issues withignoreto #2039. Seeing as how the original question was answered (how to block stuff by default), I'm going to close this.