mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #1902] firecfg and user restrictions #1279
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#1279
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @reinerh on GitHub (Apr 22, 2018).
Original GitHub issue: https://github.com/netblue30/firejail/issues/1902
Installing firejail symlinks in /usr/local/bin with firecfg and having user restrictions does not play well together.
/usr/local/bin is normally in the PATH of every user, so if there is a symlink to a firejailed program, this program is started through firejail.
But if also a user restriction is active and the user is not in the allowed list, the programs refuse to start.
(For example someone upgrades firejail from the previous version and already has symlinks installed and allows a single user for firejail usage, the other system users have to workaround calling firejail by removing /usr/local/bin from their PATH (which might be undesirable because of other legitimate programs in there).)
To make this more graceful, could firejail instead of denying to run the program just drop all privileges and run the program unjailed, if it's called via symlinks and the user is not in the whitelist (and maybe also print a warning that the program is run unjailed)?
Or otherwise at least print a noticable warning when running firecfg that users not in the whitelist will have issues running the symlinked programs.
@SkewedZeppelin commented on GitHub (Apr 22, 2018):
Yes, my only concern is that a user won't notice the warning resulting in them thinking their programs are sandboxed. How would we ensure the user knows when launching through their DE and not a terminal?
@reinerh commented on GitHub (Apr 22, 2018):
I agree it's not the best solution.
And now that you mention it, what about users that have private symlinks in their home directory to firejail? They might not notice that the firejail protection is suddenly no longer there.
@netblue30 commented on GitHub (Apr 23, 2018):
I have a fix in:
90877c63eeIt will attempt to run the program without sandboxing if the user is not in the list.