mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #1987] Question: benefits of running Firejail with AppArmor? #1336
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#1336
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @infokiller on GitHub (Jun 10, 2018).
Original GitHub issue: https://github.com/netblue30/firejail/issues/1987
Hey,
I'm currently (happily) using Firejail and considering using AppArmor as well. I expect this to add some complexity, so I want to make sure I understand the benefits of doing it.
What are the benefits of running both?
I know that there is some overlap between them, but can't really point out what protections AppArmor has that Firejail is lacking (or vice versa).
Also, if I want to run both, is the recommended way to install Firejail with AppArmor support and then add
apparmorto/etc/firejail/globals.local?Thanks!
@Vincent43 commented on GitHub (Jun 11, 2018):
The benefits of generic firejail AppArmor profile are:
Generally speaking AppArmor support is just a supplement to firejail. It's hard to develop strict profile which is then used for every possible app. Users can add their own modifications to
/etc/apparmor.d/local/firejail-local profile, i.e.deny /some/secret/dir-or-program rw. Another issue is that some features like networking and dbus socket mediation are currently available only in Ubuntu distros so there is a disparity in AppArmor effectiveness on different OSes. That may be improved later this year.Some profiles have already
apparmorenabled and will use it when AppArmor support is detected on system. Addingapparmortoglobals.localis another option. I would recommend observing access denials in audit logs to see if anything breaks.@infokiller commented on GitHub (Jun 11, 2018):
Thanks a lot @Vincent43 for the thorough response, it's very useful!
I'm running Arch Linux, so it seems that I won't get some of the Ubuntu-only AppArmor goodies you mentioned.
Do you know of a bug I can track in order to be notified when these features will be available in distros other than Ubuntu?
Thanks!
@Vincent43 commented on GitHub (Jun 11, 2018):
You can follow AppArmor kernel development here and userspace utilities here
Mailinglist used by developers is here
Here you can view fresh presentation about plans for future development. Linux 4.19 and AppArmor 3.0 are current targets for complete dbus and networking support.
@infokiller commented on GitHub (Jun 12, 2018):
Thanks a lot @Vincent43 this is very helpful!