mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #2304] Some Security Questions Regarding Firejail #1536
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#1536
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @oositP on GitHub (Dec 18, 2018).
Original GitHub issue: https://github.com/netblue30/firejail/issues/2304
I have been doing a bit of research and reading up on how reliable the security is on Firejail.
Ive come across a lot of user opinions and articles saying how Firejail has a broad attack surface because it uses setuid.
Can you tell me why these users believe that it is not safe to use Firejail?
See: here and here - first comment.
My concerns and question relates a lot to this user comment which no one bothered to answer.
Relating to that comment, is it possible that just using Firejail can actually create trouble for you rather than not using it at all?
For example, is it possible that if using skype on Ubuntu with Firejail, that skype (without us knowing) can somehow find a way to use the elevated root privileges?? (because that would be worrying)
Where and when would this "broad attack surface" actually become a problem? Only if another user knows you are using Firejail and targets you, or in some other scenario like if you use Firejail with a specific app?
Would appreciate your input, thanks
@Vincent43 commented on GitHub (Dec 19, 2018):
Those issues are applicable outside of jail, i.e. someone breaks into your system, finds you have firejail installed and use it to escalate privileges (there aren't public known ways to do it atm). This isn't typical threat scenario on single user desktop systems where all valuable targets lie under user
$HOMEand root access isn't needed to do the harm. So at this point you already lost.This is also where firejail comes useful as the security benefit of using firejail matters inside of jail. It will protect your
$HOMEand rest of the system from breaking into it in first place for every app that is confined.@chiraag-nataraj commented on GitHub (Jan 15, 2019):
I'm going to go ahead and close this as the question seems to have been answered. @oositP, please feel free to re-open if you feel your concerns were not sufficiently addressed.