mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #2326] Enable apparmor specific aplication profile use #1554
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#1554
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @lhernanz on GitHub (Jan 2, 2019).
Original GitHub issue: https://github.com/netblue30/firejail/issues/2326
Hi,
the current (read HEAD src/firejail/sandbox.c) apparmor integration always use the firejail-defaul apparmor profile even when a more specific profile exists for an application (e.g. firefox). This has 2 problems:
Both problems would go away if firejail would try to identify if an specific application profile exist instead of always using the firejail-default one.
Regards
@Vincent43 commented on GitHub (Jan 2, 2019):
Yes, that's how current AppArmor integration works. In general it's not recommended using both firejail and app specific AppArmor profile as they will conflict with each other. Chose only one of them.
@lhernanz commented on GitHub (Jan 4, 2019):
After further testing, I have realized that if you have an specific apparmor profile for an application, it is applied (on top of firejail) as long as you do not use the
--apparmoroption. If you use it, firejail will use its own apparmor profile. I would suggest that you include this information in the documentation to provide more clarity about the real intent/meaning of that option.The problem that I have now is that I would like to use the default apparmor profile for all the applications that do not have their own and I cannot figure out a way of doing it without manually changing all the profiles (and that would be very inconvenient from the point of view of ugprades). Do you have any suggestion about how to do this? Is it even smart to try to do it (I am not sure if the addition of the firejail-defaut profile is going to break more things that the additional protection that is going to provide)?.
Thanks
@Vincent43 commented on GitHub (Jan 4, 2019):
Yes, that's exactly the case which i recommended against (using specific apparmor profile with firejail). Firejail don't control external AppArmor profiles and don't support them.
I recommend disabling firejail (removing symlink from
/usr/local/bin) for every app that have enforced AppArmor profile available. Alternatively disabling their AppArmor profiles instead, depending on which one (firejail or AppArmor) you prefer.firejail-default AppArmor profile should be treated as Appendix to userspace firejail functionality. The exact things it does are documented in firejail manpage. Not using it is not a big deal.
@ghost commented on GitHub (Jan 20, 2020):
Closing this as the OP's question is answered.