mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #2686] Protect firejailed program from "the outside" using a dedicated user #1692
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#1692
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @Hocuri on GitHub (May 10, 2019).
Original GitHub issue: https://github.com/netblue30/firejail/issues/2686
I know it sounds weird that a sandbox should protect sandboxed programs from un-sandboxed programs but maybe it is worth it?
Like this:
firejailand create/home/firejailon installationThen:
tom@host ~ $firejail --private-firejail-user firefox/home/firejail/tom/firefoxif it does not exist/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/binto make sure that we are actually executing the right firefox and not something like~/.local/bin/firefoxfirejail --private=/home/firejail/tom/firefoxWhat do you think?
@SkewedZeppelin commented on GitHub (May 10, 2019):
Protect from what? Existing malware? Other malicious users?
What prevents a program in your path already faking firejail?
If you want isolation like that Qubes OS is probably more suitable.
@Vincent43 commented on GitHub (May 10, 2019):
Firejail originally could run commands as arbitrary users but it was disabled for security reason IIRC.
Isn't
sudo --user=firejail firejail firefoxdo what you want?@Hocuri commented on GitHub (May 10, 2019):
That program won't be able to read /home/firejail, so if I use the built-in Firefox password manager (or another password manager) the passwords already saved there are safe.
IIRC this won't work together with wayland.
@Vincent43 commented on GitHub (May 10, 2019):
Then your proposal neither. You can play with xhost/xauth to fix that.
@Hocuri commented on GitHub (May 11, 2019):
Well, I could probably try to fix it just for me but I do not think that would be worth the effort. (actually I can do everything that Firejail can do, it's just a program on my computer). I just thought that it might be nice to have this for ALL users of firejail. (although up to now nobody has said that they would like/use this feature)