[GH-ISSUE #2932] Can Firejail put a sandbox around TOR or can it help keep me secure online some other way? #1828

Closed
opened 2026-05-05 08:29:48 -06:00 by gitea-mirror · 4 comments
Owner

Originally created by @JackMacack on GitHub (Aug 26, 2019).
Original GitHub issue: https://github.com/netblue30/firejail/issues/2932

Trying to secure my computer and my internet traffic in Ubuntu and have installed TOR and Firejail through the OS and can't find an option for TOR in Network in Firejail. Any idea how to do this or and alternate way? Thanks.

Originally created by @JackMacack on GitHub (Aug 26, 2019). Original GitHub issue: https://github.com/netblue30/firejail/issues/2932 Trying to secure my computer and my internet traffic in Ubuntu and have installed TOR and Firejail through the OS and can't find an option for TOR in Network in Firejail. Any idea how to do this or and alternate way? Thanks.
gitea-mirror 2026-05-05 08:29:48 -06:00
Author
Owner

@rusty-snake commented on GitHub (Aug 26, 2019):

You mean the TOR daemon and not the tor-browser, right.
There is a tor profile with a usage section inside.

or can it help keep me secure online some other way?

run sudo firecfg to firejail a lot of programs by default. Additional you can look in the profiles and the manpages to harden some profiles.

<!-- gh-comment-id:525024056 --> @rusty-snake commented on GitHub (Aug 26, 2019): You mean the TOR daemon and not the tor-browser, right. There is a [tor profile](https://github.com/netblue30/firejail/blob/master/etc/tor.profile) with a usage section inside. > or can it help keep me secure online some other way? run `sudo firecfg` to firejail a lot of programs by default. Additional you can look in the profiles and the manpages to harden some profiles.
Author
Owner

@JackMacack commented on GitHub (Aug 27, 2019):

It's the TOR browser that is installed through Ubuntu Software service. I also downloaded the standalone TOR browser from the tor website, but I don't think I can't use that with fire jail, since I believe it has to be integrated into your system. I'd like to sandbox TOR if possible, so I can prevent any access to the the rest of my computer files and hardware profile as well.

<!-- gh-comment-id:525424274 --> @JackMacack commented on GitHub (Aug 27, 2019): It's the TOR browser that is installed through Ubuntu Software service. I also downloaded the standalone TOR browser from the tor website, but I don't think I can't use that with fire jail, since I believe it has to be integrated into your system. I'd like to sandbox TOR if possible, so I can prevent any access to the the rest of my computer files and hardware profile as well.
Author
Owner

@rusty-snake commented on GitHub (Aug 27, 2019):

TOR (the daemon) != tor-browser != TOR (the network)

It's the TOR browser that is installed through Ubuntu Software service.

IDK how and where it is installed, so I can't help here.

I also downloaded the standalone TOR browser from the tor website, but I don't think I can't use that with firejail

Access to $HOME possible: https://github.com/netblue30/firejail/issues/2429#issuecomment-465545751
No access to $HOME possible: https://github.com/netblue30/firejail/wiki/Sandboxing-Binary-Software#tor-browser-home-install
My setup (tighter that firejail's default tor-browser profile): https://github.com/rusty-snake/firejailed-tor-browser

Additional:
X11 sandbox: https://firejail.wordpress.com/documentation-2/x11-guide/
chroot: https://firejail.wordpress.com/documentation-2/basic-usage/#chroot

so I can prevent any access to the the rest of my computer files and hardware profile as well.

TOR + VM: Whonix
TOR + VM: TAILS
TOR + Live System: TAILS (Hardware access obviously possible)

<!-- gh-comment-id:525438567 --> @rusty-snake commented on GitHub (Aug 27, 2019): TOR (the daemon) != tor-browser != TOR (the network) > It's the TOR browser that is installed through Ubuntu Software service. IDK how and where it is installed, so I can't help here. > I also downloaded the standalone TOR browser from the tor website, but I don't think I can't use that with firejail Access to $HOME possible: https://github.com/netblue30/firejail/issues/2429#issuecomment-465545751 No access to $HOME possible: https://github.com/netblue30/firejail/wiki/Sandboxing-Binary-Software#tor-browser-home-install My setup (tighter that firejail's default tor-browser profile): https://github.com/rusty-snake/firejailed-tor-browser Additional: X11 sandbox: https://firejail.wordpress.com/documentation-2/x11-guide/ chroot: https://firejail.wordpress.com/documentation-2/basic-usage/#chroot > so I can prevent any access to the the rest of my computer files and hardware profile as well. TOR + VM: Whonix TOR + VM: TAILS TOR + Live System: TAILS (Hardware access obviously possible)
Author
Owner

@rusty-snake commented on GitHub (Sep 9, 2019):

@JackMacack
I'm closing here due to inactivity, please fell free to reopen if you have more questions.

<!-- gh-comment-id:529496666 --> @rusty-snake commented on GitHub (Sep 9, 2019): @JackMacack I'm closing here due to inactivity, please fell free to reopen if you have more questions.
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference: github-starred/firejail#1828
No description provided.