mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #3245] How to blacklist specific drive or partition #2035
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#2035
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @CodeArtisan00 on GitHub (Feb 24, 2020).
Original GitHub issue: https://github.com/netblue30/firejail/issues/3245
I'm trying to blacklist certain partition but unable to do so. I tried to blacklist /run/media/user/partition's name , but that didn't pay off. As of now, I don't know what do. disable-mnt won't help me as I need access to other drives. Any help would be appreciated.
Spec: Manjaro (KDE), Kernel: 5.5.x, Firejail ver: 0.9.62
@arrowgent commented on GitHub (Feb 25, 2020):
where are your mounted files actually at?
in /mnt
or /media
?
@CodeArtisan00 commented on GitHub (Feb 26, 2020):
/media
@smitsohu commented on GitHub (Feb 26, 2020):
Do you try to blacklist inside a FUSE mount?
If yes, you somehow need to add
allow_rootto the FUSE mount options.@CodeArtisan00 commented on GitHub (Feb 27, 2020):
not necessarily inside a FUSE mount. What I want is close to disable-mnt but for specific drives.
@rusty-snake commented on GitHub (Feb 28, 2020):
I think the issue is that
blacklist/whitelisthas only an effect if the directory/file is already present when the sandbox is started.@CodeArtisan00 commented on GitHub (Feb 28, 2020):
yes... is there any workaround?
@smitsohu commented on GitHub (Feb 29, 2020):
Firejail first configures the sandbox and then drops all privileges in order to start the application. At this point the sandbox is basically set in stone, at least for a regular user.
Talking about workarounds, one could in theory somehow detect the mount event and then
jointhe sandbox as root user and modify the mount namespace of the sandbox manually, but this suffers from all kinds of race conditions. This means there would be always short time spans where the sandbox has full access to the paths that you want blacklisted.So no, unfortunately there is no workaround.
@rusty-snake commented on GitHub (Feb 29, 2020):
IDK what your targeted workflow is but this works:
@smitsohu commented on GitHub (Feb 29, 2020):
@rusty-snake Right, thanks!
@CodeArtisan00 commented on GitHub (Feb 29, 2020):
thanks.
For some reason, it never occurs to me to mount it in different location.
@ghost commented on GitHub (Apr 5, 2020):
Closing here, as a viable workaround is available. Feel free to re-open at your discretion.