[GH-ISSUE #3415] Unetbootin + Firejail ??? #2144

Closed
opened 2026-05-05 08:49:11 -06:00 by gitea-mirror · 5 comments
Owner

Originally created by @opqriu on GitHub (May 13, 2020).
Original GitHub issue: https://github.com/netblue30/firejail/issues/3415

https://unetbootin.github.io/linux_download.html

I run Unetbootin in Debian in the following way.
~ $ sudo ./unetbootin-linux64-677.bin

I want to use the Firejile sandbox.
Please Can you tell me how to do it?
Thank you.

Originally created by @opqriu on GitHub (May 13, 2020). Original GitHub issue: https://github.com/netblue30/firejail/issues/3415 https://unetbootin.github.io/linux_download.html I run Unetbootin in Debian in the following way. `~ $ sudo ./unetbootin-linux64-677.bin` I want to use the Firejile sandbox. Please Can you tell me how to do it? Thank you.
Author
Owner

@rusty-snake commented on GitHub (May 14, 2020):

Works sudo firejail --noprofile ./unetbootin-linux64-677.bin?

<!-- gh-comment-id:628431819 --> @rusty-snake commented on GitHub (May 14, 2020): Works `sudo firejail --noprofile ./unetbootin-linux64-677.bin`?
Author
Owner

@opqriu commented on GitHub (May 15, 2020):

It's best.
That ’s cool.
thank you for telling me.

<!-- gh-comment-id:629260115 --> @opqriu commented on GitHub (May 15, 2020): It's best. That ’s cool. thank you for telling me.
Author
Owner

@ghost commented on GitHub (May 15, 2020):

@opqriu A bit too soon to close this IMO. The --noprofile option suggested by @rusty-snake is only the beginning so to speak. It's looking good that it worked (at least I assume it did looking at your generous emoji response), but that offers only very minimal protection. We'll need to test if/how we can properly restrict a unetbootin sandbox before we can add a profile for it. With a bit of patience we'll get there ;-)

<!-- gh-comment-id:629269893 --> @ghost commented on GitHub (May 15, 2020): @opqriu A bit too soon to close this IMO. The `--noprofile` option suggested by @rusty-snake is only the beginning so to speak. It's looking good that it worked (at least I assume it did looking at your generous emoji response), but that offers only **very minimal** protection. We'll need to test if/how we can properly restrict a unetbootin sandbox before we can add a profile for it. With a bit of patience we'll get there ;-)
Author
Owner

@rusty-snake commented on GitHub (May 15, 2020):

As a next step, you could try sudo firejail --ignore=noroot --ignore=nonewprivs --profile=default unetbootin.

Note: we need --profile=default explicit because firejail will use server.profile if it is started as root.

<!-- gh-comment-id:629327954 --> @rusty-snake commented on GitHub (May 15, 2020): As a next step, you could try `sudo firejail --ignore=noroot --ignore=nonewprivs --profile=default unetbootin`. Note: we need `--profile=default` explicit because firejail will use server.profile if it is started as root.
Author
Owner

@rusty-snake commented on GitHub (Jul 16, 2020):

I'm closing here due to inactivity, please fell free to reopen if you have more questions.

<!-- gh-comment-id:659224749 --> @rusty-snake commented on GitHub (Jul 16, 2020): I'm closing here due to inactivity, please fell free to reopen if you have more questions.
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference: github-starred/firejail#2144
No description provided.