mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #3504] Wiki: Creating overrides #2204
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#2204
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @rusty-snake on GitHub (Jul 9, 2020).
Original GitHub issue: https://github.com/netblue30/firejail/issues/3504
Issues for discussions about https://github.com/netblue30/firejail/wiki/Creating-overrides.
@rusty-snake commented on GitHub (Jul 9, 2020):
The "Add access to a directory" section needs more work:
noblacklist foois only needed if we haveblacklist foo@NetSysFire commented on GitHub (Jul 29, 2020):
I improved it:
554073749c...0e5d9fcd1b@rusty-snake commented on GitHub (Jul 29, 2020):
Good, it should be made clearer that whitelist may only be used if it is a whitelisting profile, otherwise it will break the program.
whitelisting is olny supported in$HOME, /dev, /etc, /media, /mnt, /opt, /run/user/$UID, /srv, /sys/module, /tmp, /usr/share and /var. Sowhitelist /myimportant.filewill throw errors.@NetSysFire commented on GitHub (Jul 29, 2020):
I can change the path, that is no problem. The manpage is a bit unclear though, it says it could be one of those directories:
03550e94cb/src/man/firejail.txt (L2612)I tested several profiles (
firefox,bash,viewnior,remmina,exiftool) viaglobals.localand none of them broke when I testedwhitelistandnoblacklistornowhitelistandblacklist. Bash should be ablacklisting profile, right? Or do you mean that it breaks when nowhitelistis used? Many profiles have multipleincludes so the profile will containblacklistandwhitelist.Could you show me an example where it would break?
@rusty-snake commented on GitHub (Jul 29, 2020):
site-note: bash has no profile.
If you want to allow
${DOCUMENTS}for e.g. eog and addwhitelist ${DOCUMENTS}, then eog can no longer read its config. Sowhitelist ${HOME}/fooshould only be used for whitelisting profiles (the profiles withinclude whitelist-common.inc).@NetSysFire commented on GitHub (Jul 31, 2020):
I fixed the page:
0e5d9fcd1b...921131df86@NetSysFire commented on GitHub (Oct 20, 2020):
Is a profile also a whitelisting profile if it only includes
whitelist-var-common.incbut notwhitelist-common.inc? An example for this would beamarok.profile.@rusty-snake commented on GitHub (Oct 21, 2020):
yes and no. yes, because whitelisting happens (even things like
private-etcdo whitelisting internal). However the terms whitelisting-profile and blacklisting-profile (as they used by people) refer to the protection-level of the files in your home. Finally no, it would be more confusing if we call ever profile with any whitelist a whitelisting-profile.@NetSysFire commented on GitHub (Oct 24, 2020):
The reason why I asked is because
whitelistmight break non-whitelisting profiles, right? Someone asked me this in an IRC channel (we really need a Firejail IRC channel btw) and I was not sure if it would break this particular profile.The wiki page contains
I suspect that it depends on the used paths but I am not sure yet. To quote the manual:
Using features like
private-etcseems to not be enough to "convert" it to a whitelisting profile, most likely because the whitelisting is internal, as mentioned. Butwhitelistseems to break the profile and does not "convert" it, in some cases.What makes a profile a whitelisting profile except
include whitelist-common.inc? I would like to improve the important note below the "Allow access to a file or directory" snippet.@rusty-snake commented on GitHub (Oct 24, 2020):
If a profile (or any of it's includes) contain
whitelist ${HOME}/…it's a whitelisting-profile. The note withinclude whitelist-common.inclooked like it is easier since some profiles only haveinclude wc.inc, but only a few profiles havewhitelist ${HOME}w/o wc.inc.Here they are (at least gitter andstandartnotes-desktop should probably include wc)
Yes, if you add
whitelist ${HOME}/...to a blacklisting-profile the program has no longer access to it's config-files, documents, ... unless you whitelist them. Some profiles are opt-in whitelisting-profiles such as gitg, keepassxc, peek or flameshot.@NetSysFire commented on GitHub (Nov 2, 2020):
I tried to clarify this a bit:
921131df86...aa6d4f9278@rusty-snake commented on GitHub (Aug 4, 2021):
https://github.com/netblue30/firejail/discussions/4442