mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#223
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @msva on GitHub (Feb 25, 2016).
Original GitHub issue: https://github.com/netblue30/firejail/issues/322
Hi!
I'm trying to achieve something, that looks like opposite to the things discussing in #57: I want to use "private-home" and "private-tmpfs" for application (so, it can't look in real $HOME and /tmp, but has it's own), but on the other hand, be able to connect to my X.org server and render it's interface. So, I'm thinking about some option like "userspace bind", that will bind files, specified in commandline (and/or profile) into created tmpfs.
And, actually, same for private home dir: I'd like to bind some files/dirs from it to app's private home dir, but I don't want to give them access to full home dir.
Isn't it something for that already (except for bind option, that requires root access)? And can it be implemented at all?
@netblue30 commented on GitHub (Feb 26, 2016):
Try this:
It will connect to X11 socket. There are two X11 sockets, one in /tmp discarded by the sandbox, and an abstract socket. If you do "netstat -a | grep X11" the abstract socket is printed as @/tmp/.X11-unix/X0. This socket is visible even if you disable /tmp directory.
You can use --whitelist:
@msva commented on GitHub (Feb 26, 2016):
Althought,
And also when I remove
private-tmpapplication starting fine.By the way, after update to current git-HEAD version, if I including "general" profile (inside custom), then application doesn't start, saying:
And when I commenting out inclusion of general profile - it starts fine.
I'm tried to use whitelist, but, it seems, it doesn't work together with
private, because it is still empty in folder (that I whitelisted) inside jail (or, if it wasn't created before — there is no such folder at all) :(it seems, something else was broken by update :( now, I can't "join" to that jail:
:'(
@netblue30 commented on GitHub (Feb 27, 2016):
What exactly are you trying to do? First, I would try "firejail --noprofile slack". If this works I would use the default profile: "firejail slack". What do you mean by "de-isolation"?
@vn971 commented on GitHub (Feb 28, 2016):
@msva I don't know whether that's generally recommended, but might this work for you?:
firejail --whitelist=/tmp/.X11-unix --private@msva commented on GitHub (Feb 28, 2016):
@netblue30, I'm trying to jail
slack(or let it even beskype) program, and: hide entire homedir from it (contains many sensitive data), but store all changes it made in homedir in it's personal storage (to not interfere wit oter software); and hide other things like dev and tmp from it.And at the same time I want to "bind" (or watever) some files/directories from real FS inside the jail's private ones (copying is not the case, and symlinks will not work).
@vn971 nope, anyway
No protocol specified.@msva commented on GitHub (Feb 29, 2016):
And, rephrasing my issues:
1) private-tmp makes X application unable to start because ofNo protocol is specified. Even with--noprofile. Probably, there are no X sockets binded inside private /tmp and it can't connect to abstract ones, but it is hard to properly debug it, since firejail destroys right after jailed app reports fail.^^ fixed by
--whitelist=/tmp/xauth-1000-_0instead ofprivate-tmpwhitelistdoesn't bind directory, specified as argument inside the jail, if that path inside the jail is "private" (will it be effect ofprivate-tmp,private-etc,private-devorprivate). While that is what I want to achieve.// Although, it can be fixed in same way as
1), i.e by not usingprivate-{whatever}and using justwhitelist=blainstead, it is not the case I want: I want to have isolated (fake), but persistent (!) homedir, but containing some specified dirs/files from the real homedir. Although, it is possible to just copy them in the directory, specified as argument toprivate, I'd very like to have them binded, to not constanty merge changes made in that dirs/files