[GH-ISSUE #4050] question regarding running "firejail firefox" #2519

Closed
opened 2026-05-05 09:12:01 -06:00 by gitea-mirror · 7 comments
Owner

Originally created by @Rosika2 on GitHub (Mar 5, 2021).
Original GitHub issue: https://github.com/netblue30/firejail/issues/4050

system: Linux/Lubuntu 20.04.2 LTS, 64 bit
firejail version: 0.9.64.4
firetools version: 0.9.64

Hello altogether,

on https://wiki.ubuntuusers.de/firejail/#Anwendung (the German language forum of ubuntuusers.de) I recently stumbled upon a remark that made me think:

They discussed the topic of how to run programmes using firejail by default:

"To avoid having to open a terminal every time Firejail is used, symbolic links can be created in /usr/local/bin that point to the Firejail binary file", like so:

sudo ln -s /usr/bin/firejail firefox # Firefox will be executed within a firejail sandbox from now on

I get that but what I don´t understand is the following remark:

"Firefox is a special case and should always be started automatically in a Firejail sandbox. Otherwise situations are possible in which the command "firejail firefox" has no effect."
(translated from German)

I am a bit confused now. Is there any truth in this statement?

Because I start firefox by clicking on the respective icon in "firetools".
I edited the command thus:

firejail --private=/media/rosika/f14a27c2-0b49-4607-94ea-2e56bbf76fe1/DATEN-PARTITION/Dokumente/work2 firefox

Many thanks for your help in advance.

Greetings from Rosika

Originally created by @Rosika2 on GitHub (Mar 5, 2021). Original GitHub issue: https://github.com/netblue30/firejail/issues/4050 system: Linux/Lubuntu 20.04.2 LTS, 64 bit firejail version: 0.9.64.4 firetools version: 0.9.64 Hello altogether, on https://wiki.ubuntuusers.de/firejail/#Anwendung (the German language forum of ubuntuusers.de) I recently stumbled upon a remark that made me think: They discussed the topic of how to run programmes using firejail **by default**: "To avoid having to open a terminal every time Firejail is used, symbolic links can be created in /usr/local/bin that point to the Firejail binary file", like so: `sudo ln -s /usr/bin/firejail firefox # Firefox will be executed within a firejail sandbox from now on ` I get that but what I don´t understand is the following remark: "Firefox is a **special case** and should **always** be started **automatically** in a Firejail sandbox. Otherwise situations are possible in which the command "firejail firefox" _has no effect_." (translated from German) I am a bit confused now. **Is there any truth in this statement?** Because I start firefox by clicking on the respective icon in "firetools". I edited the command thus: `firejail --private=/media/rosika/f14a27c2-0b49-4607-94ea-2e56bbf76fe1/DATEN-PARTITION/Dokumente/work2 firefox` Many thanks for your help in advance. Greetings from Rosika
gitea-mirror 2026-05-05 09:12:01 -06:00
Author
Owner

@rusty-snake commented on GitHub (Mar 5, 2021):

I think they mean that if you first start firefox w/o firejail (e.g. /usr/bin/firefox) and the run firejail firefox, the firejailed firefox talks to the unsandboxed, running instances and opens a new window/tab in it.

<!-- gh-comment-id:791409878 --> @rusty-snake commented on GitHub (Mar 5, 2021): I think they mean that if you first start firefox w/o firejail (e.g. `/usr/bin/firefox`) and the run `firejail firefox`, the firejailed firefox talks to the unsandboxed, running instances and opens a new window/tab in it.
Author
Owner

@Rosika2 commented on GitHub (Mar 5, 2021):

@rusty-snake:

Hi and thanks a lot for your very fast response.

I see.
I completely understand your explanation and it makes perfect sense.
But wouldn´t that be valid of other programmes as well? If yes, then I´d think they shouldn´t have stated that firefox is a "special case"...

O.K. then. I´m a bit relieved now.
Plus: I think running "firejail --tree" or taking a look at what firetools tells me in its "Sandbox List" should be confirmation enough that a certain programme runs within firejail.

Many greetings and thanks again.
Rosika

<!-- gh-comment-id:791418062 --> @Rosika2 commented on GitHub (Mar 5, 2021): @rusty-snake: Hi and thanks a lot for your very fast response. I see. I completely understand your explanation and it makes perfect sense. But wouldn´t that be valid of other programmes as well? If yes, then I´d think they shouldn´t have stated that firefox is a "special case"... O.K. then. I´m a bit relieved now. Plus: I think running "firejail --tree" or taking a look at what firetools tells me in its "Sandbox List" should be confirmation enough that a certain programme runs within firejail. Many greetings and thanks again. Rosika
Author
Owner

@rusty-snake commented on GitHub (Mar 5, 2021):

But wouldn´t that be valid of other programmes as well? If yes, then I´d think they shouldn´t have stated that firefox is a "special case"...

Just tried gedit, same. Almost every program with instance management has this.

<!-- gh-comment-id:791523735 --> @rusty-snake commented on GitHub (Mar 5, 2021): > But wouldn´t that be valid of other programmes as well? If yes, then I´d think they shouldn´t have stated that firefox is a "special case"... Just tried gedit, same. Almost every program with instance management has this.
Author
Owner

@Rosika2 commented on GitHub (Mar 6, 2021):

@rusty-snake:

Hi again.
Thanks a lot for your confirmation. Good to know.

In the meantime I found in the firefox-guide on https://firejail.wordpress.com/documentation-2/firefox-guide/ :

If you already have Firefox running, you would need to use -no-remote command line option, otherwise you end up with a new tab or a new window attached to the existing Firefox process:
$ firejail firefox -no-remote

I think this is the scenario you described.

As I normally don´t have an instance of firefox running (especially not an un-sandboxed one) when starting
firejail --private=/media/rosika/f14a27c2-0b49-4607-94ea-2e56bbf76fe1/DATEN-PARTITION/Dokumente/work2 firefox
I think the decribed case should not be an issue for me.

Just out of curiosity:

Is there another way of checking if a certain process/programme is definitively running within firejail?
As already mentioned I normally use "firejail --tree" for checking that or (as an alternative) look at the "Sandbox List" in firetools.

Many greetings
Rosika

<!-- gh-comment-id:791927411 --> @Rosika2 commented on GitHub (Mar 6, 2021): @rusty-snake: Hi again. Thanks a lot for your confirmation. Good to know. In the meantime I found in the firefox-guide on https://firejail.wordpress.com/documentation-2/firefox-guide/ : > > If you already have Firefox running, you would need to use -no-remote command line option, otherwise you end up with a new tab or a new window attached to the existing Firefox process: > `$ firejail firefox -no-remote` I think this is the scenario you described. As I normally don´t have an instance of firefox running (especially not an un-sandboxed one) when starting `firejail --private=/media/rosika/f14a27c2-0b49-4607-94ea-2e56bbf76fe1/DATEN-PARTITION/Dokumente/work2 firefox` I think the decribed case should not be an issue for me. Just out of curiosity: Is there another way of checking if a certain process/programme is definitively running within **firejail**? As already mentioned I normally use "firejail --tree" for checking that or (as an alternative) look at the "Sandbox List" in **firetools**. Many greetings Rosika
Author
Owner

@ghost commented on GitHub (Mar 6, 2021):

Is there another way of checking if a certain process/programme is definitively running within firejail?

See #4034.

<!-- gh-comment-id:791936170 --> @ghost commented on GitHub (Mar 6, 2021): > Is there another way of checking if a certain process/programme is definitively running within firejail? See #4034.
Author
Owner

@rusty-snake commented on GitHub (Mar 6, 2021):

@glitsj16 That's more a programmable way for the sandboxes program itself (though you can hack something with it, maybe by preloading a library). I think @Rosika2 is looking for a indicator to the user like #303.

Is there another way of checking if a certain process/programme is definitively running within firejail?

Although it is possible that it could also be faked by malicious programs, but to spot out configuration/usage mistakes you can use env to set a different GTK/QT theme (https://wiki.archlinux.org/index.php/Gtk#Themes and https://wiki.archlinux.org/index.php/Qt#Appearance).

<!-- gh-comment-id:791940214 --> @rusty-snake commented on GitHub (Mar 6, 2021): @glitsj16 That's more a programmable way for the sandboxes program itself (though you can hack something with it, maybe by preloading a library). I think @Rosika2 is looking for a indicator to the user like #303. > Is there another way of checking if a certain process/programme is definitively running within firejail? Although it is possible that it could also be faked by malicious programs, but to spot out configuration/usage mistakes you can use `env` to set a different GTK/QT theme (https://wiki.archlinux.org/index.php/Gtk#Themes and https://wiki.archlinux.org/index.php/Qt#Appearance).
Author
Owner

@Rosika2 commented on GitHub (Mar 6, 2021):

@glitsj16 and @rusty-snake :

Thanks to both of you for your suggestions. They´re highly appreciated.

As far as [https://github.com/netblue30/firejail/issues/303] is concerned I see that the user wanted to have some kind of window decoration (or something like that) as some sort of optical feedback for the sandboxed process.

That´s really not necessary for me. All I´d like to ascertain is the fact that a ceratain process/programme (e.g.) firefox really runs within firejail.
I just wanted to know whether there are further means to check that out.
But I assume that firejail --tree should be good enough to be sure.

So thanks again to both of you for your help.
Many greetings.
Rosika

<!-- gh-comment-id:791945692 --> @Rosika2 commented on GitHub (Mar 6, 2021): @glitsj16 and @rusty-snake : Thanks to both of you for your suggestions. They´re highly appreciated. As far as [https://github.com/netblue30/firejail/issues/303] is concerned I see that the user wanted to have some kind of window decoration (or something like that) as some sort of optical feedback for the sandboxed process. That´s really not necessary for me. All I´d like to ascertain is the fact that a ceratain process/programme (e.g.) firefox really runs within firejail. I just wanted to know whether there are further means to check that out. But I assume that `firejail --tree` should be good enough to be sure. So thanks again to both of you for your help. Many greetings. Rosika
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference: github-starred/firejail#2519
No description provided.