mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #4565] Block audio input in default.profile (like with video input) #2709
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#2709
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @vinc17fr on GitHub (Sep 21, 2021).
Original GitHub issue: https://github.com/netblue30/firejail/issues/4565
Description
The intent of commit
ee7b466576is to block input devices in the default profile. For instance, with this commit, the webcam (via/dev/video*) is no longer available. But the microphone is still available. This is not consistent and may give a false sense of security.Steps to Reproduce
firejail --ignore=read-only --noblacklist='${HOME}/*' --private=some_dir zshExpected behavior
Since the webcam is not available by design, microphones should not be available either.
Note: #1769 suggests to use the
nosoundoption, but it is still commented out indefault.profile, contrary tonovideo.Actual behavior
The webcam is not available, but the internal microphone of my machine is working.
Behavior without a profile
N/A (the point is the behavior of the default profile, which now has
noinputandnovideo, in particular).Environment
firejail --version): 0.9.66 (Debian package firejail 0.9.66-2)Checklist
/usr/bin/vlc) "fixes" it).https://github.com/netblue30/firejail/issues/1139)browser-allow-drm yes/browser-disable-u2f noinfirejail.configto allow DRM/U2F in browsers.--profile=PROFILENAMEto set the right profile. (Only relevant for AppImages)Log
Output of
firejail --ignore=read-only --noblacklist='${HOME}/*' --private=fj-dir zsh@rusty-snake commented on GitHub (Sep 21, 2021):
Because
nosoundmeans no-sound i.e. no sound input but also no sound output. As much as I would like to see it, there is currently no good way to block only the audio input, AFAIK. If we would usenosoundby default in default.profile, it would break the sound output for all programs without a profile (browsers, video player, audio player, games, ...).Some stats:
non-redirect profiles total: 658
non-redirect profiles with nosound: 342
non-redirect profiles without nosound: 316
So around the half of the profiles don't use
nosound. While fornovideoonly one fifth of the profiles don't use it (stats: 658, 515, 143). IMHO this would break to much applications by default. If this is important for you, you can add it to your default.local. However block if microphone access (which is BTW more a privacy issue than a security issues IMHO) is such important for you, you should block it at a higher point (PA/PW/JACK/Kernel/UEFI/HW).commands used for stats:
@vinc17fr commented on GitHub (Sep 21, 2021):
Then perhaps there should be a request to make this possible (at the Linux kernel level?).
The point is to block it only in firejailed applications (by default).
@rusty-snake commented on GitHub (Sep 21, 2021):
The kernel is fine, it is the pulseaudio protocol which says all or thing. I'm not sure about jack. PipeWire was even developed with such isolation in mind, however it will take some time until it is support by libraries and used by distribution (yes fedora 34 uses pipewire as default, however the communication uses still the pa protocol).
@rusty-snake commented on GitHub (Oct 9, 2021):
Anyone? How should be proceed here?
@kmk3 commented on GitHub (Oct 12, 2021):
I wonder if it would be enough to set audio devices on /dev to write-only
(i.e.: bind-mount them without read permissions). It might work for at least
ALSA and sndio; not sure about the rest.
If it does, I suppose that something like a
nosoundinput(or maybenoinput-sound) command could be added.@rusty-snake commented on GitHub (Oct 12, 2021):
For PA, no (unless you make it systemwide).
nomic(rophone)@ilikenwf commented on GitHub (Oct 12, 2024):
I'd love to see something like this as well..some chat applications...I don't trust for anything but text chat and while they can have media embeds, I can't play them in application due to this because I use noaudio and novideo....
@ghost commented on GitHub (Feb 2, 2026):
related https://github.com/netblue30/firejail/issues/7053