mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #5046] One time private application (no sharing) #2864
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#2864
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @ghost on GitHub (Mar 14, 2022).
Original GitHub issue: https://github.com/netblue30/firejail/issues/5046
I am sorry for asking this here but I don't know where else I could have.
I am interested in using firejail for creating a disposable sandbox for a browser.
The thing is, while that instance is running it should not allow anyone to access its contents by running a command.
It should be restricted to the window that it created in the first place.
This is for security reasons.
Is this something that firejail supports and if any special parameters are required, what would those be?
@smitsohu commented on GitHub (Mar 14, 2022):
Firejail creates a security boundary between inside the sandbox and outside the sandbox.
Code running inside the sandbox should not be able to do things that we didn't allow it to do. Firejail pretty much doesn't care about the world outside the sandbox. What you want to do is not part of the job description of a sandbox.
It is not impossible that a sandbox can help to achieve your goals, for example by blocking D-Bus and other IPC channels, as for IPC it doesn't matter which end you block. It might make sense to use a new network namespace (
--net). But Firejail and similar tools will always fall short of a comprehensive solution.What I would try in your place is running the browser as a different user in a Wayland session, which should solve most of the obvious problems. Check
/proc/sys/kernel/yama/ptrace_scope, it should exist and be set to1or higher (to defend the Wayland server). Even then a talented adversary might find workarounds. I don't think this is an easy task.