mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #5385] qutebrowser profile exposes lots of stuff in / #2978
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#2978
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @Dieterbe on GitHub (Oct 1, 2022).
Original GitHub issue: https://github.com/netblue30/firejail/issues/5385
Description
Hi! I'm a new firejail user, so maybe i'm missing something, but seems that Qutebrowser has access to stuff it probably shouldn't, including everything in /etc (/etc/passwd, /etc/sudoers, etc), as well as /tmp (including stuff unrelated to qutebrowser) and /mnt for example
Steps to Reproduce
Steps to reproduce the behavior
LC_ALL=C firejail qutebrowser(with stock unmodified profile)o /home/<username>Expected behavior
/etc, /mnt and /tmp show only things related to qutebrowser (or don't exist)
Actual behavior
see description
Behavior without a profile
What changed calling
LC_ALL=C firejail --noprofile /path/to/programin a terminal?nothing, it shows all the stuff in /etc, /mnt and /tmp just the same (which is the problem)
Additional context
Any other detail that may help to understand/debug the problem
Environment
firejail --version).git rev-parse HEAD).Checklist
/usr/bin/vlc) "fixes" it).https://github.com/netblue30/firejail/issues/1139)browser-allow-drm yes/browser-disable-u2f noinfirejail.configto allow DRM/U2F in browsers.--profile=PROFILENAMEto set the right profile. (Only relevant for AppImages)Log
These are the outputs of just launching qutebrowser, without navigating to the "exposed" stuff. Let me know if you want the log output of those actions.
Output of
LC_ALL=C firejail /path/to/programOutput of
LC_ALL=C firejail --debug /path/to/program@ghost commented on GitHub (Oct 1, 2022):
Looking at the qutebrowser.profile it does seem like an ommission we need to address. Can you try adding the below in a ~/.config/firejail/qutebrowser.local and report back if you can see any improvements?
You can play with these by commenting/uncommenting the relevant line(s).
The one thing I cannot check right now is the correct name of any qutebrowser-exposed D-Bus paths we need to grant access to. But that's something we can find out later...@Dieterbe commented on GitHub (Oct 1, 2022):
FWIW, jailcheck without any modifications:
with your suggestions, i see nothing in /tmp but .X11-unix/, /mnt doesn't load, and nothing in /etc but these:
(don't mind the links to github, that's something that happens upon paste)
jailcheck again (interestingly this doesn't really convey anything about the huge improvement we just made)
@ghost commented on GitHub (Oct 1, 2022):
@Dieterbe Okay, you can test the newly added D-Bus filtering thanks to The-Compiler from #qutebrowser IRC. For the other items reported by jailcheck, add the below:
@Dieterbe commented on GitHub (Oct 1, 2022):
dbus is a whole new domain for me. I don't have time now to dig into what this needs, but i did check out the https://www.bennish.net/web-notifications.html page, and the notifications seem to work just fine without further configuration beyond what you already gave.
qutebrowser is however logging this:
I have added the apparmor directive but jailcheck still says "Warning: AppArmor not enabled"
I do see in the logs:
... which would probably make sense as am i not running appArmor :-) That might be a future project for me, for now I have my hands full learning firejail, and i believe it should give me most bang for the buck anyway.
@ghost commented on GitHub (Oct 1, 2022):
These are expected messages when using restrictive dbus-user filter + dbus-system none. The point being we only allow the referenced D-Bus paths on the user bus and nothing on the system bus.
Correct, without enabling AppArmor the option can't offer anything on top of Firejail. I can definately understand that you would want to dig into learning firejail first and foremost. Whenever you feel ready to enable AppArmor, check its Arch Wiki page for details.
Enjoy your firejail learning process!