mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#3014
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @bodachaitanya on GitHub (Nov 28, 2022).
Original GitHub issue: https://github.com/netblue30/firejail/issues/5490
Discussed in https://github.com/netblue30/firejail/discussions/5489
Originally posted by bodachaitanya November 28, 2022
Hi Firejail team,
Could you please help in clarification for below queries, which I am seeing inconsistent behavior in my environment (on CentOS-7.9):
Context: I have experienced this problem when I run ping in firejail with FQDN name. The DNS resolution is configured to go via non-default interface (which is achieved by preloading internal library which has modified connect, sendto, bind API's). Same is the case with /etc/resolv.conf, /etc/nsswitch.conf files, for this specific use-case. Firejail always comes out without executing them with above rules in place. When I remove whitelist (eg: in above case
whitelist /data/runtime/hosts), this scenario works fine.Could anyone please explain the behavior of firejail here.
read-only /var/lib/runtimerule in common profile.whitelist /data/runtime/temp, which is added before including common profile which has above read-only rule for same path, something like this in sequence:Context: I am trying to run tcpdump in firejail with above situation with filters having FQDN name (eg: host google.com), and tcpdump will create runtime files (along with snoop file) in /data/runtime/temp/ path. I noticed firejail comes out without any error not executing as desired and the behaviour is inconsistent. Could you please explain this behavior.
For all the above queries, one thing is common. When network library calls are intercepted through the preloaded library, and with DNS context, the rules which were working before as mentioned in above examples, were started not working, and the behavior is not understable from firejail pov. Could you please help in here in understanding firejail behavior, what is causing the conflicts and how to analyse it.
Please let me know for any more information. Thanks