[GH-ISSUE #5581] Programs are not sandboxed by default in i3 #3033

Closed
opened 2026-05-05 09:40:49 -06:00 by gitea-mirror · 6 comments
Owner

Originally created by @alexmaloteaux on GitHub (Jan 11, 2023).
Original GitHub issue: https://github.com/netblue30/firejail/issues/5581

When launching an X11 app for instance firejail firefox from i3 the app launches but is not sandboxed. firejail --list doesnt show any X11 app neither.
Console apps , for instance top, are correctly sandboxed.

It is possible to launch i3 with a provided i3 profile, but what i would like to achieve is to launch i3 normally and then have all the per app profile applied from within i3. I tried from lxde on the same computer and it works flawless so it looks like i3 specific.

Does anybody have an idea if this is a normal feature, bug, misconfiguration or if this has to be addressed from within i3 only.

Best Regards

Originally created by @alexmaloteaux on GitHub (Jan 11, 2023). Original GitHub issue: https://github.com/netblue30/firejail/issues/5581 When launching an X11 app for instance `firejail firefox` from i3 the app launches but is not sandboxed. `firejail --list ` doesnt show any X11 app neither. Console apps , for instance top, are correctly sandboxed. It is possible to launch i3 with a provided i3 profile, but what i would like to achieve is to launch i3 normally and then have all the per app profile applied from within i3. I tried from lxde on the same computer and it works flawless so it looks like i3 specific. Does anybody have an idea if this is a normal feature, bug, misconfiguration or if this has to be addressed from within i3 only. Best Regards
gitea-mirror 2026-05-05 09:40:49 -06:00
Author
Owner

@alexmaloteaux commented on GitHub (Jan 11, 2023):

Here is a log of launching firefox:

$ firejail --apparmor  firefox
Reading profile /etc/firejail/firefox.profile
Reading profile /etc/firejail/whitelist-usr-share-common.inc
Reading profile /etc/firejail/firefox-common.profile
Reading profile /etc/firejail/disable-common.inc
Reading profile /etc/firejail/disable-devel.inc
Reading profile /etc/firejail/disable-exec.inc
Reading profile /etc/firejail/disable-interpreters.inc
Reading profile /etc/firejail/disable-proc.inc
Reading profile /etc/firejail/disable-programs.inc
Reading profile /etc/firejail/whitelist-common.inc
Reading profile /etc/firejail/whitelist-run-common.inc
Reading profile /etc/firejail/whitelist-runuser-common.inc
Reading profile /etc/firejail/whitelist-var-common.inc
Seccomp list in: !chroot, check list: @default-keep, prelist: unknown,
Parent pid 125864, child pid 125867
Warning: An abstract unix socket for session D-BUS might still be available. Use --net or remove unix from --protocol set.
Warning: NVIDIA card detected, nogroups command ignored
Warning: NVIDIA card detected, nogroups command ignored
Warning: NVIDIA card detected, nogroups command ignored
Warning: /sbin directory link was not blacklisted
Warning: /usr/sbin directory link was not blacklisted
Warning: NVIDIA card detected, nogroups command ignored
Seccomp list in: !chroot, check list: @default-keep, prelist: unknown,
Warning: NVIDIA card detected, nogroups command ignored
Warning: NVIDIA card detected, nogroups command ignored
Child process initialized in 346.80 ms

Parent is shutting down, bye...
<!-- gh-comment-id:1378087107 --> @alexmaloteaux commented on GitHub (Jan 11, 2023): Here is a log of launching firefox: ```console $ firejail --apparmor firefox Reading profile /etc/firejail/firefox.profile Reading profile /etc/firejail/whitelist-usr-share-common.inc Reading profile /etc/firejail/firefox-common.profile Reading profile /etc/firejail/disable-common.inc Reading profile /etc/firejail/disable-devel.inc Reading profile /etc/firejail/disable-exec.inc Reading profile /etc/firejail/disable-interpreters.inc Reading profile /etc/firejail/disable-proc.inc Reading profile /etc/firejail/disable-programs.inc Reading profile /etc/firejail/whitelist-common.inc Reading profile /etc/firejail/whitelist-run-common.inc Reading profile /etc/firejail/whitelist-runuser-common.inc Reading profile /etc/firejail/whitelist-var-common.inc Seccomp list in: !chroot, check list: @default-keep, prelist: unknown, Parent pid 125864, child pid 125867 Warning: An abstract unix socket for session D-BUS might still be available. Use --net or remove unix from --protocol set. Warning: NVIDIA card detected, nogroups command ignored Warning: NVIDIA card detected, nogroups command ignored Warning: NVIDIA card detected, nogroups command ignored Warning: /sbin directory link was not blacklisted Warning: /usr/sbin directory link was not blacklisted Warning: NVIDIA card detected, nogroups command ignored Seccomp list in: !chroot, check list: @default-keep, prelist: unknown, Warning: NVIDIA card detected, nogroups command ignored Warning: NVIDIA card detected, nogroups command ignored Child process initialized in 346.80 ms Parent is shutting down, bye... ```
Author
Owner

@alexmaloteaux commented on GitHub (Jan 11, 2023):

after some testing, it looks like it works when using "--dbus-system=none" , notifications works too so i will just close this

<!-- gh-comment-id:1378126036 --> @alexmaloteaux commented on GitHub (Jan 11, 2023): after some testing, it looks like it works when using "--dbus-system=none" , notifications works too so i will just close this
Author
Owner

@kmk3 commented on GitHub (Jan 11, 2023):

(Re-closing as "not planned" since nothing was changed in firejail)

<!-- gh-comment-id:1378239856 --> @kmk3 commented on GitHub (Jan 11, 2023): (Re-closing as "not planned" since nothing was changed in firejail)
Author
Owner

@kmk3 commented on GitHub (Jan 11, 2023):

(Offtopic)

Please see the following links for how to format code blocks in markdown:

<!-- gh-comment-id:1378242415 --> @kmk3 commented on GitHub (Jan 11, 2023): (Offtopic) Please see the following links for how to format code blocks in markdown: * <https://docs.github.com/en/get-started/writing-on-github/working-with-advanced-formatting/creating-and-highlighting-code-blocks> * <https://github.github.com/gfm/#fenced-code-blocks>
Author
Owner

@kmk3 commented on GitHub (Jan 11, 2023):

@alexmaloteaux on Jan 11:

When launching an X11 app for instance firejail firefox from i3 the app
launches but is not sandboxed. firejail --list doesnt show any X11 app
neither. Console apps , for instance top, are correctly sandboxed.

It is possible to launch i3 with a provided i3 profile, but what i would like
to achieve is to launch i3 normally and then have all the per app profile
applied from within i3. I tried from lxde on the same computer and it works
flawless so it looks like i3 specific.

Basic debugging information is missing; please follow the bug report template:

Also, did you run firecfg?

What are the Exec lines in ~/.local/share/applications/firefox.desktop?

<!-- gh-comment-id:1378242586 --> @kmk3 commented on GitHub (Jan 11, 2023): @alexmaloteaux [on Jan 11](https://github.com/netblue30/firejail/issues/5581#issue-1528201496): > When launching an X11 app for instance `firejail firefox` from i3 the app > launches but is not sandboxed. `firejail --list ` doesnt show any X11 app > neither. Console apps , for instance top, are correctly sandboxed. > > It is possible to launch i3 with a provided i3 profile, but what i would like > to achieve is to launch i3 normally and then have all the per app profile > applied from within i3. I tried from lxde on the same computer and it works > flawless so it looks like i3 specific. Basic debugging information is missing; please follow the bug report template: * <https://github.com/netblue30/firejail/issues/new?assignees=&labels=&template=bug_report.md&title=> Also, did you run `firecfg`? What are the `Exec` lines in ~/.local/share/applications/firefox.desktop?
Author
Owner

@rusty-snake commented on GitHub (Jan 11, 2023):

OT: In general questions should be asked in Discussions.

<!-- gh-comment-id:1379102192 --> @rusty-snake commented on GitHub (Jan 11, 2023): OT: In general questions should be asked in Discussions.
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference: github-starred/firejail#3033
No description provided.