[GH-ISSUE #426] Possibility to use files that aren't in /etc for --private-etc #312

Closed
opened 2026-05-05 05:34:51 -06:00 by gitea-mirror · 5 comments
Owner

Originally created by @kadogo on GitHub (Apr 12, 2016).
Original GitHub issue: https://github.com/netblue30/firejail/issues/426

Hello, I think it would be nice if we can use files that aren't in /etc for --private-etc options.

Cheers.

Originally created by @kadogo on GitHub (Apr 12, 2016). Original GitHub issue: https://github.com/netblue30/firejail/issues/426 Hello, I think it would be nice if we can use files that aren't in /etc for --private-etc options. Cheers.
Author
Owner

@netblue30 commented on GitHub (Apr 12, 2016):

This will create a lot of security problems. I can let only existing files in /etc.

<!-- gh-comment-id:208900946 --> @netblue30 commented on GitHub (Apr 12, 2016): This will create a lot of security problems. I can let only existing files in /etc.
Author
Owner

@kadogo commented on GitHub (Apr 13, 2016):

You have maybe a solution when I will use a file in etc but that I have modify ?
Exemple, I will test some repo with yum but I not will modify my yum.conf in /etc so I think to modify it before and pass it to firajail.

<!-- gh-comment-id:209300182 --> @kadogo commented on GitHub (Apr 13, 2016): You have maybe a solution when I will use a file in etc but that I have modify ? Exemple, I will test some repo with yum but I not will modify my yum.conf in /etc so I think to modify it before and pass it to firajail.
Author
Owner

@netblue30 commented on GitHub (Apr 13, 2016):

Some of the files there are very dangerous, for example the user can modify /etc/shadow and put a new root password there.

If you are running as root, you could use "firejail --bind" and replace your /etc directory with a totally new one.

<!-- gh-comment-id:209438541 --> @netblue30 commented on GitHub (Apr 13, 2016): Some of the files there are very dangerous, for example the user can modify /etc/shadow and put a new root password there. If you are running as root, you could use "firejail --bind" and replace your /etc directory with a totally new one.
Author
Owner

@kadogo commented on GitHub (Apr 13, 2016):

I will give a chance at the --bind option.
I would ask too if --chroot option will himself create /proc and /dev in the futur (or if there is some security issue too ?)

<!-- gh-comment-id:209459090 --> @kadogo commented on GitHub (Apr 13, 2016): I will give a chance at the --bind option. I would ask too if --chroot option will himself create /proc and /dev in the futur (or if there is some security issue too ?)
Author
Owner

@netblue30 commented on GitHub (Apr 14, 2016):

chroot mount under /dev the real /dev directory, it just needs a directory defined for the mount point. /proc is mounted with the special /proc from the namespace.

<!-- gh-comment-id:209944972 --> @netblue30 commented on GitHub (Apr 14, 2016): chroot mount under /dev the real /dev directory, it just needs a directory defined for the mount point. /proc is mounted with the special /proc from the namespace.
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference: github-starred/firejail#312
No description provided.