mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #6077] landlock: restrict tcp sockets #3174
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#3174
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @osevan on GitHub (Nov 3, 2023).
Original GitHub issue: https://github.com/netblue30/firejail/issues/6077
I hope everyone with eye on landlock functionality could plant this feature as fast as possible inside firejail.
https://www.phoronix.com/news/Landlock-Networking-Linux-6.7
Thanks and
Best regards
@rusty-snake commented on GitHub (Nov 3, 2023):
For
landlockI would say we should deny to bind to any tcp port and allow to connect to all tcp ports.For fine grained control options we could use
landlock.bind-tcp/landlock.connect-tcp(or namespacedlandlock[.net].tcp.bind/landlock[.net].bind) or a implementation free name linewhitelist-tcp-bind/whitelist-tcp-connect(systemd usesSocketBindAllow/SocketBindDenyimplemented withcgroup/bind[46]).We should also ask whether exposing those low-level options make sense for firejail. While restricting
bindsounds interesting, restrictingconnectfor tcp connections could give a lot users a false-sense of security(/privacy) unless other layer 4 protocols (udp and the like) are blocked by other means (seccomp/cgroup/ebpf/nftables/netfilter).