mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #6491] Command to mount /proc with subset=pid #3289
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#3289
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @rusty-snake on GitHub (Sep 27, 2024).
Original GitHub issue: https://github.com/netblue30/firejail/issues/6491
Is your feature request related to a problem? Please describe.
System information exposed in various proc files such as
cmdline,kallsyms, ... can contain sensitive information. A lot of programs work w/o them.Describe the solution you'd like
Mount proc with
subset=pid. On older kernels weresubset=pidisn't supported we should ignore it if it was requested in a profile an proceed without it; if it was requested on the cli, we should harderror.This need to be opt-in so suggestions for the command name are welcome (for crabjail I currently use the bulky
fs._proc-exposes-system-informationto turn it off and--mount-proc-subset=pidin crablock to turn it on, systemd usesProcSubset=pidto turn it on).Describe alternatives you've considered
We have
disable-proc.inc, but enumerating badness does not work as good assubset=piddoes.Also some programs fail on
EACCESbut have fallback forENOENT.Downside:
subset=pidis all or nothing. You can notmkdir/mknodin proc and bind something on it.Additional context
Previous discussions:
@rusty-snake commented on GitHub (Sep 27, 2024):
@kmk3 commented on GitHub (Sep 27, 2024):
+1
It would be nice to have a command for
hidepid=nas well.@rusty-snake commented on GitHub (Sep 27, 2024):
While it would be a nice to have, it us not very useful because of the unshared pid namespace. So you need processes with different uids running in the sandbox.