mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #6820] netfilter: Error: the sandbox doesn't use a new network namespace #3384
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#3384
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @osevan on GitHub (Jul 12, 2025).
Original GitHub issue: https://github.com/netblue30/firejail/issues/6820
dear community,
my php-fpm read-only / sandbox not applying iptables via netfilter option inside profile anymore...
firejail --netfilter.print=2355
Switching to pid 2356, the first child process inside the sandbox
Error: the sandbox doesn't use a new network namespace
firejail --version
firejail version 0.9.75
Compile time support:
- always force nonewprivs support is disabled
- AppArmor support is enabled
- AppImage support is enabled
- chroot support is enabled
- D-BUS proxy support is enabled
- file transfer support is enabled
- IDS support is disabled
- Landlock support is enabled
- networking support is enabled
- output logging is enabled
- overlayfs support is disabled
- private-home support is enabled
- private-lib support is enabled
- private-cache and tmpfs as user enabled
- sandbox check is enabled
- SELinux support is disabled
- user namespace support is enabled
- X11 sandboxing support is enabled
my php fpm process listening on server 127.0.0.1:9001
should i listen inside br0 subnetwork ? like 10.10.20.55?
can we have new flag for firejail like maclan , ipvlan for netfilter flag addition?
like :
################################
ipvlan l3mode (routed mode) or l2 mode for
netfilter /etc/firejail/tcpserver.net,9001
ip somerandomip
#################################
same with
################################
macvlan
netfilter /etc/firejail/tcpserver.net,9001
ip somerandomip
#################################
i can wget and curl everything inside sandbox -even netfilter flag is inside .profile
debian sid.
@rusty-snake commented on GitHub (Jul 12, 2025):
@kmk3 commented on GitHub (Jul 13, 2025):
Basic debugging information is missing; please follow the bug report template:
That is, use
--net.