mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #511] Permit disabling/whitelisting features system-wide #363
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#363
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @KellerFuchs on GitHub (May 12, 2016).
Original GitHub issue: https://github.com/netblue30/firejail/issues/511
Currently, it is problematic for an administrator to install
firejailin a multiuser environment, as there is no way to prevent users from using problematic features (which aren't problematic on a local, single-user computer, usually).For instance:
interface,ip,ip6andiprangeall allow the user to configure network interfaces;netlets a user “grab” a new IP on the local network: in some circumstances (network using routable addresses, colocation, ...), this is highly undesirable [0].The simplest way I can see to handle that is to let the sysadmin specify either a whitelist or a blacklist of features in a dedicated file under
/etc/firejail. Special care must be taken to avoid features such asprivate-etcbeing used to foolfirejailinto ignoring those restrictions.[0] Some providers have trigger-happy automation that would consider it an IP-spoofing attempt and it would lead to the server being immediately shut down.
@netblue30 commented on GitHub (May 12, 2016):
I'll have a new firejail version out in a few days. For now you can grab the code from git. The new version fixes this problem by using a run-time configuration file: /etc/firejail/firejail.config. Among other things, it allows the admin to disable networking. This is the link in git: https://github.com/netblue30/firejail/blob/master/etc/firejail.config
@KellerFuchs commented on GitHub (May 13, 2016):
@netblue30 I indeed didn't notice this was already possible in the current git version.
Sorry for the spurious issue.
@netblue30 commented on GitHub (May 13, 2016):
No problem! If you need something else to be disabled, I can add support easily.
@KellerFuchs commented on GitHub (May 13, 2016):
Thanks a lot.
I will reopen the issue if I find features that are problematic and that you don't (yet) support blocking.