[PR #537] [MERGED] Make restricted-network prevent use of netfilter #3658

Closed
opened 2026-05-05 10:05:31 -06:00 by gitea-mirror · 0 comments
Owner

📋 Pull Request Information

Original PR: https://github.com/netblue30/firejail/pull/537
Author: @KellerFuchs
Created: 5/25/2016
Status: Merged
Merged: 5/26/2016
Merged by: @netblue30

Base: masterHead: restricted-netfilter


📝 Commits (2)

  • 99d9a32 Make restricted-network prevent use of netfilter
  • 10bf7d9 Document the restricted-network change

📊 Changes

4 files changed (+31 additions, -7 deletions)

View changed files

📝 README.md (+3 -3)
📝 etc/firejail.config (+2 -2)
📝 src/firejail/main.c (+24 -0)
📝 src/man/firejail-config.txt (+2 -2)

📄 Description

I suggest netfilter to be affected by restricted-network because it is a traditionally-privileged interface to the kernel, and the security impact of letting untrusted users run their own netfilter scripts (even on their own network namespace) is non-obvious.

Is that OK, or should I introduce a separate config flag for this?


🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.

## 📋 Pull Request Information **Original PR:** https://github.com/netblue30/firejail/pull/537 **Author:** [@KellerFuchs](https://github.com/KellerFuchs) **Created:** 5/25/2016 **Status:** ✅ Merged **Merged:** 5/26/2016 **Merged by:** [@netblue30](https://github.com/netblue30) **Base:** `master` ← **Head:** `restricted-netfilter` --- ### 📝 Commits (2) - [`99d9a32`](https://github.com/netblue30/firejail/commit/99d9a32bfabe97a6eeeccb024a68feed331d8f74) Make `restricted-network` prevent use of netfilter - [`10bf7d9`](https://github.com/netblue30/firejail/commit/10bf7d9418fb2d5aabaa5de6ffa8638e75bcbbdd) Document the restricted-network change ### 📊 Changes **4 files changed** (+31 additions, -7 deletions) <details> <summary>View changed files</summary> 📝 `README.md` (+3 -3) 📝 `etc/firejail.config` (+2 -2) 📝 `src/firejail/main.c` (+24 -0) 📝 `src/man/firejail-config.txt` (+2 -2) </details> ### 📄 Description I suggest `netfilter` to be affected by `restricted-network` because it is a traditionally-privileged interface to the kernel, and the security impact of letting untrusted users run their own netfilter scripts (even on their own network namespace) is non-obvious. Is that OK, or should I introduce a separate config flag for this? --- <sub>🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.</sub>
gitea-mirror 2026-05-05 10:05:31 -06:00
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference: github-starred/firejail#3658
No description provided.