[GH-ISSUE #573] Using Firejail by Default #408

Closed
opened 2026-05-05 05:48:10 -06:00 by gitea-mirror · 13 comments
Owner

Originally created by @ghost on GitHub (Jun 15, 2016).
Original GitHub issue: https://github.com/netblue30/firejail/issues/573

Originally created by @ghost on GitHub (Jun 15, 2016). Original GitHub issue: https://github.com/netblue30/firejail/issues/573
gitea-mirror 2026-05-05 05:48:10 -06:00
Author
Owner

@reinerh commented on GitHub (Jun 15, 2016):

Try firecfg which is available since 0.9.40.
It creates symlinks for your profiles in /usr/local/bin, which causes them to get started with firejail automatically.

<!-- gh-comment-id:226273825 --> @reinerh commented on GitHub (Jun 15, 2016): Try firecfg which is available since 0.9.40. It creates symlinks for your profiles in /usr/local/bin, which causes them to get started with firejail automatically.
Author
Owner

@reinerh commented on GitHub (Jun 15, 2016):

Yes, it's installed by default.

It works when the tools are started by name (via menu/desktop files, etc.), not by absolute path.
When the absolute path is in the desktop file, firejail will not be called.

<!-- gh-comment-id:226295890 --> @reinerh commented on GitHub (Jun 15, 2016): Yes, it's installed by default. It works when the tools are started by name (via menu/desktop files, etc.), not by absolute path. When the absolute path is in the desktop file, firejail will not be called.
Author
Owner

@reinerh commented on GitHub (Jun 15, 2016):

You put your config like net eth0 into your profile.
Calling firejail over a symlink is like starting firejail with the profile.

But I just see that x11 is not supported for profiles.

<!-- gh-comment-id:226297831 --> @reinerh commented on GitHub (Jun 15, 2016): You put your config like `net eth0` into your profile. Calling firejail over a symlink is like starting firejail with the profile. But I just see that x11 is not supported for profiles.
Author
Owner

@reinerh commented on GitHub (Jun 15, 2016):

The command line is not affected at all.
If you edit profile files (the default behavior of sandboxed applications in /etc/firejail), you can put net eth0 in, but X11 sandboxing is currently not possible via profiles.

<!-- gh-comment-id:226300063 --> @reinerh commented on GitHub (Jun 15, 2016): The command line is not affected at all. If you edit profile files (the default behavior of sandboxed applications in /etc/firejail), you can put `net eth0` in, but X11 sandboxing is currently not possible via profiles.
Author
Owner

@reinerh commented on GitHub (Jun 16, 2016):

When launching it with additional parameters you can still see Reading profile /etc/firejail/firefox.profile, so your profile will still be honored.

<!-- gh-comment-id:226549751 --> @reinerh commented on GitHub (Jun 16, 2016): When launching it with additional parameters you can still see `Reading profile /etc/firejail/firefox.profile`, so your profile will still be honored.
Author
Owner

@reinerh commented on GitHub (Jun 16, 2016):

It means that you can not configure X11 sandboxing in profiles, see also:
https://firejail.wordpress.com/features-3/man-firejail-profile/

<!-- gh-comment-id:226554790 --> @reinerh commented on GitHub (Jun 16, 2016): It means that you can not configure X11 sandboxing in profiles, see also: https://firejail.wordpress.com/features-3/man-firejail-profile/
Author
Owner

@reinerh commented on GitHub (Jun 16, 2016):

Yes, that works too.
But I find the symlink solution more elegant (if X11 sandboxing is not important).

<!-- gh-comment-id:226561969 --> @reinerh commented on GitHub (Jun 16, 2016): Yes, that works too. But I find the symlink solution more elegant (if X11 sandboxing is not important).
Author
Owner

@reinerh commented on GitHub (Jun 16, 2016):

It probably depends on the file manager and/or the .desktop files, but in general opening files sandboxed in Evince is possible with the symlink approach (assuming Evince is not started by absolute path).

<!-- gh-comment-id:226570261 --> @reinerh commented on GitHub (Jun 16, 2016): It probably depends on the file manager and/or the .desktop files, but in general opening files sandboxed in Evince is possible with the symlink approach (assuming Evince is not started by absolute path).
Author
Owner

@netblue30 commented on GitHub (Jun 17, 2016):

We don't have support for file managers in this moment. They use full paths to start executables.

<!-- gh-comment-id:226751171 --> @netblue30 commented on GitHub (Jun 17, 2016): We don't have support for file managers in this moment. They use full paths to start executables.
Author
Owner

@netblue30 commented on GitHub (Jun 18, 2016):

It depends on the file manager. Some of them allow you to handle a specific file type with a specific executable. For example for .pdf files, it opens a window where you can choose the executable. In this window you would go an choose /usr/local/bin/evince instead of the regular /usr/bin/evince.

<!-- gh-comment-id:226967360 --> @netblue30 commented on GitHub (Jun 18, 2016): It depends on the file manager. Some of them allow you to handle a specific file type with a specific executable. For example for .pdf files, it opens a window where you can choose the executable. In this window you would go an choose /usr/local/bin/evince instead of the regular /usr/bin/evince.
Author
Owner

@ghost commented on GitHub (Jun 20, 2016):

I only skimmed this thread, but you can also put a bash alias with your firejail and options prepended to the program name, but that obviously only works for programs started from the shell. Just as another tip.
Or I have some symlinks to firejail in ~/.bin/. (Easier to set symlinks because no root perms are required and I use ~/.bin/ anyway.)

<!-- gh-comment-id:227037752 --> @ghost commented on GitHub (Jun 20, 2016): I only skimmed this thread, but you can also put a bash alias with your firejail and options prepended to the program name, but that obviously only works for programs started from the shell. Just as another tip. Or I have some symlinks to firejail in `~/.bin/`. (Easier to set symlinks because no root perms are required and I use `~/.bin/` anyway.)
Author
Owner

@netblue30 commented on GitHub (Jun 23, 2016):

There is no clean solution at the moment, you will have to do it for each file type. What distro and desktop environment are you using?

<!-- gh-comment-id:228037827 --> @netblue30 commented on GitHub (Jun 23, 2016): There is no clean solution at the moment, you will have to do it for each file type. What distro and desktop environment are you using?
Author
Owner

@netblue30 commented on GitHub (Jun 26, 2016):

Yes, do "sudo apt-get install firejail"

<!-- gh-comment-id:228608844 --> @netblue30 commented on GitHub (Jun 26, 2016): Yes, do "sudo apt-get install firejail"
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference: github-starred/firejail#408
No description provided.