mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[PR #2915] [MERGED] tighten private-bin and etc for torbrowser-launcher.profile #4582
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#4582
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
📋 Pull Request Information
Original PR: https://github.com/netblue30/firejail/pull/2915
Author: @corecontingency
Created: 8/17/2019
Status: ✅ Merged
Merged: 8/18/2019
Merged by: @netblue30
Base:
master← Head:master📝 Commits (1)
6051deftighten private-bin and etc for torbrowser-launcher.profile📊 Changes
1 file changed (+2 additions, -2 deletions)
View changed files
📝
etc/torbrowser-launcher.profile(+2 -2)📄 Description
Tor Browser occupies a very interesting space with firejail, as ideally we would not only want to prevent further system compromise, but also to prevent further de-anonymization (beyond your ip address, which I assume is trivially easy to get if Tor Browser is compromised, regardless of firejail).
To aid in this, Tor Browser should not be able to gain access to the name of the user, and the name of the home directory. As such,
idcan expose user namepwdcan expose name of host directoryreadlinkcan expose name of host directoryrealpathcan expose name of host directoryshould be removed from private-bin.
Ideally, Tor Browser should not be able to access
env(also can leak user name and name of host directory), but the program will not work if it is removed (cannot access $PATH), so that is a task for another day. However,getconfis not necessary, and can leak environment variables, so that has been removed from private-bin.hostsandhostnameshould be removed from private-etc, as it can leak the name of the user.This change has been tested on Fedora 30/GNOME and Arch Linux/KDE, and works fine on both, using torbrowser-launcher (from repository) and AUR version, respectively. Used firejail compiled from master for testing.
It is possible to remove far more, for instance, on my computer (Arch/KDE) I am running:
However, I decided to err on the side of caution for general use.
🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.