[GH-ISSUE #754] Firejail.service #512

Closed
opened 2026-05-05 06:01:20 -06:00 by gitea-mirror · 9 comments
Owner

Originally created by @ghost on GitHub (Aug 30, 2016).
Original GitHub issue: https://github.com/netblue30/firejail/issues/754

Hello Netblue,

With intentions of making Linux more secure for everyone, I'd like to know if it's possible to create a firejail service that automatically firejails every executable opened, since your profiles have been proven to work very well for everyone, and because new users don't find it attractive to edit launchers. This way, distros could enable such service and make it automatic start/enable upon firejail installation.

Cheers,
Amarildo

Originally created by @ghost on GitHub (Aug 30, 2016). Original GitHub issue: https://github.com/netblue30/firejail/issues/754 Hello Netblue, With intentions of making Linux more secure for everyone, I'd like to know if it's possible to create a firejail service that automatically firejails every executable opened, since your profiles have been proven to work very well for everyone, and because new users don't find it attractive to edit launchers. This way, distros could enable such service and make it automatic start/enable upon firejail installation. Cheers, Amarildo
gitea-mirror 2026-05-05 06:01:20 -06:00
Author
Owner

@Fred-Barclay commented on GitHub (Aug 30, 2016):

Would firecfg be what you're looking for?
It "allows the user to sandbox applications automatically, just by clicking on a regular desktop menus and icons."

See man firecfg for details on how to use it.

<!-- gh-comment-id:243540366 --> @Fred-Barclay commented on GitHub (Aug 30, 2016): Would `firecfg` be what you're looking for? It "allows the user to sandbox applications automatically, just by clicking on a regular desktop menus and icons." See `man firecfg` for details on how to use it.
Author
Owner

@ghost commented on GitHub (Aug 30, 2016):

Thanks, but this suggestion is not for my use :) Most newcomers don't even want a Terminal to work on, much less understand how to work with Firejail or Firecfg. That's why I think that a trully automated "firejail.service" (similar in operation to firecfg) would be a good idea. This service wouldn't require any user intervention.

<!-- gh-comment-id:243583290 --> @ghost commented on GitHub (Aug 30, 2016): Thanks, but this suggestion is not for _my_ use :) Most newcomers don't even want a Terminal to work on, much less understand how to work with Firejail or Firecfg. That's why I think that a trully automated "firejail.service" (similar in operation to firecfg) would be a good idea. This service wouldn't require any user intervention.
Author
Owner

@xahare commented on GitHub (Aug 31, 2016):

This wouldnt be a service, just some symlinks. you could make something for a settings panel like "auto firejail: on off" that runs the same command.

this is a bad idea, unless the user is aware that firejail is running. for example, if you save an image from the browser to your home folder, it will only exist in the context of the firejail. the browser will not tell the user otherwise. the profiles would need to change to explicit about what browsers can and can't do, but those changes could break cases where the browser should think it can write somewhere.

[edit] just tried this with a private home, and the file does persist, so its a bad example

you could borrow from qubes-os and bring the window manager into the picture, making different borders. for example, a fire themed window decorations, maybe of different colors if your separating contexts.

<!-- gh-comment-id:243632502 --> @xahare commented on GitHub (Aug 31, 2016): This wouldnt be a service, just some symlinks. you could make something for a settings panel like "auto firejail: on off" that runs the same command. this is a bad idea, unless the user is aware that firejail is running. for example, if you save an image from the browser to your home folder, it will only exist in the context of the firejail. the browser will not tell the user otherwise. the profiles would need to change to explicit about what browsers can and can't do, but those changes could break cases where the browser should think it can write somewhere. [edit] just tried this with a private home, and the file does persist, so its a bad example you could borrow from qubes-os and bring the window manager into the picture, making different borders. for example, a fire themed window decorations, maybe of different colors if your separating contexts.
Author
Owner

@Fred-Barclay commented on GitHub (Aug 31, 2016):

@amarildojr I see. Well, since firejail is a terminal program 😉 anyone who uses it is probably at least somewhat comfortable with the terminal.
I wonder if firecfg could be integrated with firetools so that you could have a graphical interface to initially launch firecfg? Of course, after the initial firecfg (or whatever the graphical equivalent would be when launched from firetools) the user will never have to do any intervention--all programs with a firejail profile will start automatically in firejail under most circumstances.

<!-- gh-comment-id:243641390 --> @Fred-Barclay commented on GitHub (Aug 31, 2016): @amarildojr I see. Well, since firejail _is_ a terminal program :wink: anyone who uses it is probably at least somewhat comfortable with the terminal. I wonder if `firecfg` could be integrated with [firetools](https://github.com/netblue30/firetools) so that you could have a graphical interface to initially launch firecfg? Of course, after the initial `firecfg` (or whatever the graphical equivalent would be when launched from firetools) the user will never have to do any intervention--all programs with a firejail profile will start automatically in firejail under most circumstances.
Author
Owner

@netblue30 commented on GitHub (Sep 1, 2016):

The closest you can get to this, would be an x11 Xephyr setting, where you start in firejail a light window manager like openbox - https://firejail.wordpress.com/documentation-2/x11-guide/#configurexephyr

Then, all the applications started by Xephyr would be automatically sandboxed.

<!-- gh-comment-id:244101643 --> @netblue30 commented on GitHub (Sep 1, 2016): The closest you can get to this, would be an x11 Xephyr setting, where you start in firejail a light window manager like openbox - https://firejail.wordpress.com/documentation-2/x11-guide/#configurexephyr Then, all the applications started by Xephyr would be automatically sandboxed.
Author
Owner

@ghost commented on GitHub (Sep 2, 2016):

@netblue30 So distros could already implement this if they wanted?

<!-- gh-comment-id:244298833 --> @ghost commented on GitHub (Sep 2, 2016): @netblue30 So distros could already implement this if they wanted?
Author
Owner

@xahare commented on GitHub (Sep 2, 2016):

one distro, subgraphos https://subgraph.com/sgos/ already does this. they use their own sandbox, which is similar to firejail.

<!-- gh-comment-id:244299604 --> @xahare commented on GitHub (Sep 2, 2016): one distro, subgraphos https://subgraph.com/sgos/ already does this. they use their own sandbox, which is similar to firejail.
Author
Owner

@netblue30 commented on GitHub (Sep 3, 2016):

So distros could already implement this if they wanted?

Yes.

<!-- gh-comment-id:244547386 --> @netblue30 commented on GitHub (Sep 3, 2016): > So distros could already implement this if they wanted? Yes.
Author
Owner

@ghost commented on GitHub (Sep 3, 2016):

Thanks. I'm closing this issue then.

<!-- gh-comment-id:244557634 --> @ghost commented on GitHub (Sep 3, 2016): Thanks. I'm closing this issue then.
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference: github-starred/firejail#512
No description provided.