[GH-ISSUE #825] Profile requests #560

Closed
opened 2026-05-05 06:08:12 -06:00 by gitea-mirror · 42 comments
Owner

Originally created by @netblue30 on GitHub (Oct 1, 2016).
Original GitHub issue: https://github.com/netblue30/firejail/issues/825

Leave them on this thread, I'll bring them on top and strike them through when implemented.

Natron, Cinelerra, Inkscape, Gimp, LuminanceHDR, QpdfView, Synfigstudio, Otter browser, Calligra, Openshot, Scribus, Temaviewer, Blender, Google Earth, darktable, shotcut, Ricochet (https://ricochet.im/), Tbb (http://www.webupd8.org/2013/12/tor-browser-bundle-ubuntu-ppa.html), Wire (https://medium.com/wire-news/get-your-linux-on-999403a1a4fe#.fb99nx4uq), flowblade, VirtualBox, jmemorize, amarok, dragon (Dragon Player), kate, KTnef, KTorrent, Akregator, KRDC, discover, k3b, dolphin, ark, KWalletManager, skanlite, xpra, bleachbit, gedit, nautilus, xfburn, file-roller, gnome-books, gnome-photos, gnome-online-miners, gnome-sound-recorder, gnome-contacts, gnome-documents, gnome-weather, gnome-music, gnome-maps, brasero, goobox, gpa, simple-scan

Originally created by @netblue30 on GitHub (Oct 1, 2016). Original GitHub issue: https://github.com/netblue30/firejail/issues/825 Leave them on this thread, I'll bring them on top and strike them through when implemented. Natron, Cinelerra, ~~Inkscape~~, ~~Gimp~~, ~~LuminanceHDR~~, ~~QpdfView~~, ~~Synfigstudio~~, Otter browser, Calligra, ~~Openshot~~, Scribus, Temaviewer, Blender, Google Earth, darktable, shotcut, Ricochet (https://ricochet.im/), Tbb (http://www.webupd8.org/2013/12/tor-browser-bundle-ubuntu-ppa.html), ~~Wire (https://medium.com/wire-news/get-your-linux-on-999403a1a4fe#.fb99nx4uq)~~, ~~flowblade~~, ~~VirtualBox~~, jmemorize, amarok, dragon (Dragon Player), kate, KTnef, KTorrent, Akregator, KRDC, discover, k3b, dolphin, ark, KWalletManager, skanlite, xpra, bleachbit, gedit, nautilus, xfburn, file-roller, gnome-books, gnome-photos, gnome-online-miners, gnome-sound-recorder, gnome-contacts, gnome-documents, gnome-weather, gnome-music, gnome-maps, brasero, goobox, gpa, simple-scan
gitea-mirror 2026-05-05 06:08:12 -06:00
Author
Owner

@Laurent092 commented on GitHub (Oct 2, 2016):

Hi netblue,
Teamviewer is used sometimes to help some people but I heard that there was some attack on it. Do you think it's possible to add a secure profile for this software ?
Thanks
Laurent.
Uploading T.V daemon not recognize.png…
Uploading TeamViewer_noprofile_debug.txt…

<!-- gh-comment-id:250955723 --> @Laurent092 commented on GitHub (Oct 2, 2016): Hi netblue, Teamviewer is used sometimes to help some people but I heard that there was some attack on it. Do you think it's possible to add a secure profile for this software ? Thanks Laurent. ![Uploading T.V daemon not recognize.png…]() [Uploading TeamViewer_noprofile_debug.txt…]()
Author
Owner

@netblue30 commented on GitHub (Oct 2, 2016):

Sure, give me a link to the project website.

<!-- gh-comment-id:250969237 --> @netblue30 commented on GitHub (Oct 2, 2016): Sure, give me a link to the project website.
Author
Owner

@chiraag-nataraj commented on GitHub (Oct 2, 2016):

https://www.teamviewer.com/en/download/linux/
But there's a problem. I'm not exactly sure how Teamviewer verifies the daemon is running (probably looking for a process?), but when I launch Teamviewer within firejail (even with --noprofile), it fails to detect that the daemon is already running (hence my suspicion that it is looking for a process - the new PID namespace would preclude it from detecting the daemon).

[Edit] Yup, my suspicion was correct. The relevant code is in /opt/teamviewer/tv_bin/script/tvw_exec under the function IsDaemonRunning. It basically uses ps and grep to look for a process called teamviewerd. @netblue30, is there any way to selectively "pass through" processes from the global PID namespace into the local PID namespace? This would be the preferred way to fix this as teamviewerd is started as a system service.

<!-- gh-comment-id:250977527 --> @chiraag-nataraj commented on GitHub (Oct 2, 2016): https://www.teamviewer.com/en/download/linux/ But there's a problem. I'm not exactly sure how Teamviewer verifies the daemon is running (probably looking for a process?), but when I launch Teamviewer within firejail (even with `--noprofile`), it fails to detect that the daemon is already running (hence my suspicion that it is looking for a process - the new PID namespace would preclude it from detecting the daemon). [Edit] Yup, my suspicion was correct. The relevant code is in `/opt/teamviewer/tv_bin/script/tvw_exec` under the function `IsDaemonRunning`. It basically uses `ps` and `grep` to look for a process called `teamviewerd`. @netblue30, is there any way to selectively "pass through" processes from the global PID namespace into the local PID namespace? This would be the preferred way to fix this as `teamviewerd` is started as a system service.
Author
Owner

@Laurent092 commented on GitHub (Oct 2, 2016):

It could be great if you find a solution. I am currently installing a Linux OS on a laptop for a friend and he asked me if I could install teamviewer. I said yes if I can sandbox it !! And I think a lot of people will be aware of that because they generally deinstalled it after doing the maintenance because of security issue. Firejail could be the best solution for me and my future installation on some laptop ;)

<!-- gh-comment-id:250988314 --> @Laurent092 commented on GitHub (Oct 2, 2016): It could be great if you find a solution. I am currently installing a Linux OS on a laptop for a friend and he asked me if I could install teamviewer. I said yes if I can sandbox it !! And I think a lot of people will be aware of that because they generally deinstalled it after doing the maintenance because of security issue. Firejail could be the best solution for me and my future installation on some laptop ;)
Author
Owner

@netblue30 commented on GitHub (Oct 3, 2016):

@Laurent092, the default profile will work fine until we come up with a more restrictive one. The main security features such as seccomp and noroot are implemented in the default profile. Start the program as "firejail teamviewer" - I assume teamviewer is the name of the program.

<!-- gh-comment-id:251117051 --> @netblue30 commented on GitHub (Oct 3, 2016): @Laurent092, the default profile will work fine until we come up with a more restrictive one. The main security features such as seccomp and noroot are implemented in the default profile. Start the program as "firejail teamviewer" - I assume teamviewer is the name of the program.
Author
Owner

@nyancat18 commented on GitHub (Oct 3, 2016):

Could you add these profiles too?
1 Blender

2 Google earth, marble dont have some google earth's features, and this is propietary software

<!-- gh-comment-id:251134672 --> @nyancat18 commented on GitHub (Oct 3, 2016): Could you add these profiles too? 1 Blender 2 Google earth, marble dont have some google earth's features, and this is propietary software
Author
Owner

@chiraag-nataraj commented on GitHub (Oct 3, 2016):

@netblue30 The default profile does not work because of the reasons I specified. In fact, even using --noprofile does not work because firejail creates a PID namespace, leading Teamviewer to think the daemon has not been started. It then can't start the daemon because it doesn't have root privileges (it uses upstart/systemd/sysv/etc to start the daemon).

<!-- gh-comment-id:251194247 --> @chiraag-nataraj commented on GitHub (Oct 3, 2016): @netblue30 The default profile does not work because of the reasons I specified. In fact, even using `--noprofile` does not work because firejail creates a PID namespace, leading Teamviewer to think the daemon has not been started. It then can't start the daemon because it doesn't have root privileges (it uses upstart/systemd/sysv/etc to start the daemon).
Author
Owner

@Laurent092 commented on GitHub (Oct 3, 2016):

Hi netblue. i agree with chiraag. It doesn't work. The TeamViewer GUI launched a pop-up message that indicates the daemon is not running :

firejail teamviewer
Reading profile /etc/firejail/generic.profile
Reading profile /etc/firejail/disable-mgmt.inc
Reading profile /etc/firejail/disable-secret.inc
Reading profile /etc/firejail/disable-common.inc

** Note: you can use --noprofile to disable generic.profile **

Parent pid 2173, child pid 2174

Child process initialized

Init...
XRandRWait: No value set. Using default.
XRandRWait: Started by user.
Checking setup...
Launching TeamViewer ...
Starting network process (no daemon)
terminate called without an active exception
/opt/teamviewer/tv_bin/script/tvw_exec : ligne 95 : 113 Abandon "$TV_BIN_DIR/teamviewerd" -n -f
Network process already started (or error)
Launching TeamViewer GUI ...

parent is shutting down, bye...

<!-- gh-comment-id:251196720 --> @Laurent092 commented on GitHub (Oct 3, 2016): Hi netblue. i agree with chiraag. It doesn't work. The TeamViewer GUI launched a pop-up message that indicates the daemon is not running : firejail teamviewer Reading profile /etc/firejail/generic.profile Reading profile /etc/firejail/disable-mgmt.inc Reading profile /etc/firejail/disable-secret.inc Reading profile /etc/firejail/disable-common.inc *\* Note: you can use --noprofile to disable generic.profile ** Parent pid 2173, child pid 2174 Child process initialized Init... XRandRWait: No value set. Using default. XRandRWait: Started by user. Checking setup... Launching TeamViewer ... Starting network process (no daemon) terminate called without an active exception /opt/teamviewer/tv_bin/script/tvw_exec : ligne 95 : 113 Abandon "$TV_BIN_DIR/teamviewerd" -n -f Network process already started (or error) Launching TeamViewer GUI ... parent is shutting down, bye...
Author
Owner

@netblue30 commented on GitHub (Oct 3, 2016):

Sorry, didn't see the description.

It cannot be sandboxed the normal way - the guy needs to become root and start daemons. That's bad, you are running a closed source executable as root!

<!-- gh-comment-id:251221645 --> @netblue30 commented on GitHub (Oct 3, 2016): Sorry, didn't see the description. It cannot be sandboxed the normal way - the guy needs to become root and start daemons. That's bad, you are running a closed source executable as root!
Author
Owner

@chiraag-nataraj commented on GitHub (Oct 3, 2016):

Do we have a way to poke holes in the PID namespace so that teamviewer recognizes that its daemon is running?

<!-- gh-comment-id:251223495 --> @chiraag-nataraj commented on GitHub (Oct 3, 2016): Do we have a way to poke holes in the PID namespace so that teamviewer recognizes that its daemon is running?
Author
Owner

@chiraag-nataraj commented on GitHub (Oct 4, 2016):

@triceratops1 Blender is up on my repo. Give it a whirl!

<!-- gh-comment-id:251289677 --> @chiraag-nataraj commented on GitHub (Oct 4, 2016): @triceratops1 Blender is up on my repo. Give it a whirl!
Author
Owner

@chiraag-nataraj commented on GitHub (Oct 4, 2016):

@netblue30, @triceratops1 I'm running into an interesting issue with Google Earth. If I run it within firejail, even with --noprofile, Google Earth fails to remove its lock file. That is, if I start it up again, it complains that it's already running. I'm going to look into workarounds for this issue, but your perspectives on it would be appreciated.

[Edit] Ah, okay, I think this makes more sense. When Google Earth runs, it creates a symlink to /proc/<PID>. I guess it's not able to remove the symlink afterwards for some reason - is this something that firejail prohibits?

<!-- gh-comment-id:251471798 --> @chiraag-nataraj commented on GitHub (Oct 4, 2016): @netblue30, @triceratops1 I'm running into an interesting issue with Google Earth. If I run it within `firejail`, even with `--noprofile`, Google Earth fails to remove its lock file. That is, if I start it up again, it complains that it's already running. I'm going to look into workarounds for this issue, but your perspectives on it would be appreciated. [Edit] Ah, okay, I think this makes more sense. When Google Earth runs, it creates a symlink to `/proc/<PID>`. I guess it's not able to remove the symlink afterwards for some reason - is this something that `firejail` prohibits?
Author
Owner

@Laurent092 commented on GitHub (Oct 4, 2016):

@chiraag-nataraj about googleearth,
I apply a workaround in using firejail --private googleearth. The lock file is always remove at the end of the session.

<!-- gh-comment-id:251502277 --> @Laurent092 commented on GitHub (Oct 4, 2016): @chiraag-nataraj about googleearth, I apply a workaround in using firejail --private googleearth. The lock file is always remove at the end of the session.
Author
Owner

@chiraag-nataraj commented on GitHub (Oct 4, 2016):

@Laurent092 Yeah, that works. However, that means the config files aren't saved, which is theoretically annoying?

[Edit] For the record, this is actually false. It saves "My Places" and miscellaneous temporary information to that folder. Config actually goes in ~/.config/Google/. Still, you normally want to save places, so I had to work around this another way.

<!-- gh-comment-id:251503912 --> @chiraag-nataraj commented on GitHub (Oct 4, 2016): @Laurent092 Yeah, that works. However, that means the config files aren't saved, which is theoretically annoying? [Edit] For the record, this is actually false. It saves "My Places" and miscellaneous temporary information to that folder. Config actually goes in `~/.config/Google/`. Still, you normally want to save places, so I had to work around this another way.
Author
Owner

@Laurent092 commented on GitHub (Oct 4, 2016):

i saw in the man of firejail you have many choice for --private (bin, etc....)
Where is located the lock file ?

<!-- gh-comment-id:251506004 --> @Laurent092 commented on GitHub (Oct 4, 2016): i saw in the man of firejail you have many choice for --private (bin, etc....) Where is located the lock file ?
Author
Owner

@chiraag-nataraj commented on GitHub (Oct 4, 2016):

The lock file is located in ~/.googleearth, which is also the directory configuration files are stored in.

<!-- gh-comment-id:251511254 --> @chiraag-nataraj commented on GitHub (Oct 4, 2016): The lock file is located in `~/.googleearth`, which is also the directory configuration files are stored in.
Author
Owner

@Laurent092 commented on GitHub (Oct 4, 2016):

firejail --blacklist=dirname_or_filename
Blacklist directory or file.

          Example:
          $ firejail --blacklist=/sbin --blacklist=/usr/sbin
          $ firejail --blacklist=~/.mozilla
          $ firejail "--blacklist=/home/username/My Virtual Machines"
<!-- gh-comment-id:251521439 --> @Laurent092 commented on GitHub (Oct 4, 2016): firejail --blacklist=dirname_or_filename Blacklist directory or file. ``` Example: $ firejail --blacklist=/sbin --blacklist=/usr/sbin $ firejail --blacklist=~/.mozilla $ firejail "--blacklist=/home/username/My Virtual Machines" ```
Author
Owner

@chiraag-nataraj commented on GitHub (Oct 4, 2016):

Never mind, found a way around it 😃 I'll have a profile up soon

<!-- gh-comment-id:251527184 --> @chiraag-nataraj commented on GitHub (Oct 4, 2016): Never mind, found a way around it 😃 I'll have a profile up soon
Author
Owner

@chiraag-nataraj commented on GitHub (Oct 4, 2016):

Google Earth is up on my repo!

<!-- gh-comment-id:251529027 --> @chiraag-nataraj commented on GitHub (Oct 4, 2016): Google Earth is up on my repo!
Author
Owner

@nyancat18 commented on GitHub (Oct 7, 2016):

We could add some extra profiles
1 google chrome (its required if you need flash), but flash is VERY VULNERABLE, and you need sanbox it

2 flowblade

<!-- gh-comment-id:252291226 --> @nyancat18 commented on GitHub (Oct 7, 2016): We could add some extra profiles 1 google chrome (its required if you need flash), but flash is VERY VULNERABLE, and you need sanbox it 2 flowblade
Author
Owner

@chiraag-nataraj commented on GitHub (Oct 8, 2016):

Huh, so interesting thing about flowblade. If I run it within firejail, even with --noprofile, it gets hung on the code after printing "Exiting app...". Even after adding additional statements to try to track down the problem, it seems to completely finish even calling Gtk.main_quit(), so I'm not even sure what the problem is...
[Edit] I should note that this problem does not occur if I don't change anything and immediately exit.
[Edit2] Never mind. I found out it was rendering the audio of the file I imported.

<!-- gh-comment-id:252394427 --> @chiraag-nataraj commented on GitHub (Oct 8, 2016): Huh, so interesting thing about flowblade. If I run it within firejail, even with `--noprofile`, it gets hung on the code after printing "Exiting app...". Even after adding additional statements to try to track down the problem, it seems to completely finish even calling `Gtk.main_quit()`, so I'm not even sure what the problem is... [Edit] I should note that this problem does not occur if I don't change anything and immediately exit. [Edit2] Never mind. I found out it was rendering the audio of the file I imported.
Author
Owner

@chiraag-nataraj commented on GitHub (Oct 8, 2016):

Added Flowblade to my repo! As for Google Chrome, I believe a profile already exists. And if you specifically want a stricter profile than the default, please open the issue on my project page rather than here, since it's easy to get confused 😃
[Edit] Added Google Chrome to my repo anyway 😉

<!-- gh-comment-id:252399508 --> @chiraag-nataraj commented on GitHub (Oct 8, 2016): Added Flowblade to my repo! As for Google Chrome, I believe a profile already exists. And if you specifically want a stricter profile than the default, please open the issue on my project page rather than here, since it's easy to get confused 😃 [Edit] Added Google Chrome to my repo anyway 😉
Author
Owner

@qazip commented on GitHub (Oct 11, 2016):

Wire has now a Linux client (https://medium.com/wire-news/get-your-linux-on-999403a1a4fe#.fb99nx4uq)

Would be nice to have a default profile for it.

<!-- gh-comment-id:253000833 --> @qazip commented on GitHub (Oct 11, 2016): Wire has now a Linux client (https://medium.com/wire-news/get-your-linux-on-999403a1a4fe#.fb99nx4uq) Would be nice to have a default profile for it.
Author
Owner

@denizakcal commented on GitHub (Oct 14, 2016):

Hello, netblue30. :)

Could you please add a profile for VirtualBox to the default Firejail installation (when you get the chance)?

<!-- gh-comment-id:253942568 --> @denizakcal commented on GitHub (Oct 14, 2016): Hello, netblue30. :) Could you please add a profile for VirtualBox to the default Firejail installation (when you get the chance)?
Author
Owner

@chiraag-nataraj commented on GitHub (Oct 15, 2016):

@denizakcal, check out my repo in the meantime :) I happen to have a profile for Virtualbox.

<!-- gh-comment-id:253949040 --> @chiraag-nataraj commented on GitHub (Oct 15, 2016): @denizakcal, check out my repo in the meantime :) I happen to have a profile for Virtualbox.
Author
Owner

@netblue30 commented on GitHub (Oct 18, 2016):

VirtualBox, flowblade and OpenShot done.

<!-- gh-comment-id:254595445 --> @netblue30 commented on GitHub (Oct 18, 2016): VirtualBox, flowblade and OpenShot done.
Author
Owner

@denizakcal commented on GitHub (Oct 20, 2016):

@chiraag-nataraj: Sorry for the delay. Your temporary solution no longer seems necessary, but I appreciate it nonetheless, so thanks! :)

@netblue30: Thanks for the VirtualBox profile (included in the default Firejail installation)!

If it's not too much to ask, could you also make a profile (included in the default Firejail installation) for jMemorize ( https://sourceforge.net/projects/jmemorize/ ) (especially since it doesn't seem maintained anymore, which, I'm not a security expert, but I believe it makes it more of a security risk)?

<!-- gh-comment-id:255008523 --> @denizakcal commented on GitHub (Oct 20, 2016): @chiraag-nataraj: Sorry for the delay. Your temporary solution no longer seems necessary, but I appreciate it nonetheless, so thanks! :) @netblue30: Thanks for the VirtualBox profile (included in the default Firejail installation)! If it's not too much to ask, could you also make a profile (included in the default Firejail installation) for jMemorize ( https://sourceforge.net/projects/jmemorize/ ) (especially since it doesn't seem maintained anymore, which, I'm not a security expert, but I believe it makes it more of a security risk)?
Author
Owner

@netblue30 commented on GitHub (Oct 20, 2016):

I added jmemorize to the list.

<!-- gh-comment-id:255095393 --> @netblue30 commented on GitHub (Oct 20, 2016): I added jmemorize to the list.
Author
Owner

@denizakcal commented on GitHub (Oct 20, 2016):

Thanks. :)

<!-- gh-comment-id:255254770 --> @denizakcal commented on GitHub (Oct 20, 2016): Thanks. :)
Author
Owner

@kesso commented on GitHub (Nov 17, 2016):

It would be nice to have profiles for the default kde and gnome applications and some others:

amarok, dragon (Dragon Player), kate, KTnef, KTorrent, Akregator, KRDC, discover, k3b, dolphin, ark, KWalletManager, skanlite, xpra, bleachbit, gedit, nautilus, xfburn, file-roller, gnome-books, gnome-photos, gnome-online-miners, gnome-sound-recorder, gnome-contacts, gnome-documents, gnome-weather, gnome-music, gnome-maps, brasero, goobox, gpa, simple-scan

<!-- gh-comment-id:261138186 --> @kesso commented on GitHub (Nov 17, 2016): It would be nice to have profiles for the default kde and gnome applications and some others: amarok, dragon (Dragon Player), kate, KTnef, KTorrent, Akregator, KRDC, discover, k3b, dolphin, ark, KWalletManager, skanlite, xpra, bleachbit, gedit, nautilus, xfburn, file-roller, gnome-books, gnome-photos, gnome-online-miners, gnome-sound-recorder, gnome-contacts, gnome-documents, gnome-weather, gnome-music, gnome-maps, brasero, goobox, gpa, simple-scan
Author
Owner

@curiosity-seeker commented on GitHub (Nov 23, 2016):

The recently published vulnerabilities in Linux

https://scarybeastsecurity.blogspot.de/2016/11/0day-poc-risky-design-decisions-in.html
https://scarybeastsecurity.blogspot.de/2016/11/0day-exploit-advancing-exploitation.html

make me wonder if it's possible to sandbox the various indexing tools (Tracker in Gnome, Baloo in KDE, ...) with Firejail as suggested by Chris Evans.

<!-- gh-comment-id:262564384 --> @curiosity-seeker commented on GitHub (Nov 23, 2016): The recently published vulnerabilities in Linux https://scarybeastsecurity.blogspot.de/2016/11/0day-poc-risky-design-decisions-in.html https://scarybeastsecurity.blogspot.de/2016/11/0day-exploit-advancing-exploitation.html make me wonder if it's possible to sandbox the various indexing tools (Tracker in Gnome, Baloo in KDE, ...) with Firejail as suggested by Chris Evans.
Author
Owner

@valoq commented on GitHub (Nov 28, 2016):

There is already a profile for tracker, however the problem is that these are services that are started by systemd or via dbus by other applications and therefore firejail is not automatically applied.

It might be possible to have firejail sandbox those services but this needs a closer look.

<!-- gh-comment-id:263297381 --> @valoq commented on GitHub (Nov 28, 2016): There is already a profile for tracker, however the problem is that these are services that are started by systemd or via dbus by other applications and therefore firejail is not automatically applied. It might be possible to have firejail sandbox those services but this needs a closer look.
Author
Owner

@slicer69 commented on GitHub (Dec 16, 2016):

I don't think anyone has mentioned the Qupzilla web browser yet. I put together a rough profile for Qupzilla in case anyone wants to expand on it. It is basically the Firefox profile with the config and cache paths changed and some unneeded permissions removed.

qupzilla.txt

<!-- gh-comment-id:267604620 --> @slicer69 commented on GitHub (Dec 16, 2016): I don't think anyone has mentioned the Qupzilla web browser yet. I put together a rough profile for Qupzilla in case anyone wants to expand on it. It is basically the Firefox profile with the config and cache paths changed and some unneeded permissions removed. [qupzilla.txt](https://github.com/netblue30/firejail/files/657389/qupzilla.txt)
Author
Owner

@netblue30 commented on GitHub (Dec 16, 2016):

I merged QupZilla profile, thanks!

<!-- gh-comment-id:267656893 --> @netblue30 commented on GitHub (Dec 16, 2016): I merged QupZilla profile, thanks!
Author
Owner

@qazip commented on GitHub (Dec 28, 2016):

Profile requests:

<!-- gh-comment-id:269458239 --> @qazip commented on GitHub (Dec 28, 2016): Profile requests: - Ghetto-skype (https://github.com/stanfieldr/ghetto-skype); - Riot (https://riot.im/); Riot has now a linux client.
Author
Owner

@qazip commented on GitHub (Jan 24, 2017):

Profile requests:

<!-- gh-comment-id:274936773 --> @qazip commented on GitHub (Jan 24, 2017): Profile requests: - Iridium Browser (https://iridiumbrowser.de/)
Author
Owner

@netblue30 commented on GitHub (Jan 25, 2017):

I'll try it out.

<!-- gh-comment-id:275115559 --> @netblue30 commented on GitHub (Jan 25, 2017): I'll try it out.
Author
Owner

@nyancat18 commented on GitHub (Jan 26, 2017):

@netblue30 and waterfox (a good firefox fork) :D

<!-- gh-comment-id:275291785 --> @nyancat18 commented on GitHub (Jan 26, 2017): @netblue30 and waterfox (a good firefox fork) :D
Author
Owner

@jgandert commented on GitHub (Feb 26, 2017):

Could you add rambox (open source alternative to Franz multi messenger)?

https://github.com/saenzramiro/rambox

<!-- gh-comment-id:282591256 --> @jgandert commented on GitHub (Feb 26, 2017): Could you add rambox (open source alternative to Franz multi messenger)? https://github.com/saenzramiro/rambox
Author
Owner

@0xBRM commented on GitHub (Feb 26, 2017):

Discord.

<!-- gh-comment-id:282596756 --> @0xBRM commented on GitHub (Feb 26, 2017): Discord.
Author
Owner

@netblue30 commented on GitHub (Mar 10, 2017):

Moved to https://github.com/netblue30/firejail/issues/1139

<!-- gh-comment-id:285662178 --> @netblue30 commented on GitHub (Mar 10, 2017): Moved to https://github.com/netblue30/firejail/issues/1139
Author
Owner

@pemartins1 commented on GitHub (Jun 26, 2017):

I'd like to request a profile for Geary Email Client (https://github.com/GNOME/geary).

Thank you very much and keep up with the good work.

<!-- gh-comment-id:311161761 --> @pemartins1 commented on GitHub (Jun 26, 2017): I'd like to request a profile for **Geary Email Client** (https://github.com/GNOME/geary). Thank you very much and keep up with the good work.
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference: github-starred/firejail#560
No description provided.