mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #99] Please add an Profile for Skype #58
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#58
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @Micha-Btz on GitHub (Oct 25, 2015).
Original GitHub issue: https://github.com/netblue30/firejail/issues/99
Hi There,
please add an Profile for Skype. I tried on my own, but i cant get it to work.
Micha
@reinerh commented on GitHub (Oct 26, 2015):
This could be the same problem as #86, as skype is also only available as 32-bit package.
@netblue30 commented on GitHub (Oct 26, 2015):
It has the same 32bit/64bit seccomp problem as wine and steam. Can you please try:
This should disable seccomp for now.
@Micha-Btz commented on GitHub (Oct 26, 2015):
is working.
firejail --noprofile skypeBut if it makes sence?
As far is i am understand, i can secure some dirs and files to denied the access to it.
@netblue30 commented on GitHub (Oct 26, 2015):
This is great news! It means we are 90% done. This is how the sandbox works:
First, it configures a new home directory (blacklists, whitelists etc.) It is basically a chroot created on the fly.
Second, a seccomp filter will prevent the intruder to escape the chroot.
Third, just in case he managed to remove the chroot, a Linux capabilites (man 7 capabilities) filter is installed. This disables kernel module loading, filesystem mounts, changing networking system etc. Basically all sysadmin actions are disabled.
The only thing we are missing is the seccomp filter. It will come in the next few days. By the end of the week we should be all done. Until then, run it like this:
I'll comment here on this thread when seccomp is in. Thanks.
@netblue30 commented on GitHub (Oct 26, 2015):
Sorry, something else you can try. Build a skype profile in your home directory:
Then, open skype.profile file in a text editor and comment out seccomp line (add a # in front of the line). Somebody just submitted a patch with a similar profile for steam.
@Micha-Btz commented on GitHub (Oct 26, 2015):
works, so it protect my files. thats enough for me
@netblue30 commented on GitHub (Oct 27, 2015):
Fixed, skype profile included.