[GH-ISSUE #940] Implement SandboxIE features #640

Closed
opened 2026-05-05 06:20:04 -06:00 by gitea-mirror · 3 comments
Owner

Originally created by @KOLANICH on GitHub (Nov 26, 2016).
Original GitHub issue: https://github.com/netblue30/firejail/issues/940

SandboxIE is a sandbox for Windows. It has some features not present in firejail like IPC isolation (if you start FireFox in a sandbox it starts in sandbox without respect to FF out of sandbox). The processes in a sandbox don't see the processes in another sandboxes and out of sandboxes). There is a need to find out what is missing in firejail and implement it.

Originally created by @KOLANICH on GitHub (Nov 26, 2016). Original GitHub issue: https://github.com/netblue30/firejail/issues/940 SandboxIE is a sandbox for Windows. It has some features not present in firejail like IPC isolation (if you start FireFox in a sandbox it starts in sandbox without respect to FF out of sandbox). The processes in a sandbox don't see the processes in another sandboxes and out of sandboxes). There is a need to find out what is missing in firejail and implement it.
gitea-mirror 2026-05-05 06:20:04 -06:00
Author
Owner

@valoq commented on GitHub (Nov 26, 2016):

Firejail has the ipc-namespace option to create a new ipc namespace with complete isolation.

Sandboxie is a closed source application claiming to sandbox other processes. It‘s hard to tell how useful that sandbox really is and what it really does, I wouldn‘t trust that software.

<!-- gh-comment-id:263075710 --> @valoq commented on GitHub (Nov 26, 2016): Firejail has the ipc-namespace option to create a new ipc namespace with complete isolation. Sandboxie is a closed source application claiming to sandbox other processes. It‘s hard to tell how useful that sandbox really is and what it really does, I wouldn‘t trust that software.
Author
Owner

@KOLANICH commented on GitHub (Nov 26, 2016):

Sandboxie is a closed source application claiming to sandbox other processes. It‘s hard to tell how useful that sandbox really is and what it really does, I wouldn‘t trust that software.

I understand that. I just wonder if it is at least as secure to run malware not using privilege escalation exploits in firejail as it is in SandboxIE, assuming that there is no backdoors and the existing features are implemented correctly.

<!-- gh-comment-id:263083669 --> @KOLANICH commented on GitHub (Nov 26, 2016): >Sandboxie is a closed source application claiming to sandbox other processes. It‘s hard to tell how useful that sandbox really is and what it really does, I wouldn‘t trust that software. I understand that. I just wonder if it is at least as secure to run malware not using privilege escalation exploits in firejail as it is in SandboxIE, assuming that there is no backdoors and the existing features are implemented correctly.
Author
Owner

@netblue30 commented on GitHub (Nov 27, 2016):

not using privilege escalation exploits

This is done by default.

<!-- gh-comment-id:263123673 --> @netblue30 commented on GitHub (Nov 27, 2016): > not using privilege escalation exploits This is done by default.
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference: github-starred/firejail#640
No description provided.