mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #961] Whitelisting folder? #653
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#653
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @peterzhu2118 on GitHub (Dec 6, 2016).
Original GitHub issue: https://github.com/netblue30/firejail/issues/961
How do I whitelist a folder under
/root? Right now I addedwhitelist /root/tempto the profile file but if I dofirejail ls /root/tempit says the folder doesn't exist. I want to disable everything else (other folders).@netblue30 commented on GitHub (Dec 8, 2016):
I'll add support for it, currently only user home, /dev, /media, /mnt, /opt, /srv, /var, and /tmp are supported by whitelist.
@peterzhu2118 commented on GitHub (Dec 8, 2016):
@netblue30 But my home folder is
/root. If I doecho $HOMEI get/root. But the whitelisting doesn't allow the program to read the files inside that folder (program says file is not found).@peterzhu2118 commented on GitHub (Dec 8, 2016):
It seems to be caused by the
privateflag in the profile file, if I remove the flag it all works. But I need the program to be isolated so it can only see one folder.@netblue30 commented on GitHub (Dec 9, 2016):
Let me look into it, for now get rid of "private" in the profile.
@peterzhu2118 commented on GitHub (Dec 9, 2016):
@netblue30 I need a new filesystem to be mounted on top of
/rootbut I need one folder to carry over from the actual system into the new mounted one. Getting rid ofprivatecauses a huge security hole in my software.@netblue30 commented on GitHub (Dec 9, 2016):
No problem, I'll add proper whitelisting support for /root.
@peterzhu2118 commented on GitHub (Dec 9, 2016):
@netblue30 Ok thanks! Please let me know when you implement it!
@netblue30 commented on GitHub (Dec 9, 2016):
I would say by the end of the weekend it should be in.
@netblue30 commented on GitHub (Dec 11, 2016):
It looks like is already supported! The problem is "private" command in the default profile for running root sandboxes. The profile is /etc/firejail/server.profile. Start the sandbox as root this way:
@peterzhu2118 commented on GitHub (Dec 11, 2016):
@netblue30 Thanks, that fixed the problem. But is there any way to place that in a config file so that I don't have to type all of that in every time?
@netblue30 commented on GitHub (Dec 13, 2016):
Create a custom profile (as root):
Open ~/.config/firejail/server.profile and comment out private line (add a #).