mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #111] Protect shell startup files #71
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#71
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @dbakker on GitHub (Oct 30, 2015).
Original GitHub issue: https://github.com/netblue30/firejail/issues/111
Firejail currently blocks access to directories such as
~/.sshto protect your secrets.One way an attacker could currently still get to them though is by adding a malicious command to one of the automatically executed files, such as
~/.profileor~/.bash_logout. That command will then get executed outside of firejail when you reboot and login to your user account.Perhaps it would be a good idea to make those kinds of files read only? My list so far:
Unfortunately, It's not fullproof. For example, some arbitrary files may be getting sourced from
~/.bashrcthat an attacker can edit. Or an attacker may hide code in a.git/hooksfile or some other more uncommon initialization file or script.Another point is that some users may want to be able to edit those files within the jail. For that we could considering making it optional and read-only or blacklist these files for known programs (such as firefox and so on).
I'm just throwing this up there because there didn't seem to be any discussion about it so far and it seems like an issue that should be addressed.
@netblue30 commented on GitHub (Oct 30, 2015):
Thank you for the patch - merged into etc/disable-common.inc