mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #1078] Issue whitelisting or noblacklisting home dir #733
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#733
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @azimut on GitHub (Jan 29, 2017).
Original GitHub issue: https://github.com/netblue30/firejail/issues/1078
I can't find a way to make firejail work with my setup. I have different users with different home directories on ex: /tree/a/b/c/ /tree/a/c/d/ , etc.
So I want to blacklist access to /tree, but whitelist access to the user home directory. There is a way to do this with the current --blacklist --noblacklist or --whitelist options? I cannot seem to find the correct ones.
I can blacklist /tree no problem, but cannot just "whitelist" the home (~/) subdir.
@netblue30 commented on GitHub (Jan 30, 2017):
Masking the user accounts is kind of tricky, because you need to know where the user accounts are located. In this moment we can handle only user accounts stored under /home. Maybe we can bring this kind of support in a future release, but for now is not supported.
@azimut commented on GitHub (Feb 2, 2017):
If I could --bind as non-root (with firejail suid set) I should be able to work around this. For reference "bubblewrap" allows that. But there should be a good reason to disable it here I think. Other than that my other option could be use "--chroot" with a pre-baked environment. Any guidelines written about --chroot with firejail?
@netblue30 commented on GitHub (Feb 4, 2017):
Binding as nonroot is dangerous. For example, you can bind an new version of /etc directory with a known password in /etc/shadow.
@azimut commented on GitHub (Mar 20, 2017):
FWIW, I ended up having some free time to resume this. My workaround was create symlinks under /home pointing to /data/a/dir/ and add the blacklist of /data on default.profile.