mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #1123] allow --net only for sandboxes started (or configured) by root #772
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#772
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @testbird on GitHub (Mar 4, 2017).
Original GitHub issue: https://github.com/netblue30/firejail/issues/1123
Hi netblue, separating this into a proper issue.
Using the SUID firejail, a regular user can access the network even if it is blocked for the host. Using --net is like connecting new boxes to the network.
May be it is possible to only allow to directly configure (non-local) --net configurations for root (and all users with preexisting permissions) and make all others depend on root owned profiles? (Kind of executing part of firejail setup code under NO_NEW_PRIVS, exept when reading a root owned profiles.)
@netblue30 commented on GitHub (Mar 5, 2017):
It is already implemented. In a text editor open /etc/firejail/firejail.config and enable restricted-network:
@testbird commented on GitHub (Mar 5, 2017):
I see now. Sorry I missed that.
I am not sure why of if you consider the current default as a secure, though.
@testbird commented on GitHub (Mar 5, 2017):
I tried setting
restricted-network yes.However, this breaks sanboxes with network settings preconfigured in /etc/firejail/ (file owner root).
@netblue30 commented on GitHub (Mar 10, 2017):
I configured "restricted-network yes", it seems to be working fine on wide range of applications. What problem are you seeing?
@testbird commented on GitHub (Mar 10, 2017):
For example, user root configures networking in /etc/firejail/firefox.profile
With
restricted-network yes, regular users can not use networking anymore (even with the configuration that root put into the sytem default .profile (broken functionality).I think users should be allowed to use the setting from (root owned) profiles, while restricting users from (re)configuring sandboxes with arbitrary network configurations is ok, of course.
@testbird commented on GitHub (Mar 10, 2017):
The idea to make this universally save for all options, was to execute only the system profiles with full suid permissions, and the comand line and user profiles in a limited (non-suid) user environment.