mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #1125] default-policy.conf to select whitelisting (isolated operation) or blacklisting (integated operation) #774
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#774
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @testbird on GitHub (Mar 5, 2017).
Original GitHub issue: https://github.com/netblue30/firejail/issues/1125
Currently, the default firejail session seems to be based on blacklisting, while some profiles configure whitelisting.
For example, executing firejail produces a shell that has access to $HOME, the network, and X input, which may not be a desired default behavior in all cases.
The .inc files inspired me to suggest a central
default-policy.conffile.Let that file get included by all default profiles (instead of directly including
disable-*.inc), and thus allow to configure the default policy by (un)commenting the inclusion of rules. (The rules file then loads the appropriatedisable-*.incfiles.)@netblue30 commented on GitHub (Mar 7, 2017):
Yes, mostly browsers are whitelisted, everything else is blacklisted. I'll bring in a default-policy.conf or similar, thanks.
@chiraag-nataraj commented on GitHub (Sep 30, 2018):
@netblue30 This isn't really done at this point. Is this something we actually want to do?
@testbird commented on GitHub (Sep 30, 2018):
A configurable default policy also seems to be important to allow the root administrator to ensure this for regular users.
@SkewedZeppelin commented on GitHub (Sep 30, 2018):
Most profiles that can be whitelisted already are. And nothing prevents users from locally overriding profiles.
@Vincent43 commented on GitHub (Sep 30, 2018):
There is also
/etc/firejail/globals.localfor local administration used by all profiles.@rusty-snake commented on GitHub (Jan 25, 2020):
IMHO here is nothing to do, should we close?