[GH-ISSUE #1419] Archive Managers can't acces network folders #965

Closed
opened 2026-05-05 07:13:51 -06:00 by gitea-mirror · 12 comments
Owner

Originally created by @Utini2000 on GitHub (Jul 31, 2017).
Original GitHub issue: https://github.com/netblue30/firejail/issues/1419

Hello everyone,
I am on Archlinux and due to the network restriction the following archive managers aren't able to access/extract to/from network shared folders:

file-roller
xarchiver
ark

I can manually edit the .conf but it will be overwritten after each update? Or to .local files always trump .profile files? Besides that I think it should still be possible for those application to exttract to network folders?

Thanks in advance !

Originally created by @Utini2000 on GitHub (Jul 31, 2017). Original GitHub issue: https://github.com/netblue30/firejail/issues/1419 Hello everyone, I am on Archlinux and due to the network restriction the following archive managers aren't able to access/extract to/from network shared folders: file-roller xarchiver ark I can manually edit the .conf but it will be overwritten after each update? Or to .local files always trump .profile files? Besides that I think it should still be possible for those application to exttract to network folders? Thanks in advance !
gitea-mirror 2026-05-05 07:13:51 -06:00
Author
Owner

@chiraag-nataraj commented on GitHub (Aug 1, 2017):

You can always put

include /etc/firejail/file-roller.profile
ignore net

or something in a profile in ~/.config/firejail/file-roller.profile.

I do disagree, though, that archive managers should have access to the network. If you need it to extract something on the network, the right way (IMHO) is to mount that filesystem to a local mount point (e.g. using sshfs) and then treat it as a local resource. Because the sshfs process is running outside the sandbox, you won't have any problems regarding actually writing the files.

<!-- gh-comment-id:319379267 --> @chiraag-nataraj commented on GitHub (Aug 1, 2017): You can always put ```` include /etc/firejail/file-roller.profile ignore net ```` or something in a profile in `~/.config/firejail/file-roller.profile`. I do disagree, though, that archive managers should have access to the network. If you need it to extract something on the network, the right way (IMHO) is to mount that filesystem to a local mount point (e.g. using sshfs) and then treat it as a local resource. Because the sshfs process is running outside the sandbox, you won't have any problems regarding actually writing the files.
Author
Owner

@Utini2000 commented on GitHub (Aug 2, 2017):

Hmm I am on Arch + Gnome and mounted an locally shared hdd via SMB in Nemo. That didnt work

<!-- gh-comment-id:319759838 --> @Utini2000 commented on GitHub (Aug 2, 2017): Hmm I am on Arch + Gnome and mounted an locally shared hdd via SMB in Nemo. That didnt work
Author
Owner

@chiraag-nataraj commented on GitHub (Aug 2, 2017):

Interesting. I know that it works for sshfs. I ssh in and mount a certain directory to /media/ccv. Then I can open up a jailed x-terminal-emulator (urxvt in my case) which does not have internet access and still read from/write to /media/ccv.

<!-- gh-comment-id:319760415 --> @chiraag-nataraj commented on GitHub (Aug 2, 2017): Interesting. I know that it works for `sshfs`. I `ssh` in and mount a certain directory to `/media/ccv`. Then I can open up a jailed `x-terminal-emulator` (`urxvt` in my case) _which does not have internet access_ and still read from/write to `/media/ccv`.
Author
Owner

@SkewedZeppelin commented on GitHub (Aug 2, 2017):

The gvfs-* providers seem to be incompatible compared to sshfs. Most likely because sshfs creates an actual mount instead of just a weird virtual directory. See https://askubuntu.com/a/87702

Oddly even after giving file-roller network access I was still unable to compress files accessed via gvfs-sftp.

<!-- gh-comment-id:319770592 --> @SkewedZeppelin commented on GitHub (Aug 2, 2017): The gvfs-* providers seem to be incompatible compared to sshfs. Most likely because sshfs creates an actual mount instead of just a weird virtual directory. See https://askubuntu.com/a/87702 Oddly even after giving file-roller network access I was still unable to compress files accessed via gvfs-sftp.
Author
Owner

@chiraag-nataraj commented on GitHub (Aug 3, 2017):

Huh...I see. Yeah, I guess I stopped using gvfs stuff a long time ago xD

<!-- gh-comment-id:319836439 --> @chiraag-nataraj commented on GitHub (Aug 3, 2017): Huh...I see. Yeah, I guess I stopped using gvfs stuff a long time ago xD
Author
Owner

@Utini2000 commented on GitHub (Aug 3, 2017):

Hmm so even grqnting network access wont help?
How to fix this then? :o

<!-- gh-comment-id:320016870 --> @Utini2000 commented on GitHub (Aug 3, 2017): Hmm so even grqnting network access wont help? How to fix this then? :o
Author
Owner

@chiraag-nataraj commented on GitHub (Aug 11, 2017):

@Utini2000, are you using smbnetfs? You could give that a try rather than gvfs (I think smbnetfs uses FUSE instead).

<!-- gh-comment-id:321739165 --> @chiraag-nataraj commented on GitHub (Aug 11, 2017): @Utini2000, are you using `smbnetfs`? You could give that a try rather than `gvfs` (I think `smbnetfs` uses FUSE instead).
Author
Owner

@ghost commented on GitHub (Jun 7, 2018):

I'm having the same issue atm with Firejail 0.9.54, where or what do I edit to have this working again, I need access to my drive asap. I've removed it for now until I can figure this out or get help.

System is Kubuntu 18.04 LTS and my WD Passport drive is attached to my router (Asus RT-AC86U)

<!-- gh-comment-id:395549348 --> @ghost commented on GitHub (Jun 7, 2018): I'm having the same issue atm with Firejail 0.9.54, where or what do I edit to have this working again, I need access to my drive asap. I've removed it for now until I can figure this out or get help. System is Kubuntu 18.04 LTS and my WD Passport drive is attached to my router (Asus RT-AC86U)
Author
Owner

@chiraag-nataraj commented on GitHub (Jun 7, 2018):

@GeoffK59 See if #1560 helps.

<!-- gh-comment-id:395564484 --> @chiraag-nataraj commented on GitHub (Jun 7, 2018): @GeoffK59 See if #1560 helps.
Author
Owner

@ghost commented on GitHub (Jun 7, 2018):

@chiraag-nataraj I read that thread but I'm still a bit confused as to what or where to edit and or be able to restrict access at will. Honestly I don't understand why Firejail is restricting this as I'm root and should therefore have access no matter what.

<!-- gh-comment-id:395574915 --> @ghost commented on GitHub (Jun 7, 2018): @chiraag-nataraj I read that thread but I'm still a bit confused as to what or where to edit and or be able to restrict access at will. Honestly I don't understand why Firejail is restricting this as I'm root and should therefore have access no matter what.
Author
Owner

@chiraag-nataraj commented on GitHub (Jul 16, 2018):

@GeoffK59 firejail is just restricting based on its profile. It doesn't care about whether you're root or another user (unless you're trying to use a feature which is restricted to root, of course).

If you're using a FUSE filesystem (e.g. sshfs), try mounting with -o allow_others.

<!-- gh-comment-id:405136803 --> @chiraag-nataraj commented on GitHub (Jul 16, 2018): @GeoffK59 `firejail` is just restricting based on its profile. It doesn't care about whether you're root or another user (unless you're trying to use a feature which is restricted to root, of course). If you're using a FUSE filesystem (e.g. sshfs), try mounting with `-o allow_others`.
Author
Owner

@chiraag-nataraj commented on GitHub (Jul 22, 2018):

I think allowing archive managers to access the network is bad as a default. In general, a more secure workflow is copying the file to a shared directory (say, ~/Downloads) and using the archive manager there. Of course, if people want to locally allow network access, that makes sense. But I don't think we should do that by default.

@GeoffK59 I'm going to close this due to no response. If you try that and still can't get it to work, please feel free to reopen.

<!-- gh-comment-id:406891785 --> @chiraag-nataraj commented on GitHub (Jul 22, 2018): I think allowing archive managers to access the network is bad as a default. In general, a more secure workflow is copying the file to a shared directory (say, `~/Downloads`) and using the archive manager there. Of course, if people want to locally allow network access, that makes sense. But I don't think we should do that by default. @GeoffK59 I'm going to close this due to no response. If you try that and still can't get it to work, please feel free to reopen.
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference: github-starred/firejail#965
No description provided.