mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #1456] improve exception handling / dynamic filter customization #979
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#979
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @Boruch-Baum on GitHub (Aug 11, 2017).
Original GitHub issue: https://github.com/netblue30/firejail/issues/1456
How about a feature that instead of firejail enigmatically denying some program some access, that it display a pop-up telling the user what is happening, and allowing the user to optionally permit the access just this once, or permanently?
The advantages include:
Letting a user know specifically what the program is trying to do. A user (or a security researcher) might decide that a program qualifies as malware based upon the specific pop-up messages from firejail.
Making it easier for users to customize profiles. This will also make it MUCH easier for people to accept and adopt firejail, because (in my experience) currently the program requires patience and frustration-tolerance.
The disadvantages might include:
well, it's more work
pop-ups maybe implemented differently by different distributions. Firejail could just decide upon one as a hard dependency. That might not always look seamless for users' desktop themes, but it would be easiest.
@netblue30 commented on GitHub (Aug 15, 2017):
It is not fireajil, it is the kernel. What firejail does is to configure seccomp and namespaces in Linux kernel and after that it goes to sleep. When access to a file is denied, only the kernel knows about it.
We do have a --tracelog option that works in user space for files specifically blacklisted. It sends a message to syslog announcing the access attempt, but like anything else in user space you can get around it.
@Boruch-Baum commented on GitHub (Aug 16, 2017):
Oh. That means what I was suggesting would entail a lot more work. Firejail would have to intercept somehow the kernel's complaint, and then act.
@Ferroin commented on GitHub (Aug 16, 2017):
FWIW, I think if you have auditing enabled, you can use that to get info on access denials, and that can't be bypassed. Doesn't help much of course with the possibility of allowing access, but it least it could improve the logged messages regarding the denied access.