[GH-ISSUE #1491] How to simulate the installation of programs? #997

Closed
opened 2026-05-05 07:17:04 -06:00 by gitea-mirror · 4 comments
Owner

Originally created by @ghost on GitHub (Aug 23, 2017).
Original GitHub issue: https://github.com/netblue30/firejail/issues/1491

Originally created by @ghost on GitHub (Aug 23, 2017). Original GitHub issue: https://github.com/netblue30/firejail/issues/1491
gitea-mirror 2026-05-05 07:17:04 -06:00
Author
Owner

@netblue30 commented on GitHub (Aug 25, 2017):

I'll have to come up with some other procedure, the one you tried seems to be broken on the latest git version.

<!-- gh-comment-id:324905008 --> @netblue30 commented on GitHub (Aug 25, 2017): I'll have to come up with some other procedure, the one you tried seems to be broken on the latest git version.
Author
Owner

@SkewedZeppelin commented on GitHub (Aug 25, 2017):

@rekixex why not just fire up a VM and use snapshots? Especially considering that you're talking about untrusted programs... a VM with no net access is the best way to go.
You can even take it a step further and use something like this https://github.com/Cisco-Talos/vboxhardening

<!-- gh-comment-id:325028212 --> @SkewedZeppelin commented on GitHub (Aug 25, 2017): @rekixex why not just fire up a VM and use snapshots? Especially considering that you're talking about _untrusted_ programs... a VM with no net access is the best way to go. You can even take it a step further and use something like this https://github.com/Cisco-Talos/vboxhardening
Author
Owner

@smitsohu commented on GitHub (Aug 26, 2017):

Is it safe to normally install untrusted program and then run it with Firejail?

Rather not. You would need to carefully inspect the contents of the deb/rpm archive, in order to have an understanding what actually happens during installation (which files go where? Are there scripts? What do they do?). In the end you run the installer with root privileges, it could do everything with your system....

<!-- gh-comment-id:325067059 --> @smitsohu commented on GitHub (Aug 26, 2017): > Is it safe to normally install untrusted program and then run it with Firejail? Rather not. You would need to carefully inspect the contents of the deb/rpm archive, in order to have an understanding what actually happens during installation (which files go where? Are there scripts? What do they do?). In the end you run the installer with root privileges, it could do everything with your system....
Author
Owner

@netblue30 commented on GitHub (Aug 30, 2017):

If you need to install it as root and you don't trust them, you don't install it! Firejail relies heavily on Linux kernel security support. If they have a 0 day exploit, they might be able to bypass the kernel security. Better go with a virtual machine.

<!-- gh-comment-id:326054934 --> @netblue30 commented on GitHub (Aug 30, 2017): If you need to install it as root and you don't trust them, you don't install it! Firejail relies heavily on Linux kernel security support. If they have a 0 day exploit, they might be able to bypass the kernel security. Better go with a virtual machine.
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference: github-starred/firejail#997
No description provided.