firejail/etc/profile-a-l/dropbox.profile
Kelvin M. Klann 945ad858ed
profiles: deny access to ~/.config/autostart (#6257)
The files in this directory are intended to be automatically executed
when the user logs in.

In which case, granting write access to this directory allows the
program to easily escape the sandbox (by autostarting itself outside of
firejail, for example).

Misc: This was noticed on #6244.
2024-03-24 06:44:22 +00:00

52 lines
1.1 KiB
Text

# Firejail profile for dropbox
# This file is overwritten after every install/update
# Persistent local customizations
include dropbox.local
# Persistent global definitions
include globals.local
# To allow the program to autostart, add the following to dropbox.local:
# Warning: This allows the program to easily escape the sandbox.
#noblacklist ${HOME}/.config/autostart
#mkfile ${HOME}/.config/autostart/dropbox.desktop
#whitelist ${HOME}/.config/autostart/dropbox.desktop
noblacklist ${HOME}/.dropbox
noblacklist ${HOME}/.dropbox-dist
# Allow python3 (blacklisted by disable-interpreters.inc)
include allow-python3.inc
include disable-common.inc
include disable-devel.inc
include disable-interpreters.inc
include disable-programs.inc
mkdir ${HOME}/.dropbox
mkdir ${HOME}/.dropbox-dist
mkdir ${HOME}/Dropbox
whitelist ${HOME}/.dropbox
whitelist ${HOME}/.dropbox-dist
whitelist ${HOME}/Dropbox
include whitelist-common.inc
caps.drop all
netfilter
no3d
nodvd
nogroups
noinput
nonewprivs
noroot
nosound
notv
nou2f
novideo
protocol unix,inet,inet6
seccomp
private-dev
private-tmp
noexec /tmp
restrict-namespaces