aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorLibravatar netblue30 <netblue30@yahoo.com>2016-04-21 10:47:52 -0400
committerLibravatar netblue30 <netblue30@yahoo.com>2016-04-21 10:47:52 -0400
commite547b142597568da678c54da8b5b4164fb3fee86 (patch)
tree6a738b916c330c85216d0cddcedc971150cb98b2
parentadded --read-write option (diff)
downloadfirejail-e547b142597568da678c54da8b5b4164fb3fee86.tar.gz
firejail-e547b142597568da678c54da8b5b4164fb3fee86.tar.zst
firejail-e547b142597568da678c54da8b5b4164fb3fee86.zip
--read-write option
-rw-r--r--RELNOTES1
-rw-r--r--src/firejail/usage.c1
-rw-r--r--src/man/firejail-profile.txt21
-rw-r--r--src/man/firejail.txt27
4 files changed, 34 insertions, 16 deletions
diff --git a/RELNOTES b/RELNOTES
index 19bd54dd6..2a7e8ca60 100644
--- a/RELNOTES
+++ b/RELNOTES
@@ -6,6 +6,7 @@ firejail (0.9.40-rc1) baseline; urgency=low
6 * added --cpu.print option 6 * added --cpu.print option
7 * added filetransfer options --ls and --get 7 * added filetransfer options --ls and --get
8 * added --writable-etc and --writable-var options 8 * added --writable-etc and --writable-var options
9 * added --read-only option
9 * added mkdir, ipc-namespace, and nosound profile commands 10 * added mkdir, ipc-namespace, and nosound profile commands
10 * added net, ip, defaultgw, ip6, mac, mtu and iprange profile commands 11 * added net, ip, defaultgw, ip6, mac, mtu and iprange profile commands
11 * --version also prints compile options 12 * --version also prints compile options
diff --git a/src/firejail/usage.c b/src/firejail/usage.c
index 8b61629f4..8c738a0fc 100644
--- a/src/firejail/usage.c
+++ b/src/firejail/usage.c
@@ -209,6 +209,7 @@ void usage(void) {
209 printf("\tcreated for the real user ID of the calling process.\n\n"); 209 printf("\tcreated for the real user ID of the calling process.\n\n");
210 printf(" --rlimit-sigpending=number - set the maximum number of pending signals\n"); 210 printf(" --rlimit-sigpending=number - set the maximum number of pending signals\n");
211 printf("\tfor a process.\n\n"); 211 printf("\tfor a process.\n\n");
212 printf(" --read-write=dirname_or_filename - set directory or file read-write..\n\n");
212#ifdef HAVE_NETWORK 213#ifdef HAVE_NETWORK
213 printf(" --scan - ARP-scan all the networks from inside a network namespace.\n"); 214 printf(" --scan - ARP-scan all the networks from inside a network namespace.\n");
214 printf("\tThis makes it possible to detect macvlan kernel device drivers\n"); 215 printf("\tThis makes it possible to detect macvlan kernel device drivers\n");
diff --git a/src/man/firejail-profile.txt b/src/man/firejail-profile.txt
index 8ad2eefad..19063f5ef 100644
--- a/src/man/firejail-profile.txt
+++ b/src/man/firejail-profile.txt
@@ -122,12 +122,6 @@ blacklist ${PATH}/ifconfig
122blacklist ${HOME}/.ssh 122blacklist ${HOME}/.ssh
123 123
124.TP 124.TP
125\fBread-only file_or_directory
126Make directory or file read-only.
127.TP
128\fBtmpfs directory
129Mount an empty tmpfs filesystem on top of directory. This option is available only when running the sandbox as root.
130.TP
131\fBbind directory1,directory2 125\fBbind directory1,directory2
132Mount-bind directory1 on top of directory2. This option is only available when running as root. 126Mount-bind directory1 on top of directory2. This option is only available when running as root.
133.TP 127.TP
@@ -182,6 +176,18 @@ All modifications are discarded when the sandbox is closed.
182\fBprivate-tmp 176\fBprivate-tmp
183Mount an empty temporary filesystem on top of /tmp directory. 177Mount an empty temporary filesystem on top of /tmp directory.
184.TP 178.TP
179\fBread-only file_or_directory
180Make directory or file read-only.
181.TP
182\fBread-write file_or_directory
183Make directory or file read-write.
184.TP
185\fBtmpfs directory
186Mount an empty tmpfs filesystem on top of directory. This option is available only when running the sandbox as root.
187.TP
188\fBtracelog
189Blacklist violations logged to syslog.
190.TP
185\fBwhitelist file_or_directory 191\fBwhitelist file_or_directory
186Build a new user home in a temporary filesystem, and mount-bind file_or_directory. 192Build a new user home in a temporary filesystem, and mount-bind file_or_directory.
187The modifications to file_or_directory are persistent, everything else is discarded 193The modifications to file_or_directory are persistent, everything else is discarded
@@ -194,9 +200,6 @@ when running the sandbox as root user.
194\fBwritable-var 200\fBwritable-var
195Mount /var directory read-write. This option is available only 201Mount /var directory read-write. This option is available only
196when running the sandbox as root user. 202when running the sandbox as root user.
197.TP
198\fBtracelog
199Blacklist violations logged to syslog.
200.SH Security filters 203.SH Security filters
201The following security filters are currently implemented: 204The following security filters are currently implemented:
202 205
diff --git a/src/man/firejail.txt b/src/man/firejail.txt
index 51abaef28..19415a332 100644
--- a/src/man/firejail.txt
+++ b/src/man/firejail.txt
@@ -50,15 +50,16 @@ of applications. The software includes security profiles for a number of more co
50Linux programs, such as Mozilla Firefox, Chromium, VLC, Transmission etc. 50Linux programs, such as Mozilla Firefox, Chromium, VLC, Transmission etc.
51 51
52.SH USAGE 52.SH USAGE
53Without any options, the sandbox consists of a chroot filesystem build in a new mount namespace, 53Without any options, the sandbox consists of a filesystem build in a new mount namespace,
54and new PID and UTS namespaces. IPC, network and user namespaces can be added using the command line options. 54and new PID and UTS namespaces. IPC, network and user namespaces can be added using the
55The default Firejail filesystem is based on the host filesystem with the main directories mounted read-only. 55command line options. The default Firejail filesystem is based on the host filesystem with the main
56Only /home and /tmp are writable. 56system directories mounted read-only. These directories are /etc, /var, /usr, /bin, /sbin, /lib, /lib32,
57/libx32 and /lib64. Only /home and /tmp are writable.
57.PP 58.PP
58As it starts up, Firejail tries to find a security profile based on the name of the application. 59As it starts up, Firejail tries to find a security profile based on the name of the application.
59If an appropriate profile is not found, Firejail will use a default profile. 60If an appropriate profile is not found, Firejail will use a default profile.
60The default profile is quite restrictive. In case the application doesn't work, use --noprofile option 61The default profile is quite restrictive. In case the application doesn't work, use --noprofile option
61to disable it. For more information, please see \fBSECURITY PROFILES\fR section. 62to disable it. For more information, please see \fBSECURITY PROFILES\fR section below.
62.PP 63.PP
63If a program argument is not specified, Firejail starts /bin/bash shell. 64If a program argument is not specified, Firejail starts /bin/bash shell.
64Examples: 65Examples:
@@ -194,7 +195,8 @@ Example:
194 195
195.TP 196.TP
196\fB\-\-chroot=dirname 197\fB\-\-chroot=dirname
197Chroot the sandbox into a root filesystem. If the sandbox is started as a 198Chroot the sandbox into a root filesystem. Unlike the regular filesystem container,
199the system directories are mounted read-write. If the sandbox is started as a
198regular user, default seccomp and capabilities filters are enabled. This 200regular user, default seccomp and capabilities filters are enabled. This
199option is not available on Grsecurity systems. 201option is not available on Grsecurity systems.
200.br 202.br
@@ -946,7 +948,8 @@ $ ls -l sandboxlog*
946 948
947.TP 949.TP
948\fB\-\-overlay 950\fB\-\-overlay
949Mount a filesystem overlay on top of the current filesystem. All filesystem modifications go into the overlay. 951Mount a filesystem overlay on top of the current filesystem. Unlike the regular filesystem container,
952the system directories are mounted read-write. All filesystem modifications go into the overlay.
950The overlay is stored in $HOME/.firejail directory. This option is not available on Grsecurity systems. 953The overlay is stored in $HOME/.firejail directory. This option is not available on Grsecurity systems.
951.br 954.br
952 955
@@ -1143,6 +1146,16 @@ Set the maximum number of processes that can be created for the real user ID of
1143.TP 1146.TP
1144\fB\-\-rlimit-sigpending=number 1147\fB\-\-rlimit-sigpending=number
1145Set the maximum number of pending signals for a process. 1148Set the maximum number of pending signals for a process.
1149
1150.TP
1151\fB\-\-read-write=dirname_or_filename
1152By default, the sandbox mounts system directories read-only.
1153These directories are /etc, /var, /usr, /bin, /sbin, /lib, /lib32, /libx32 and /lib64.
1154Use this option to mount read-write files or directories inside the system directories.
1155
1156This option is available only to root user. It has no effect when --chroot or --overlay are also set. In these
1157cases the system directories are mounted read-write.
1158
1146.TP 1159.TP
1147\fB\-\-scan 1160\fB\-\-scan
1148ARP-scan all the networks from inside a network namespace. 1161ARP-scan all the networks from inside a network namespace.