aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorLibravatar rusty-snake <41237666+rusty-snake@users.noreply.github.com>2020-08-09 20:17:00 +0200
committerLibravatar rusty-snake <41237666+rusty-snake@users.noreply.github.com>2020-08-09 20:17:00 +0200
commit9858975f9c0cd12c2daf2d0c2d08ec6a82d3f4f9 (patch)
tree6a4f9afb1b23ea4f70f049ce6727e569dc7df768
parentprofile fixes (2) (diff)
downloadfirejail-9858975f9c0cd12c2daf2d0c2d08ec6a82d3f4f9.tar.gz
firejail-9858975f9c0cd12c2daf2d0c2d08ec6a82d3f4f9.tar.zst
firejail-9858975f9c0cd12c2daf2d0c2d08ec6a82d3f4f9.zip
profile fixes (3)
-rw-r--r--etc/allow-common-devel.inc16
-rw-r--r--etc/allow-java.inc7
-rw-r--r--etc/allow-lua.inc4
-rw-r--r--etc/allow-perl.inc6
-rw-r--r--etc/allow-php.inc7
-rw-r--r--etc/allow-python2.inc4
-rw-r--r--etc/allow-python3.inc4
-rw-r--r--etc/allow-ruby.inc4
-rw-r--r--etc/aria2c.profile3
-rw-r--r--etc/baobab.profile2
-rw-r--r--etc/beaker.profile1
-rw-r--r--etc/chromium-common.profile2
-rw-r--r--etc/disable-programs.inc1
-rw-r--r--etc/ephemeral.profile2
-rw-r--r--etc/ffmpeg.profile2
-rw-r--r--etc/firefox-common.profile4
-rw-r--r--etc/i2prouter.profile18
-rw-r--r--etc/keepass.profile2
-rw-r--r--etc/standardnotes-desktop.profile2
-rw-r--r--etc/start-tor-browser.profile2
-rw-r--r--etc/torbrowser-launcher.profile2
-rw-r--r--etc/udiskie.profile2
-rw-r--r--etc/wire-desktop.profile6
-rw-r--r--src/firecfg/firecfg.config1
24 files changed, 68 insertions, 36 deletions
diff --git a/etc/allow-common-devel.inc b/etc/allow-common-devel.inc
index 1d794462c..63174eda6 100644
--- a/etc/allow-common-devel.inc
+++ b/etc/allow-common-devel.inc
@@ -1,17 +1,21 @@
1# Rust 1# This file is overwritten during software install.
2noblacklist ${HOME}/.cargo/config 2# Persistent customizations should go in a .local file.
3noblacklist ${HOME}/.cargo/registry 3include allow-common-devel.local
4 4
5# Git 5# Git
6noblacklist ${HOME}/.config/git 6noblacklist ${HOME}/.config/git
7noblacklist ${HOME}/.gitconfig 7noblacklist ${HOME}/.gitconfig
8noblacklist ${HOME}/.git-credentials 8noblacklist ${HOME}/.git-credentials
9 9
10# Java
11noblacklist ${HOME}/.gradle
12noblacklist ${HOME}/.java
13
10# Python 14# Python
11noblacklist ${HOME}/.python-history 15noblacklist ${HOME}/.python-history
12noblacklist ${HOME}/.python_history 16noblacklist ${HOME}/.python_history
13noblacklist ${HOME}/.pythonhist 17noblacklist ${HOME}/.pythonhist
14 18
15# Java 19# Rust
16noblacklist ${HOME}/.gradle 20noblacklist ${HOME}/.cargo/config
17noblacklist ${HOME}/.java 21noblacklist ${HOME}/.cargo/registry
diff --git a/etc/allow-java.inc b/etc/allow-java.inc
index 5204d2dea..24d18fb77 100644
--- a/etc/allow-java.inc
+++ b/etc/allow-java.inc
@@ -1,6 +1,9 @@
1noblacklist ${HOME}/.java 1# This file is overwritten during software install.
2# Persistent customizations should go in a .local file.
3include allow-java.local
2 4
5noblacklist ${HOME}/.java
3noblacklist ${PATH}/java 6noblacklist ${PATH}/java
4noblacklist /usr/lib/java
5noblacklist /etc/java 7noblacklist /etc/java
8noblacklist /usr/lib/java
6noblacklist /usr/share/java 9noblacklist /usr/share/java
diff --git a/etc/allow-lua.inc b/etc/allow-lua.inc
index 51d76f9b1..fbdee22ee 100644
--- a/etc/allow-lua.inc
+++ b/etc/allow-lua.inc
@@ -1,3 +1,7 @@
1# This file is overwritten during software install.
2# Persistent customizations should go in a .local file.
3include allow-lua.local
4
1noblacklist ${PATH}/lua* 5noblacklist ${PATH}/lua*
2noblacklist /usr/include/lua* 6noblacklist /usr/include/lua*
3noblacklist /usr/lib/lua 7noblacklist /usr/lib/lua
diff --git a/etc/allow-perl.inc b/etc/allow-perl.inc
index d37328936..f44e1e3cc 100644
--- a/etc/allow-perl.inc
+++ b/etc/allow-perl.inc
@@ -1,5 +1,9 @@
1noblacklist ${PATH}/cpan* 1# This file is overwritten during software install.
2# Persistent customizations should go in a .local file.
3include allow-perl.local
4
2noblacklist ${PATH}/core_perl 5noblacklist ${PATH}/core_perl
6noblacklist ${PATH}/cpan*
3noblacklist ${PATH}/perl 7noblacklist ${PATH}/perl
4noblacklist ${PATH}/site_perl 8noblacklist ${PATH}/site_perl
5noblacklist ${PATH}/vendor_perl 9noblacklist ${PATH}/vendor_perl
diff --git a/etc/allow-php.inc b/etc/allow-php.inc
new file mode 100644
index 000000000..a0950dc26
--- /dev/null
+++ b/etc/allow-php.inc
@@ -0,0 +1,7 @@
1# This file is overwritten during software install.
2# Persistent customizations should go in a .local file.
3include allow-php.local
4
5noblacklist ${PATH}/php*
6noblacklist /usr/lib/php*
7noblacklist /usr/share/php*
diff --git a/etc/allow-python2.inc b/etc/allow-python2.inc
index 8ea61648b..b0525e2e1 100644
--- a/etc/allow-python2.inc
+++ b/etc/allow-python2.inc
@@ -1,3 +1,7 @@
1# This file is overwritten during software install.
2# Persistent customizations should go in a .local file.
3include allow-python2.local
4
1noblacklist ${PATH}/python2* 5noblacklist ${PATH}/python2*
2noblacklist /usr/include/python2* 6noblacklist /usr/include/python2*
3noblacklist /usr/lib/python2* 7noblacklist /usr/lib/python2*
diff --git a/etc/allow-python3.inc b/etc/allow-python3.inc
index 91c7ffca4..c5660a97d 100644
--- a/etc/allow-python3.inc
+++ b/etc/allow-python3.inc
@@ -1,3 +1,7 @@
1# This file is overwritten during software install.
2# Persistent customizations should go in a .local file.
3include allow-python3.local
4
1noblacklist ${PATH}/python3* 5noblacklist ${PATH}/python3*
2noblacklist /usr/include/python3* 6noblacklist /usr/include/python3*
3noblacklist /usr/lib/python3* 7noblacklist /usr/lib/python3*
diff --git a/etc/allow-ruby.inc b/etc/allow-ruby.inc
index 3165a981a..a8c701219 100644
--- a/etc/allow-ruby.inc
+++ b/etc/allow-ruby.inc
@@ -1,2 +1,6 @@
1# This file is overwritten during software install.
2# Persistent customizations should go in a .local file.
3include allow-ruby.local
4
1noblacklist ${PATH}/ruby 5noblacklist ${PATH}/ruby
2noblacklist /usr/lib/ruby 6noblacklist /usr/lib/ruby
diff --git a/etc/aria2c.profile b/etc/aria2c.profile
index 72e577d56..c478bbae9 100644
--- a/etc/aria2c.profile
+++ b/etc/aria2c.profile
@@ -7,6 +7,8 @@ include aria2c.local
7include globals.local 7include globals.local
8 8
9noblacklist ${HOME}/.aria2 9noblacklist ${HOME}/.aria2
10noblacklist ${HOME}/.config/aria2
11noblacklist ${HOME}/.netrc
10 12
11include disable-common.inc 13include disable-common.inc
12include disable-devel.inc 14include disable-devel.inc
@@ -35,6 +37,7 @@ seccomp
35shell none 37shell none
36 38
37# disable-mnt 39# disable-mnt
40# Add your custom event hook commands to 'private-bin' in your aria2c.local
38private-bin aria2c,gzip 41private-bin aria2c,gzip
39# Uncomment the next line (or put 'private-cache' in your aria2c.local) if you don't use Lutris/winetricks (see issue #2772) 42# Uncomment the next line (or put 'private-cache' in your aria2c.local) if you don't use Lutris/winetricks (see issue #2772)
40#private-cache 43#private-cache
diff --git a/etc/baobab.profile b/etc/baobab.profile
index eb0064115..e8287b448 100644
--- a/etc/baobab.profile
+++ b/etc/baobab.profile
@@ -6,7 +6,7 @@ include baobab.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9include disable-common.inc 9# include disable-common.inc
10include disable-devel.inc 10include disable-devel.inc
11include disable-exec.inc 11include disable-exec.inc
12include disable-interpreters.inc 12include disable-interpreters.inc
diff --git a/etc/beaker.profile b/etc/beaker.profile
index 21eeac4b3..cc1886a49 100644
--- a/etc/beaker.profile
+++ b/etc/beaker.profile
@@ -13,7 +13,6 @@ include disable-interpreters.inc
13 13
14mkdir ${HOME}/.config/Beaker Browser 14mkdir ${HOME}/.config/Beaker Browser
15whitelist ${HOME}/.config/Beaker Browser 15whitelist ${HOME}/.config/Beaker Browser
16whitelist ${DOWNLOADS}
17include whitelist-common.inc 16include whitelist-common.inc
18 17
19# Redirect 18# Redirect
diff --git a/etc/chromium-common.profile b/etc/chromium-common.profile
index 7b88e417a..c54fb0e19 100644
--- a/etc/chromium-common.profile
+++ b/etc/chromium-common.profile
@@ -37,7 +37,7 @@ notv
37shell none 37shell none
38 38
39disable-mnt 39disable-mnt
40private-dev 40?BROWSER_DISABLE_U2F: private-dev
41# private-tmp - problems with multiple browser sessions 41# private-tmp - problems with multiple browser sessions
42 42
43# the file dialog needs to work without d-bus 43# the file dialog needs to work without d-bus
diff --git a/etc/disable-programs.inc b/etc/disable-programs.inc
index a489a8fbb..207ee32e5 100644
--- a/etc/disable-programs.inc
+++ b/etc/disable-programs.inc
@@ -119,6 +119,7 @@ blacklist ${HOME}/.config/akonadi*
119blacklist ${HOME}/.config/akregatorrc 119blacklist ${HOME}/.config/akregatorrc
120blacklist ${HOME}/.config/ardour4 120blacklist ${HOME}/.config/ardour4
121blacklist ${HOME}/.config/ardour5 121blacklist ${HOME}/.config/ardour5
122blacklist ${HOME}/.config/aria2
122blacklist ${HOME}/.config/arkrc 123blacklist ${HOME}/.config/arkrc
123blacklist ${HOME}/.config/artha.conf 124blacklist ${HOME}/.config/artha.conf
124blacklist ${HOME}/.config/asunder 125blacklist ${HOME}/.config/asunder
diff --git a/etc/ephemeral.profile b/etc/ephemeral.profile
index fa7746da5..c688c2324 100644
--- a/etc/ephemeral.profile
+++ b/etc/ephemeral.profile
@@ -55,7 +55,7 @@ tracelog
55 55
56disable-mnt 56disable-mnt
57private-cache 57private-cache
58private-dev 58?BROWSER_DISABLE_U2F: private-dev
59# private-etc below works fine on most distributions. There are some problems on CentOS. 59# private-etc below works fine on most distributions. There are some problems on CentOS.
60#private-etc alternatives,asound.conf,ca-certificates,crypto-policies,dconf,fonts,group,gtk-2.0,gtk-3.0,hostname,hosts,ld.so.cache,localtime,login.defs,machine-id,mailcap,mime.types,nsswitch.conf,os-release,pango,passwd,pki,pulse,resolv.conf,selinux,ssl,X11,xdg 60#private-etc alternatives,asound.conf,ca-certificates,crypto-policies,dconf,fonts,group,gtk-2.0,gtk-3.0,hostname,hosts,ld.so.cache,localtime,login.defs,machine-id,mailcap,mime.types,nsswitch.conf,os-release,pango,passwd,pki,pulse,resolv.conf,selinux,ssl,X11,xdg
61private-tmp 61private-tmp
diff --git a/etc/ffmpeg.profile b/etc/ffmpeg.profile
index 67c0ed311..b392087e8 100644
--- a/etc/ffmpeg.profile
+++ b/etc/ffmpeg.profile
@@ -47,7 +47,7 @@ tracelog
47private-bin ffmpeg 47private-bin ffmpeg
48private-cache 48private-cache
49private-dev 49private-dev
50private-etc alternatives,ca-certificates,hosts,pkcs11,pki,resolv.conf,ssl 50private-etc alternatives,ca-certificates,crypto-policies,hosts,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,nsswitch.conf,pkcs11,pki,resolv.conf,ssl
51private-tmp 51private-tmp
52 52
53# memory-deny-write-execute - it breaks old versions of ffmpeg 53# memory-deny-write-execute - it breaks old versions of ffmpeg
diff --git a/etc/firefox-common.profile b/etc/firefox-common.profile
index 7777d07ce..323070289 100644
--- a/etc/firefox-common.profile
+++ b/etc/firefox-common.profile
@@ -52,7 +52,7 @@ shell none
52#tracelog 52#tracelog
53 53
54disable-mnt 54disable-mnt
55private-dev 55?BROWSER_DISABLE_U2F: private-dev
56# private-etc below works fine on most distributions. There are some problems on CentOS. 56# private-etc below works fine on most distributions. There are some problems on CentOS.
57#private-etc alternatives,asound.conf,ca-certificates,crypto-policies,dconf,fonts,group,gtk-2.0,gtk-3.0,hostname,hosts,ld.so.cache,localtime,machine-id,mailcap,mime.types,nsswitch.conf,pango,passwd,pki,pulse,resolv.conf,selinux,ssl,X11,xdg 57#private-etc alternatives,asound.conf,ca-certificates,crypto-policies,dconf,fonts,group,gtk-2.0,gtk-3.0,hostname,hosts,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,localtime,machine-id,mailcap,mime.types,nsswitch.conf,pango,passwd,pki,pulse,resolv.conf,selinux,ssl,X11,xdg
58private-tmp 58private-tmp
diff --git a/etc/i2prouter.profile b/etc/i2prouter.profile
index e46fb3317..d9e7f1c8f 100644
--- a/etc/i2prouter.profile
+++ b/etc/i2prouter.profile
@@ -6,19 +6,19 @@ include i2prouter.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9# Notice: default browser will not be able to automatically open, due to sandbox. 9# Notice: default browser will most likely not be able to automatically open, due to sandbox.
10# Auto-opening default browser can be disabled in the I2P router console. 10# Auto-opening default browser can be disabled in the I2P router console.
11# This profile will not currently work with any Arch User Repository i2p packages, 11# This profile will not currently work with any Arch User Repository I2P packages,
12# use the distro-independent official java installer instead 12# use the distro-independent official I2P java installer instead
13 13
14# Only needed if i2prouter binary is in home directory, java installer does this 14# Only needed if i2prouter binary is in home directory, official I2P java installer does this
15ignore noexec ${HOME} 15ignore noexec ${HOME}
16 16
17noblacklist ${HOME}/.config/i2p 17noblacklist ${HOME}/.config/i2p
18noblacklist ${HOME}/.i2p 18noblacklist ${HOME}/.i2p
19noblacklist ${HOME}/.local/share/i2p 19noblacklist ${HOME}/.local/share/i2p
20noblacklist ${HOME}/i2p 20noblacklist ${HOME}/i2p
21# Only needed if wrapper is placed in /usr/sbin/, ubuntu official ppa package does this 21# Only needed if wrapper is placed in /usr/sbin/, ubuntu official I2P ppa package does this
22noblacklist /usr/sbin 22noblacklist /usr/sbin
23 23
24# Allow java (blacklisted by disable-devel.inc) 24# Allow java (blacklisted by disable-devel.inc)
@@ -40,13 +40,13 @@ whitelist ${HOME}/.config/i2p
40whitelist ${HOME}/.i2p 40whitelist ${HOME}/.i2p
41whitelist ${HOME}/.local/share/i2p 41whitelist ${HOME}/.local/share/i2p
42whitelist ${HOME}/i2p 42whitelist ${HOME}/i2p
43# Only needed if wrapper is placed in /usr/sbin/, ubuntu official ppa package does this 43# Only needed if wrapper is placed in /usr/sbin/, ubuntu official I2P ppa package does this
44whitelist /usr/sbin/wrapper* 44whitelist /usr/sbin/wrapper*
45 45
46include whitelist-common.inc 46include whitelist-common.inc
47 47
48# May break I2P if wrapper is placed in the home directory 48# May break I2P if wrapper is placed in the home directory; official I2P java installer does this
49# If using ubuntu official ppa, this should be fine to uncomment, as it puts wrapper in /usr/sbin/ 49# If using ubuntu official I2P ppa, this should be fine to uncomment, as it puts wrapper in /usr/sbin/
50#apparmor 50#apparmor
51caps.drop all 51caps.drop all
52ipc-namespace 52ipc-namespace
@@ -67,5 +67,5 @@ shell none
67disable-mnt 67disable-mnt
68private-cache 68private-cache
69private-dev 69private-dev
70private-etc alternatives,ca-certificates,crypto-policies,i2p,java-8-openjdk,pki,ssl 70private-etc alternatives,ca-certificates,crypto-policies,dconf,group,hostname,hosts,i2p,java-8-openjdk,java-9-openjdk,java-10-openjdk,java-11-openjdk,java-12-openjdk,java-13-openjdk,java-openjdk,ld.so.cache,localtime,machine-id,nsswitch.conf,passwd,pki,resolv.conf,ssl
71private-tmp 71private-tmp
diff --git a/etc/keepass.profile b/etc/keepass.profile
index 57a24d821..9852f8a79 100644
--- a/etc/keepass.profile
+++ b/etc/keepass.profile
@@ -34,7 +34,7 @@ nosound
34notv 34notv
35nou2f 35nou2f
36novideo 36novideo
37protocol unix,inet,inet6 37protocol unix,inet,inet6,netlink
38seccomp 38seccomp
39shell none 39shell none
40 40
diff --git a/etc/standardnotes-desktop.profile b/etc/standardnotes-desktop.profile
index aa6902854..a402aca5a 100644
--- a/etc/standardnotes-desktop.profile
+++ b/etc/standardnotes-desktop.profile
@@ -39,5 +39,5 @@ seccomp !chroot
39disable-mnt 39disable-mnt
40private-dev 40private-dev
41private-tmp 41private-tmp
42private-etc alternatives,ca-certificates,crypto-policies,fonts,host.conf,hostname,hosts,pki,resolv.conf,ssl,xdg 42private-etc alternatives,ca-certificates,crypto-policies,fonts,host.conf,hostname,hosts,ld.so.cache,pki,resolv.conf,ssl,xdg
43 43
diff --git a/etc/start-tor-browser.profile b/etc/start-tor-browser.profile
index a8b5d109e..f9daf8f09 100644
--- a/etc/start-tor-browser.profile
+++ b/etc/start-tor-browser.profile
@@ -36,5 +36,5 @@ shell none
36disable-mnt 36disable-mnt
37private-bin bash,cat,cp,cut,dirname,env,getconf,gpg,grep,gxmessage,id,kdialog,ln,mkdir,pwd,readlink,realpath,rm,sed,sh,tail,test,update-desktop-database,xmessage,zenity 37private-bin bash,cat,cp,cut,dirname,env,getconf,gpg,grep,gxmessage,id,kdialog,ln,mkdir,pwd,readlink,realpath,rm,sed,sh,tail,test,update-desktop-database,xmessage,zenity
38private-dev 38private-dev
39private-etc alsa,alternatives,asound.conf,ca-certificates,crypto-policies,fonts,hostname,hosts,ld.so.cache,machine-id,pki,pulse,resolv.conf,ssl 39private-etc alsa,alternatives,asound.conf,ca-certificates,crypto-policies,fonts,hostname,hosts,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,machine-id,pki,pulse,resolv.conf,ssl
40private-tmp 40private-tmp
diff --git a/etc/torbrowser-launcher.profile b/etc/torbrowser-launcher.profile
index 1183cd2f7..b40a18fa3 100644
--- a/etc/torbrowser-launcher.profile
+++ b/etc/torbrowser-launcher.profile
@@ -50,5 +50,5 @@ shell none
50disable-mnt 50disable-mnt
51private-bin bash,cat,cp,cut,dirname,env,expr,file,gpg,grep,gxmessage,kdialog,ln,mkdir,mv,python*,rm,sed,sh,tail,tar,tclsh,test,tor-browser,tor-browser-en,torbrowser-launcher,update-desktop-database,xmessage,xz,zenity 51private-bin bash,cat,cp,cut,dirname,env,expr,file,gpg,grep,gxmessage,kdialog,ln,mkdir,mv,python*,rm,sed,sh,tail,tar,tclsh,test,tor-browser,tor-browser-en,torbrowser-launcher,update-desktop-database,xmessage,xz,zenity
52private-dev 52private-dev
53private-etc alsa,alternatives,asound.conf,ca-certificates,crypto-policies,fonts,ld.so.cache,machine-id,pki,pulse,resolv.conf,ssl 53private-etc alsa,alternatives,asound.conf,ca-certificates,crypto-policies,fonts,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,machine-id,pki,pulse,resolv.conf,ssl
54private-tmp 54private-tmp
diff --git a/etc/udiskie.profile b/etc/udiskie.profile
index f6e85d60e..265f6429d 100644
--- a/etc/udiskie.profile
+++ b/etc/udiskie.profile
@@ -31,7 +31,7 @@ notv
31nou2f 31nou2f
32novideo 32novideo
33protocol unix 33protocol unix
34seccomp 34seccomp !request_key
35shell none 35shell none
36tracelog 36tracelog
37 37
diff --git a/etc/wire-desktop.profile b/etc/wire-desktop.profile
index 490255fa6..a56ecef1b 100644
--- a/etc/wire-desktop.profile
+++ b/etc/wire-desktop.profile
@@ -18,16 +18,12 @@ whitelist ${HOME}/.config/Wire
18whitelist ${DOWNLOADS} 18whitelist ${DOWNLOADS}
19include whitelist-common.inc 19include whitelist-common.inc
20 20
21caps.drop all 21caps.keep sys_admin,sys_chroot
22netfilter 22netfilter
23nodvd 23nodvd
24nogroups 24nogroups
25nonewprivs
26noroot
27notv 25notv
28nou2f 26nou2f
29protocol unix,inet,inet6,netlink
30seccomp
31shell none 27shell none
32 28
33# Note: The current version of Wire is located in /opt/wire-desktop/wire-desktop, and therefore 29# Note: The current version of Wire is located in /opt/wire-desktop/wire-desktop, and therefore
diff --git a/src/firecfg/firecfg.config b/src/firecfg/firecfg.config
index 97148c6b6..e3d7a35a1 100644
--- a/src/firecfg/firecfg.config
+++ b/src/firecfg/firecfg.config
@@ -295,7 +295,6 @@ hedgewars
295hexchat 295hexchat
296highlight 296highlight
297hugin 297hugin
298i2prouter
299icecat 298icecat
300icedove 299icedove
301iceweasel 300iceweasel