aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorLibravatar netblue30 <netblue30@yahoo.com>2016-07-10 10:08:53 -0400
committerLibravatar netblue30 <netblue30@yahoo.com>2016-07-10 10:08:53 -0400
commita344c555ff282c23a8274d10ad0f75eb4fae6836 (patch)
treeb86fde69dc1cb71a476745c974196735d694952a
parentnoexec inside /var directory (diff)
downloadfirejail-a344c555ff282c23a8274d10ad0f75eb4fae6836.tar.gz
firejail-a344c555ff282c23a8274d10ad0f75eb4fae6836.tar.zst
firejail-a344c555ff282c23a8274d10ad0f75eb4fae6836.zip
--noexec
-rw-r--r--README.md23
-rw-r--r--RELNOTES1
-rw-r--r--src/firejail/usage.c4
-rw-r--r--src/man/firejail-profile.txt3
-rw-r--r--src/man/firejail.txt15
5 files changed, 43 insertions, 3 deletions
diff --git a/README.md b/README.md
index c16a32e62..a60c8dd7f 100644
--- a/README.md
+++ b/README.md
@@ -90,9 +90,28 @@ AUDIT
90 Limitations: audit feature is not implemented for --x11 commands. 90 Limitations: audit feature is not implemented for --x11 commands.
91````` 91`````
92 92
93## --private-dev enhancements - work in progress! 93## --noexec
94`````
95 --noexec=dirname_or_filename
96 Remount directory or file noexec, nodev and nosuid.
97
98 Example:
99 $ firejail --noexec=/tmp
100
101 /etc and /var are noexec by default. If there are more than one
102 mount operation on the path of the file or directory, noexec
103 should be applied to the last one. Always check if the change
104 took effect inside the sandbox.
105`````
94 106
95The following devices are added to --private-dev list. 107## --rmenv
108`````
109 --rmenv=name
110 Remove environment variable in the new sandbox.
111
112 Example:
113 $ firejail --rmenv=DBUS_SESSION_BUS_ADDRESS
114`````
96 115
97## Converting profiles to private-bin - work in progress! 116## Converting profiles to private-bin - work in progress!
98 117
diff --git a/RELNOTES b/RELNOTES
index 20e7df7f1..ef3706eb1 100644
--- a/RELNOTES
+++ b/RELNOTES
@@ -4,6 +4,7 @@ firejail (0.9.41) baseline; urgency=low
4 * AppImage support (--appimage) 4 * AppImage support (--appimage)
5 * Sandbox auditing support (--audit) 5 * Sandbox auditing support (--audit)
6 * remove environment variable (--rmenv) 6 * remove environment variable (--rmenv)
7 * noexec support (--noexec)
7 * include /dev/snd in --private-dev 8 * include /dev/snd in --private-dev
8 * added mkfile profile command 9 * added mkfile profile command
9 * seccomp filter updated 10 * seccomp filter updated
diff --git a/src/firejail/usage.c b/src/firejail/usage.c
index 6b7a666db..f7a93174f 100644
--- a/src/firejail/usage.c
+++ b/src/firejail/usage.c
@@ -147,9 +147,11 @@ void usage(void) {
147 printf(" --nice=value - set nice value\n\n"); 147 printf(" --nice=value - set nice value\n\n");
148 printf(" --noblacklist=dirname_or_filename - disable blacklist for directory or\n"); 148 printf(" --noblacklist=dirname_or_filename - disable blacklist for directory or\n");
149 printf("\tfile.\n\n"); 149 printf("\tfile.\n\n");
150 printf(" --noexec=dirname_of_filenam - remount the file or directory noexec\n");
151 printf("\tnosuid and nodev\n\n");
150 printf(" --nogroups - disable supplementary groups. Without this option,\n"); 152 printf(" --nogroups - disable supplementary groups. Without this option,\n");
151 printf("\tsupplementary groups are enabled for the user starting the sandbox.\n"); 153 printf("\tsupplementary groups are enabled for the user starting the sandbox.\n");
152 printf("\t For root, groups are always disabled.\n\n"); 154 printf("\tFor root, groups are always disabled.\n\n");
153 155
154 printf(" --noprofile - do not use a profile. Profile priority is use the one\n"); 156 printf(" --noprofile - do not use a profile. Profile priority is use the one\n");
155 printf("\tspecified on the command line, next try to find one that\n"); 157 printf("\tspecified on the command line, next try to find one that\n");
diff --git a/src/man/firejail-profile.txt b/src/man/firejail-profile.txt
index 98fa17908..504842a9e 100644
--- a/src/man/firejail-profile.txt
+++ b/src/man/firejail-profile.txt
@@ -157,6 +157,9 @@ whitelist ~/.cache/mozilla/firefox
157Similar to mkdir, this command creates a file in user home before the sandbox is started. 157Similar to mkdir, this command creates a file in user home before the sandbox is started.
158The file is created if it doesn't already exist. 158The file is created if it doesn't already exist.
159.TP 159.TP
160\fBnoexec file_or_directory
161Remount the file or the directory noexec, nodev and nosuid.
162.TP
160\fBprivate 163\fBprivate
161Mount new /root and /home/user directories in temporary 164Mount new /root and /home/user directories in temporary
162filesystems. All modifications are discarded when the sandbox is 165filesystems. All modifications are discarded when the sandbox is
diff --git a/src/man/firejail.txt b/src/man/firejail.txt
index 7c9cd98de..cd9ea6a8a 100644
--- a/src/man/firejail.txt
+++ b/src/man/firejail.txt
@@ -851,6 +851,21 @@ $ nc dict.org 2628
851220 pan.alephnull.com dictd 1.12.1/rf on Linux 3.14-1-amd64 851220 pan.alephnull.com dictd 1.12.1/rf on Linux 3.14-1-amd64
852.br 852.br
853.TP 853.TP
854\fB\-\-noexec=dirname_or_filename
855Remount directory or file noexec, nodev and nosuid.
856.br
857
858.br
859Example:
860.br
861$ firejail \-\-noexec=/tmp
862.br
863
864.br
865/etc and /var are noexec by default. If there are more than one mount operation
866on the path of the file or directory, noexec should be applied to the last one. Always check if the change took effect inside the sandbox.
867
868.TP
854\fB\-\-nogroups 869\fB\-\-nogroups
855Disable supplementary groups. Without this option, supplementary groups are enabled for the user starting the 870Disable supplementary groups. Without this option, supplementary groups are enabled for the user starting the
856sandbox. For root user supplementary groups are always disabled. 871sandbox. For root user supplementary groups are always disabled.