aboutsummaryrefslogtreecommitdiffstats
path: root/README.md
diff options
context:
space:
mode:
authorLibravatar netblue30 <netblue30@yahoo.com>2017-09-17 09:53:54 -0400
committerLibravatar netblue30 <netblue30@yahoo.com>2017-09-17 09:53:54 -0400
commitb3f2318759905dd58bbdc93782ccf9d63322bf05 (patch)
tree87e3793007593a4bdbe9123a415d58b6022e6b6b /README.md
parentcleanup (diff)
downloadfirejail-b3f2318759905dd58bbdc93782ccf9d63322bf05.tar.gz
firejail-b3f2318759905dd58bbdc93782ccf9d63322bf05.tar.zst
firejail-b3f2318759905dd58bbdc93782ccf9d63322bf05.zip
profile build tool
Diffstat (limited to 'README.md')
-rw-r--r--README.md58
1 files changed, 58 insertions, 0 deletions
diff --git a/README.md b/README.md
index 255384e2e..19d86f855 100644
--- a/README.md
+++ b/README.md
@@ -98,6 +98,64 @@ Use this issue to request new profiles: [#1139](https://github.com/netblue30/fir
98````` 98`````
99# Current development version: 0.9.51 99# Current development version: 0.9.51
100 100
101## Profile build tool
102`````
103$ firejail --build appname
104`````
105The command builds a whitelisted profile. If /usr/bin/strace is installed on the system, it also
106builds a whitelisted seccomp profile. The program is run in a very relaxed sandbox,
107with only --caps.drop=all and --nonewprivs. Only programs that don't rise privileges are supported
108in order to allow strace to run. Chromium and Chromium-based browsers will not work.
109
110Example:
111`````
112$ firejail --build vlc ~/Videos/test.mp4
113
114[...]
115
116############################################
117# vlc profile
118############################################
119# Persistent global definitions
120# include /etc/firejail/globals.local
121
122### basic blacklisting
123include /etc/firejail/disable-common.inc
124# include /etc/firejail/disable-devel.inc
125include /etc/firejail/disable-passwdmgr.inc
126# include /etc/firejail/disable-programs.inc
127
128### home directory whitelisting
129whitelist ~/Videos
130whitelist ~/.local/share/vlc
131whitelist ~/.config/vlc
132include /etc/firejail/whitelist-common.inc
133
134### filesystem
135private-tmp
136private-dev
137private-etc vdpau_wrapper.cfg,udev,drirc,fonts,xdg,gtk-3.0,machine-id,selinux,
138whitelist /var/lib/menu-xdg
139
140### security filters
141caps.drop all
142nonewprivs
143seccomp
144# seccomp.keep futex,poll,rt_sigtimedwait,ioctl,fdatasync,stat,writev,read,recvmsg,mprotect,write,sendto,clock_nanosleep,open,dup3,mmap,rt_sigprocmask,close,fstat,lstat,lseek,munmap,brk,rt_sigaction,rt_sigreturn,access,madvise,shmget,shmat,shmctl,alarm,getpid,socket,connect,recvfrom,sendmsg,shutdown,getsockname,getpeername,setsockopt,getsockopt,clone,execve,uname,shmdt,fcntl,flock,ftruncate,getdents,rename,mkdir,unlink,readlink,chmod,getrlimit,sysinfo,getuid,getgid,setuid,setgid,geteuid,getegid,getppid,getpgrp,setresuid,getresuid,setresgid,getresgid,statfs,fstatfs,prctl,arch_prctl,sched_getaffinity,set_tid_address,fadvise64,clock_getres,tgkill,set_robust_list,eventfd2,pipe2,getrandom,memfd_create
145# 82 syscalls total
146# Probably you will need to add more syscalls to seccomp.keep. Look for
147# seccomp errors in /var/log/syslog or /var/log/audit/audit.log while
148# running your sandbox.
149
150### network
151protocol unix,netlink,
152net none
153
154### environment
155shell none
156$
157````
158
101## New command line options 159## New command line options
102````` 160`````
103 --writable-run-user 161 --writable-run-user