aboutsummaryrefslogtreecommitdiffstats
path: root/README.md
diff options
context:
space:
mode:
authorLibravatar netblue30 <netblue30@yahoo.com>2016-02-05 07:52:41 -0500
committerLibravatar netblue30 <netblue30@yahoo.com>2016-02-05 07:52:41 -0500
commit8fd8fe3035f6ee353430032d0079420d4bfeaf2f (patch)
tree9521b25f6ec9e31015805b4ee6e3f414e2680650 /README.md
parent0.9.38 testing (diff)
downloadfirejail-8fd8fe3035f6ee353430032d0079420d4bfeaf2f.tar.gz
firejail-8fd8fe3035f6ee353430032d0079420d4bfeaf2f.tar.zst
firejail-8fd8fe3035f6ee353430032d0079420d4bfeaf2f.zip
0.9.38 released0.9.38
Diffstat (limited to 'README.md')
-rw-r--r--README.md93
1 files changed, 1 insertions, 92 deletions
diff --git a/README.md b/README.md
index 812ad4008..3addca694 100644
--- a/README.md
+++ b/README.md
@@ -32,96 +32,5 @@ Documentation: https://firejail.wordpress.com/documentation-2/
32 32
33FAQ: https://firejail.wordpress.com/support/frequently-asked-questions/ 33FAQ: https://firejail.wordpress.com/support/frequently-asked-questions/
34 34
35# Current development version: 0.9.37 35# Current development version: 0.9.39
36
37## Symlink invocation
38
39This is a small thing, but very convenient. Make a symbolic link (ln -s) to /usr/bin/firejail under
40the name of the program you want to run, and put the link in the first $PATH position (for
41example in /usr/local/bin). Example:
42`````
43$ which -a transmission-gtk
44/usr/bin/transmission-gtk
45
46$ sudo ln -s /usr/bin/firejail /usr/local/bin/transmission-gtk
47
48$ which -a transmission-gtk
49/usr/local/bin/transmission-gtk
50/usr/bin/transmission-gtk
51`````
52We have in this moment two entries in $PATH for transmission. The first one is a symlink to firejail.
53The second one is the real program. Starting transmission in this moment, invokes "firejail transmission-gtk"
54`````
55$ transmission-gtk
56Redirecting symlink to /usr/bin/transmission-gtk
57Reading profile /etc/firejail/transmission-gtk.profile
58Reading profile /etc/firejail/disable-mgmt.inc
59Reading profile /etc/firejail/disable-secret.inc
60Reading profile /etc/firejail/disable-common.inc
61Reading profile /etc/firejail/disable-devel.inc
62Parent pid 19343, child pid 19344
63Blacklist violations are logged to syslog
64Child process initialized
65`````
66
67
68## IPv6 support:
69`````
70 --ip6=address
71 Assign IPv6 addresses to the last network interface defined by a
72 --net option.
73
74 Example:
75 $ firejail --net=eth0 --ip6=2001:0db8:0:f101::1/64 firefox
76
77 --netfilter6=filename
78 Enable the IPv6 network filter specified by filename in the new
79 network namespace. The filter file format is the format of
80 ip6tables-save and ip6table-restore commands. New network
81 namespaces are created using --net option. If a new network
82 namespaces is not created, --netfilter6 option does nothing.
83
84`````
85
86## join command enhancements
87
88`````
89 --join-filesystem=name
90 Join the mount namespace of the sandbox identified by name. By
91 default a /bin/bash shell is started after joining the sandbox.
92 If a program is specified, the program is run in the sandbox.
93 This command is available only to root user. Security filters,
94 cgroups and cpus configurations are not applied to the process
95 joining the sandbox.
96
97 --join-filesystem=pid
98 Join the mount namespace of the sandbox identified by process
99 ID. By default a /bin/bash shell is started after joining the
100 sandbox. If a program is specified, the program is run in the
101 sandbox. This command is available only to root user. Security
102 filters, cgroups and cpus configurations are not applied to the
103 process joining the sandbox.
104
105 --join-network=name
106 Join the network namespace of the sandbox identified by name. By
107 default a /bin/bash shell is started after joining the sandbox.
108 If a program is specified, the program is run in the sandbox.
109 This command is available only to root user. Security filters,
110 cgroups and cpus configurations are not applied to the process
111 joining the sandbox.
112
113 --join-network=pid
114 Join the network namespace of the sandbox identified by process
115 ID. By default a /bin/bash shell is started after joining the
116 sandbox. If a program is specified, the program is run in the
117 sandbox. This command is available only to root user. Security
118 filters, cgroups and cpus configurations are not applied to the
119 process joining the sandbox.
120
121`````
122
123
124## New profiles: KMail
125
126
127 36