diff options
author | netblue30 <netblue30@yahoo.com> | 2018-09-19 18:37:28 -0400 |
---|---|---|
committer | netblue30 <netblue30@yahoo.com> | 2018-09-19 18:37:28 -0400 |
commit | 2a0f17d94e427037d06051c8ee72c481ac6dad2a (patch) | |
tree | 4dde9bcec2d8a1dee25c7185da2e82c767a745d1 /README.md | |
parent | Misc profile hardening (diff) | |
download | firejail-2a0f17d94e427037d06051c8ee72c481ac6dad2a.tar.gz firejail-2a0f17d94e427037d06051c8ee72c481ac6dad2a.tar.zst firejail-2a0f17d94e427037d06051c8ee72c481ac6dad2a.zip |
--version 0.9.57
Diffstat (limited to 'README.md')
-rw-r--r-- | README.md | 91 |
1 files changed, 1 insertions, 90 deletions
@@ -98,93 +98,4 @@ We also keep a list of profile fixes for previous released versions in [etc-fixe | |||
98 | ````` | 98 | ````` |
99 | 99 | ||
100 | ````` | 100 | ````` |
101 | # Current development version: 0.9.55 | 101 | # Current development version: 0.9.57 |
102 | |||
103 | ## New commands: | ||
104 | ````` | ||
105 | (wireless support for --net) | ||
106 | --net=ethernet_interface|wireless_interface | ||
107 | Enable a new network namespace and connect it to this ethernet | ||
108 | interface using the standard Linux macvlan|ipvaln driver. | ||
109 | Unless specified with option --ip and --defaultgw, an IP | ||
110 | address and a default gateway will be assigned automatically to | ||
111 | the sandbox. The IP address is verified using ARP before | ||
112 | assignment. The address configured as default gateway is the | ||
113 | default gateway of the host. Up to four --net options can be | ||
114 | specified. Support for ipvlan driver was introduced in Linux | ||
115 | kernel 3.19. | ||
116 | |||
117 | Example: | ||
118 | $ firejail --net=eth0 --ip=192.168.1.80 --dns=8.8.8.8 firefox | ||
119 | $ firejail --net=wlan0 firefox | ||
120 | |||
121 | (tunneling support) | ||
122 | --net=tap_interface | ||
123 | Enable a new network namespace and connect it to this ethernet | ||
124 | tap interface using the standard Linux macvlan driver. If the | ||
125 | tap interface is not configured, the sandbox will not try to | ||
126 | configure the interface inside the sandbox. Please use --ip, | ||
127 | --netmask and --defaultgw to specify the configuration. | ||
128 | |||
129 | Example: | ||
130 | $ firejail --net=tap0 --ip=10.10.20.80 --netmask=255.255.255.0 | ||
131 | --defaultgw=10.10.20.1 firefox | ||
132 | |||
133 | --netmask=address | ||
134 | Use this option when you want to assign an IP address in a new | ||
135 | namespace and the parent interface specified by --net is not | ||
136 | configured. An IP address and a default gateway address | ||
137 | also have to be added. By default the new namespace interface | ||
138 | comes without IP address and default gateway configured. Exam‐ | ||
139 | ple: | ||
140 | |||
141 | $ sudo /sbin/brctl addbr br0 | ||
142 | $ sudo /sbin/ifconfig br0 up | ||
143 | $ firejail --ip=10.10.20.67 --netmask=255.255.255.0 | ||
144 | --defaultgw=10.10.20.1 | ||
145 | |||
146 | --keep-dev-shm | ||
147 | /dev/shm directory is untouched (even with --private-dev) | ||
148 | |||
149 | Example: | ||
150 | $ firejail --keep-dev-shm --private-dev | ||
151 | |||
152 | --nou2f | ||
153 | Disable U2F devices. | ||
154 | |||
155 | Example: | ||
156 | $ firejail --nou2f | ||
157 | |||
158 | --private-cache | ||
159 | Mount an empty temporary filesystem on top of the .cache | ||
160 | directory in user home. All modifications are discarded | ||
161 | when the sandbox is closed. | ||
162 | |||
163 | Example: | ||
164 | $ firejail --private-cache | ||
165 | |||
166 | --tunnel[=devname] | ||
167 | Connect the sandbox to a network overlay/VPN tunnel created by | ||
168 | firetunnel utility. This options tries first the client side of | ||
169 | the tunnel. If this fails, it tries the server side. If multi‐ | ||
170 | ple tunnels are active, please specify the tunnel device using | ||
171 | --tunnel=devname. | ||
172 | |||
173 | The available tunnel devices are listed in /etc/firetunnel | ||
174 | directory, one file for each device. The files are regular | ||
175 | firejail profile files containing the network configuration, | ||
176 | and are created and managed by firetunnel utility. By default | ||
177 | ftc is the client-side device and fts is the server-side | ||
178 | device. For more information please see man 1 firetunnel. | ||
179 | |||
180 | Example: | ||
181 | $ firejail --tunnel firefox | ||
182 | |||
183 | ````` | ||
184 | |||
185 | ## New profiles | ||
186 | Microsoft Office Online, riot-desktop, gnome-mpv, snox, gradio, standardnotes-desktop, | ||
187 | shellcheck, patch, flameshot, rview, rvim, vimcat, vimdiff, vimpager, vimtutor, | ||
188 | xxd, Beaker, electrum, clamtk, pybitmessage, dig, whois, jdownloader, | ||
189 | Fluxbox, Blackbox, Awesome, i3, start-tor-browser.desktop | ||
190 | |||