aboutsummaryrefslogtreecommitdiffstats
path: root/etc
diff options
context:
space:
mode:
authorLibravatar netblue30 <netblue30@yahoo.com>2016-08-02 10:03:28 -0400
committerLibravatar netblue30 <netblue30@yahoo.com>2016-08-02 10:03:28 -0400
commit355c86b0ff225bdc48b27fb4dfcb6232e4ec7b29 (patch)
tree4bc45dad2214b25b279a0d2475c5f7b38269e3d3 /etc
parentMerge pull request #679 from manevich/xephyr (diff)
downloadfirejail-355c86b0ff225bdc48b27fb4dfcb6232e4ec7b29.tar.gz
firejail-355c86b0ff225bdc48b27fb4dfcb6232e4ec7b29.tar.zst
firejail-355c86b0ff225bdc48b27fb4dfcb6232e4ec7b29.zip
apparmor
Diffstat (limited to 'etc')
-rw-r--r--etc/firejail-default129
1 files changed, 129 insertions, 0 deletions
diff --git a/etc/firejail-default b/etc/firejail-default
new file mode 100644
index 000000000..609ab6c19
--- /dev/null
+++ b/etc/firejail-default
@@ -0,0 +1,129 @@
1#include <tunables/global>
2
3profile firejail-default {
4
5#####
6# D-Bus is a huge security hole, we disable it here. Uncomment this line if you
7# need D-Bus functionality.
8#
9#dbus,
10
11#####
12# Mask /proc and /sys information leakage. The configuration here is barely
13# enough to run "top" or "ps aux".
14#
15/ r,
16/[^proc,^sys]** mrwlk,
17
18/proc/ r,
19/proc/meminfo r,
20/proc/cpuinfo r,
21/proc/filesystems r,
22/proc/uptime r,
23/proc/loadavg r,
24/proc/stat r,
25/proc/@{pid}/ r,
26/proc/@{pid}/fd/ r,
27/proc/@{pid}/task/ r,
28/proc/@{pid}/cmdline r,
29/proc/@{pid}/comm r,
30/proc/@{pid}/stat r,
31/proc/@{pid}/statm r,
32/proc/@{pid}/status r,
33/proc/sys/kernel/pid_max r,
34/proc/sys/kernel/shmmax r,
35/sys/ r,
36/sys/bus/ r,
37/sys/bus/** r,
38/sys/class/ r,
39/sys/class/** r,
40/sys/devices/ r,
41/sys/devices/** r,
42
43/proc/@{pid}/maps r,
44/proc/@{pid}/mounts r,
45/proc/@{pid}/mountinfo r,
46/proc/@{pid}/oom_score_adj r,
47
48/{,var/}run/firejail/mnt/fslogger r,
49/{,var/}run/user/**/dconf/ r,
50/{,var/}run/user/**/dconf/user r,
51
52#####
53# Allow running programs only from well-known system directories. If you need
54# to run programs from your home directory, uncomment /home line.
55#
56/lib/** ix,
57/lib64/** ix,
58/bin/** ix,
59/sbin/** ix,
60/usr/bin/** ix,
61/usr/sbin/** ix,
62/usr/local/** ix,
63/usr/lib/** ix,
64/usr/games/** ix,
65/opt/** ix,
66#/home/** ix,
67
68#####
69# Allow all networking functionality, and control it from Firejail.
70#
71network inet,
72network inet6,
73network unix,
74network netlink,
75network raw,
76
77#####
78# There is no equivalent in Firejail for filtering signals.
79#
80signal,
81
82#####
83# Disable all capabilities. If you run your sandbox as root, you might need to
84# enable/uncomment some of them.
85#
86capability chown,
87capability dac_override,
88capability dac_read_search,
89capability fowner,
90capability fsetid,
91capability kill,
92capability setgid,
93capability setuid,
94capability setpcap,
95capability linux_immutable,
96capability net_bind_service,
97capability net_broadcast,
98capability net_admin,
99capability net_raw,
100capability ipc_lock,
101capability ipc_owner,
102capability sys_module,
103capability sys_rawio,
104capability sys_chroot,
105capability sys_ptrace,
106capability sys_pacct,
107capability sys_admin,
108capability sys_boot,
109capability sys_nice,
110capability sys_resource,
111capability sys_time,
112capability sys_tty_config,
113capability mknod,
114capability lease,
115capability audit_write,
116capability audit_control,
117capability setfcap,
118capability mac_override,
119capability mac_admin,
120
121#####
122# No mount/umount functionality when running as regular user.
123#
124mount,
125remount,
126umount,
127pivot_root,
128
129}