aboutsummaryrefslogtreecommitdiffstats
path: root/etc
diff options
context:
space:
mode:
authorLibravatar Tad <tad@spotco.us>2017-08-07 14:24:51 -0400
committerLibravatar Tad <tad@spotco.us>2017-08-07 14:29:40 -0400
commit39dc3c893b5d895ed9db9071dd47b3de7b28f2fd (patch)
treeb76dbe39efe41bded67e3fe95d030b277d4a0236 /etc
parentFix comments in 88 profiles (diff)
downloadfirejail-39dc3c893b5d895ed9db9071dd47b3de7b28f2fd.tar.gz
firejail-39dc3c893b5d895ed9db9071dd47b3de7b28f2fd.tar.zst
firejail-39dc3c893b5d895ed9db9071dd47b3de7b28f2fd.zip
Unify last 8 profiles
Diffstat (limited to 'etc')
-rw-r--r--etc/Xephyr.profile32
-rw-r--r--etc/Xvfb.profile30
-rw-r--r--etc/baloo_file.profile27
-rw-r--r--etc/brave.profile51
-rw-r--r--etc/default.profile37
-rw-r--r--etc/openbox.profile14
-rw-r--r--etc/server.profile30
-rw-r--r--etc/snap.profile17
-rw-r--r--etc/xpra.profile37
9 files changed, 141 insertions, 134 deletions
diff --git a/etc/Xephyr.profile b/etc/Xephyr.profile
index 22c0202ee..db3b3858c 100644
--- a/etc/Xephyr.profile
+++ b/etc/Xephyr.profile
@@ -1,9 +1,9 @@
1# Persistent global definitions go here 1# Firejail profile for Xephyr
2include /etc/firejail/globals.local 2# This file is overwritten after every install/update
3 3# Persistent local customizations
4# This file is overwritten during software install.
5# Persistent customizations should go in a .local file.
6include /etc/firejail/Xephyr.local 4include /etc/firejail/Xephyr.local
5# Persistent global definitions
6include /etc/firejail/globals.local
7 7
8# 8#
9# This profile will sandbox Xephyr server itself when used with firejail --x11=xephyr. 9# This profile will sandbox Xephyr server itself when used with firejail --x11=xephyr.
@@ -15,26 +15,26 @@ include /etc/firejail/Xephyr.local
15# 15#
16 16
17 17
18# using a private home directory 18blacklist /media
19private
20 19
20whitelist /var/lib/xkb
21include /etc/firejail/whitelist-common.inc
21 22
22caps.drop all 23caps.drop all
23# Xephyr needs to be allowed access to the abstract Unix socket namespace. 24# Xephyr needs to be allowed access to the abstract Unix socket namespace.
24nogroups 25nogroups
25nonewprivs 26nonewprivs
26# In noroot mode, Xephyr cannot create a socket in the real /tmp/.X11-unix. 27# In noroot mode, Xephyr cannot create a socket in the real /tmp/.X11-unix.
27#noroot 28# noroot
28nosound 29nosound
29shell none
30seccomp
31protocol unix 30protocol unix
31seccomp
32shell none
32 33
34# using a private home directory
35private
36# private-bin Xephyr,sh,xkbcomp
37# private-bin Xephyr,sh,xkbcomp,strace,bash,cat,ls
33private-dev 38private-dev
39# private-etc ld.so.conf,ld.so.cache,resolv.conf,host.conf,nsswitch.conf,gai.conf,hosts,hostname
34private-tmp 40private-tmp
35#private-bin Xephyr,sh,xkbcomp,strace,bash,cat,ls
36#private-bin Xephyr,sh,xkbcomp
37#private-etc ld.so.conf,ld.so.cache,resolv.conf,host.conf,nsswitch.conf,gai.conf,hosts,hostname
38
39blacklist /media
40whitelist /var/lib/xkb
diff --git a/etc/Xvfb.profile b/etc/Xvfb.profile
index 8eba82db1..ce17a9732 100644
--- a/etc/Xvfb.profile
+++ b/etc/Xvfb.profile
@@ -1,10 +1,10 @@
1# Persistent global definitions go here 1# Firejail profile for Xvfb
2# This file is overwritten after every install/update
3# Persistent local customizations
4include /etc/firejail/Xvfb.local
5# Persistent global definitions
2include /etc/firejail/globals.local 6include /etc/firejail/globals.local
3 7
4# This file is overwritten during software install.
5# Persistent customizations should go in a .local file.
6include /etc/firejail/xvfb.local
7
8# 8#
9# This profile will sandbox Xvfb server itself when used with firejail --x11=xvfb. 9# This profile will sandbox Xvfb server itself when used with firejail --x11=xvfb.
10# The target program is sandboxed with its own profile. By default the this functionality 10# The target program is sandboxed with its own profile. By default the this functionality
@@ -16,9 +16,10 @@ include /etc/firejail/xvfb.local
16# some Linux distributions. Also, older versions of Xpra use Xvfb. 16# some Linux distributions. Also, older versions of Xpra use Xvfb.
17# 17#
18 18
19blacklist /media
19 20
20# using a private home directory 21whitelist /var/lib/xkb
21private 22include /etc/firejail/whitelist-common.inc
22 23
23caps.drop all 24caps.drop all
24# Xvfb needs to be allowed access to the abstract Unix socket namespace. 25# Xvfb needs to be allowed access to the abstract Unix socket namespace.
@@ -27,15 +28,14 @@ nonewprivs
27# In noroot mode, Xvfb cannot create a socket in the real /tmp/.X11-unix. 28# In noroot mode, Xvfb cannot create a socket in the real /tmp/.X11-unix.
28#noroot 29#noroot
29nosound 30nosound
30shell none
31seccomp
32protocol unix 31protocol unix
32seccomp
33shell none
33 34
35# using a private home directory
36private
37# private-bin Xvfb,sh,xkbcomp
38# private-bin Xvfb,sh,xkbcomp,strace,bash,cat,ls
34private-dev 39private-dev
35private-tmp
36private-etc ld.so.conf,ld.so.cache,resolv.conf,host.conf,nsswitch.conf,gai.conf,hosts,hostname 40private-etc ld.so.conf,ld.so.cache,resolv.conf,host.conf,nsswitch.conf,gai.conf,hosts,hostname
37#private-bin Xvfb,sh,xkbcomp,strace,bash,cat,ls 41private-tmp
38#private-bin Xvfb,sh,xkbcomp
39
40blacklist /media
41whitelist /var/lib/xkb
diff --git a/etc/baloo_file.profile b/etc/baloo_file.profile
index 2fe6d1927..9c2909b0f 100644
--- a/etc/baloo_file.profile
+++ b/etc/baloo_file.profile
@@ -1,21 +1,21 @@
1# Persistent global definitions go here 1# Firejail profile for baloo_file
2include /etc/firejail/globals.local 2# This file is overwritten after every install/update
3 3# Persistent local customizations
4# This file is overwritten during software install.
5# Persistent customizations should go in a .local file.
6include /etc/firejail/baloo_file.local 4include /etc/firejail/baloo_file.local
5# Persistent global definitions
6include /etc/firejail/globals.local
7 7
8# KDE Baloo file daemon profile 8noblacklist ${HOME}/.config/baloofilerc
9noblacklist ${HOME}/.kde4/share/config/baloofilerc
10noblacklist ${HOME}/.kde4/share/config/baloorc
11noblacklist ${HOME}/.kde/share/config/baloofilerc 9noblacklist ${HOME}/.kde/share/config/baloofilerc
12noblacklist ${HOME}/.kde/share/config/baloorc 10noblacklist ${HOME}/.kde/share/config/baloorc
13noblacklist ${HOME}/.config/baloofilerc 11noblacklist ${HOME}/.kde4/share/config/baloofilerc
12noblacklist ${HOME}/.kde4/share/config/baloorc
14noblacklist ${HOME}/.local/share/baloo 13noblacklist ${HOME}/.local/share/baloo
14
15include /etc/firejail/disable-common.inc 15include /etc/firejail/disable-common.inc
16include /etc/firejail/disable-programs.inc
17include /etc/firejail/disable-devel.inc 16include /etc/firejail/disable-devel.inc
18include /etc/firejail/disable-passwdmgr.inc 17include /etc/firejail/disable-passwdmgr.inc
18include /etc/firejail/disable-programs.inc
19 19
20caps.drop all 20caps.drop all
21nogroups 21nogroups
@@ -26,7 +26,6 @@ novideo
26protocol unix 26protocol unix
27# Baloo makes ioprio_set system calls, which are blacklisted by default. 27# Baloo makes ioprio_set system calls, which are blacklisted by default.
28seccomp.drop mount,umount2,ptrace,kexec_load,kexec_file_load,name_to_handle_at,open_by_handle_at,create_module,init_module,finit_module,delete_module,iopl,ioperm,swapon,swapoff,syslog,process_vm_readv,process_vm_writev,sysfs,_sysctl,adjtimex,clock_adjtime,lookup_dcookie,perf_event_open,fanotify_init,kcmp,add_key,request_key,keyctl,uselib,acct,modify_ldt,pivot_root,io_setup,io_destroy,io_getevents,io_submit,io_cancel,remap_file_pages,mbind,get_mempolicy,set_mempolicy,migrate_pages,move_pages,vmsplice,chroot,tuxcall,reboot,mfsservctl,get_kernel_syms,bpf,clock_settime,personality,process_vm_writev,query_module,settimeofday,stime,umount,userfaultfd,ustat,vm86,vm86old 28seccomp.drop mount,umount2,ptrace,kexec_load,kexec_file_load,name_to_handle_at,open_by_handle_at,create_module,init_module,finit_module,delete_module,iopl,ioperm,swapon,swapoff,syslog,process_vm_readv,process_vm_writev,sysfs,_sysctl,adjtimex,clock_adjtime,lookup_dcookie,perf_event_open,fanotify_init,kcmp,add_key,request_key,keyctl,uselib,acct,modify_ldt,pivot_root,io_setup,io_destroy,io_getevents,io_submit,io_cancel,remap_file_pages,mbind,get_mempolicy,set_mempolicy,migrate_pages,move_pages,vmsplice,chroot,tuxcall,reboot,mfsservctl,get_kernel_syms,bpf,clock_settime,personality,process_vm_writev,query_module,settimeofday,stime,umount,userfaultfd,ustat,vm86,vm86old
29
30x11 xorg 29x11 xorg
31 30
32private-dev 31private-dev
@@ -37,6 +36,6 @@ noexec /tmp
37 36
38# Make home directory read-only and allow writing only to ~/.local/share 37# Make home directory read-only and allow writing only to ~/.local/share
39# Note: Baloo will not be able to update the "first run" key in its configuration files. 38# Note: Baloo will not be able to update the "first run" key in its configuration files.
40#read-only ${HOME} 39# noexec ${HOME}/.local/share
41#read-write ${HOME}/.local/share 40# read-only ${HOME}
42#noexec ${HOME}/.local/share 41# read-write ${HOME}/.local/share
diff --git a/etc/brave.profile b/etc/brave.profile
index e73dd37a2..20dbf6c52 100644
--- a/etc/brave.profile
+++ b/etc/brave.profile
@@ -1,43 +1,36 @@
1# Persistent global definitions go here 1# Firejail profile for brave
2include /etc/firejail/globals.local 2# This file is overwritten after every install/update
3 3# Persistent local customizations
4# This file is overwritten during software install.
5# Persistent customizations should go in a .local file.
6include /etc/firejail/brave.local 4include /etc/firejail/brave.local
5# Persistent global definitions
6include /etc/firejail/globals.local
7 7
8# Profile for Brave browser
9noblacklist ~/.config/brave 8noblacklist ~/.config/brave
10noblacklist ~/.pki
11
12# brave uses gpg for built-in password manager 9# brave uses gpg for built-in password manager
13noblacklist ~/.gnupg 10noblacklist ~/.gnupg
11noblacklist ~/.pki
14 12
15include /etc/firejail/disable-common.inc 13include /etc/firejail/disable-common.inc
16include /etc/firejail/disable-programs.inc
17include /etc/firejail/disable-devel.inc 14include /etc/firejail/disable-devel.inc
18 15include /etc/firejail/disable-programs.inc
19#caps.drop all
20netfilter
21#nonewprivs
22#noroot
23#protocol unix,inet,inet6,netlink
24#seccomp
25
26#disable-mnt
27
28whitelist ${DOWNLOADS}
29 16
30mkdir ~/.config/brave 17mkdir ~/.config/brave
31whitelist ~/.config/brave
32mkdir ~/.pki 18mkdir ~/.pki
33whitelist ~/.pki 19whitelist ${DOWNLOADS}
34
35# lastpass, keepass
36# for keepass we additionally need to whitelist our .kdbx password database
37whitelist ~/.keepass
38whitelist ~/.config/keepass
39whitelist ~/.config/KeePass 20whitelist ~/.config/KeePass
40whitelist ~/.lastpass 21whitelist ~/.config/brave
22whitelist ~/.config/keepass
41whitelist ~/.config/lastpass 23whitelist ~/.config/lastpass
42 24whitelist ~/.keepass
25whitelist ~/.lastpass
26whitelist ~/.pki
43include /etc/firejail/whitelist-common.inc 27include /etc/firejail/whitelist-common.inc
28
29# caps.drop all
30netfilter
31# nonewprivs
32# noroot
33# protocol unix,inet,inet6,netlink
34# seccomp
35
36# disable-mnt
diff --git a/etc/default.profile b/etc/default.profile
index 44a9e548b..693f89ad3 100644
--- a/etc/default.profile
+++ b/etc/default.profile
@@ -1,31 +1,38 @@
1# Persistent global definitions go here 1# Firejail profile for default
2# This file is overwritten after every install/update
3# Persistent local customizations
4include /etc/firejail/default.local
5# Persistent global definitions
2include /etc/firejail/globals.local 6include /etc/firejail/globals.local
3 7
4# This file is overwritten during software install. 8# generic gui profile
5# Persistent customizations should go in a .local file. 9# depending on your usage, you can enable some of the commands below:
6include /etc/firejail/default.local
7 10
8################################
9# Generic GUI application profile
10################################
11include /etc/firejail/disable-common.inc 11include /etc/firejail/disable-common.inc
12include /etc/firejail/disable-programs.inc 12# include /etc/firejail/disable-devel.inc
13include /etc/firejail/disable-passwdmgr.inc 13include /etc/firejail/disable-passwdmgr.inc
14include /etc/firejail/disable-programs.inc
14 15
15caps.drop all 16caps.drop all
17# ipc-namespace
16netfilter 18netfilter
19# nogroups
17nonewprivs 20nonewprivs
18noroot 21noroot
22# nosound
23# novideo
19protocol unix,inet,inet6 24protocol unix,inet,inet6
20seccomp 25seccomp
21
22#
23# depending on your usage, you can enable some of the commands below:
24#
25# nogroups
26# shell none 26# shell none
27
28# disable-mnt
29# private
27# private-bin program 30# private-bin program
28# private-etc none
29# private-dev 31# private-dev
32# private-etc none
33# private-lib
30# private-tmp 34# private-tmp
31# nosound 35
36# memory-deny-write-execute
37# noexec ${HOME}
38# noexec /tmp
diff --git a/etc/openbox.profile b/etc/openbox.profile
index 4104e1e08..99c579c37 100644
--- a/etc/openbox.profile
+++ b/etc/openbox.profile
@@ -1,14 +1,12 @@
1# Persistent global definitions go here 1# Firejail profile for openbox
2# This file is overwritten after every install/update
3# Persistent local customizations
4include /etc/firejail/openbox.local
5# Persistent global definitions
2include /etc/firejail/globals.local 6include /etc/firejail/globals.local
3 7
4# This file is overwritten during software install. 8# all applications started in OpenBox will run in this profile
5# Persistent customizations should go in a .local file.
6include /etc/firejail/openbox.local
7 9
8#######################################
9# OpenBox window manager profile
10# - all applications started in OpenBox will run in this profile
11#######################################
12include /etc/firejail/disable-common.inc 10include /etc/firejail/disable-common.inc
13 11
14caps.drop all 12caps.drop all
diff --git a/etc/server.profile b/etc/server.profile
index 2d79fa1c8..b0dd13f80 100644
--- a/etc/server.profile
+++ b/etc/server.profile
@@ -1,25 +1,37 @@
1# Persistent global definitions go here 1# Firejail profile for server
2include /etc/firejail/globals.local 2# This file is overwritten after every install/update
3 3# Persistent local customizations
4# This file is overwritten during software install.
5# Persistent customizations should go in a .local file.
6include /etc/firejail/server.local 4include /etc/firejail/server.local
5# Persistent global definitions
6include /etc/firejail/globals.local
7 7
8# generic server profile 8# generic server profile
9# it allows /sbin and /usr/sbin directories - this is where servers are installed 9# it allows /sbin and /usr/sbin directories - this is where servers are installed
10# depending on your usage, you can enable some of the commands below:
11
12blacklist /tmp/.X11-unix
13
10noblacklist /sbin 14noblacklist /sbin
11noblacklist /usr/sbin 15noblacklist /usr/sbin
16
12include /etc/firejail/disable-common.inc 17include /etc/firejail/disable-common.inc
13include /etc/firejail/disable-programs.inc 18# include /etc/firejail/disable-devel.inc
14include /etc/firejail/disable-passwdmgr.inc 19include /etc/firejail/disable-passwdmgr.inc
20include /etc/firejail/disable-programs.inc
15 21
16blacklist /tmp/.X11-unix 22caps
17
18no3d 23no3d
19nosound 24nosound
20seccomp 25seccomp
21caps
22 26
27# disable-mnt
23private 28private
29# private-bin program
24private-dev 30private-dev
31# private-etc none
32# private-lib
25private-tmp 33private-tmp
34
35# memory-deny-write-execute
36# noexec ${HOME}
37# noexec /tmp
diff --git a/etc/snap.profile b/etc/snap.profile
index 8493fcbd3..38aef7c23 100644
--- a/etc/snap.profile
+++ b/etc/snap.profile
@@ -1,17 +1,16 @@
1# Persistent global definitions go here 1# Firejail profile for snap
2include /etc/firejail/globals.local 2# This file is overwritten after every install/update
3 3# Persistent local customizations
4# This file is overwritten during software install.
5# Persistent customizations should go in a .local file.
6include /etc/firejail/snap.local 4include /etc/firejail/snap.local
5# Persistent global definitions
6include /etc/firejail/globals.local
7 7
8################################
9# Generic Ubuntu snap application profile 8# Generic Ubuntu snap application profile
10################################ 9
11include /etc/firejail/disable-common.inc 10include /etc/firejail/disable-common.inc
12include /etc/firejail/disable-programs.inc
13include /etc/firejail/disable-passwdmgr.inc 11include /etc/firejail/disable-passwdmgr.inc
12include /etc/firejail/disable-programs.inc
14 13
15whitelist ~/snap
16whitelist ${DOWNLOADS} 14whitelist ${DOWNLOADS}
15whitelist ~/snap
17include /etc/firejail/whitelist-common.inc 16include /etc/firejail/whitelist-common.inc
diff --git a/etc/xpra.profile b/etc/xpra.profile
index c8bb3ef52..ed393d70b 100644
--- a/etc/xpra.profile
+++ b/etc/xpra.profile
@@ -1,10 +1,9 @@
1# Persistent global definitions go here 1# Firejail profile for xpra
2include /etc/firejail/globals.local 2# This file is overwritten after every install/update
3 3# Persistent local customizations
4# This file is overwritten during software install.
5# Persistent customizations should go in a .local file.
6include /etc/firejail/xpra.local 4include /etc/firejail/xpra.local
7 5# Persistent global definitions
6include /etc/firejail/globals.local
8 7
9# 8#
10# This profile will sandbox Xpra server itself when used with firejail --x11=xpra. 9# This profile will sandbox Xpra server itself when used with firejail --x11=xpra.
@@ -14,12 +13,15 @@ include /etc/firejail/xpra.local
14# 13#
15# or run "sudo firecfg" 14# or run "sudo firecfg"
16 15
17# private home directory doesn't work on some distros, so we go for a regular home 16blacklist /media
18#private 17
19include /etc/firejail/disable-common.inc 18include /etc/firejail/disable-common.inc
20include /etc/firejail/disable-programs.inc
21include /etc/firejail/disable-devel.inc 19include /etc/firejail/disable-devel.inc
22include /etc/firejail/disable-passwdmgr.inc 20include /etc/firejail/disable-passwdmgr.inc
21include /etc/firejail/disable-programs.inc
22
23whitelist /var/lib/xkb
24include /etc/firejail/whitelist-common.inc
23 25
24caps.drop all 26caps.drop all
25# xpra needs to be allowed access to the abstract Unix socket namespace. 27# xpra needs to be allowed access to the abstract Unix socket namespace.
@@ -28,17 +30,14 @@ nonewprivs
28# In noroot mode, xpra cannot create a socket in the real /tmp/.X11-unix. 30# In noroot mode, xpra cannot create a socket in the real /tmp/.X11-unix.
29#noroot 31#noroot
30nosound 32nosound
31shell none
32seccomp
33protocol unix 33protocol unix
34seccomp
35shell none
34 36
35 37# private home directory doesn't work on some distros, so we go for a regular home
38# private
39# older Xpra versions also use Xvfb
40# private-bin xpra,python,Xvfb,Xorg,sh,xkbcomp,xauth,dbus-launch,pactl,ldconfig,which,strace,bash,cat,ls
36private-dev 41private-dev
42# private-etc ld.so.conf,ld.so.cache,resolv.conf,host.conf,nsswitch.conf,gai.conf,hosts,hostname,machine-id,xpra,X11
37private-tmp 43private-tmp
38# older Xpra versions also use Xvfb
39#private-bin xpra,python,Xvfb,Xorg,sh,xkbcomp,xauth,dbus-launch,pactl,ldconfig,which,strace,bash,cat,ls
40#private-etc ld.so.conf,ld.so.cache,resolv.conf,host.conf,nsswitch.conf,gai.conf,hosts,hostname,machine-id,xpra,X11
41
42blacklist /media
43whitelist /var/lib/xkb
44