aboutsummaryrefslogtreecommitdiffstats
path: root/src/man/firejail.txt
diff options
context:
space:
mode:
authorLibravatar Kelvin M. Klann <kmk3.code@protonmail.com>2022-08-02 21:18:01 -0300
committerLibravatar Kelvin M. Klann <kmk3.code@protonmail.com>2022-08-05 16:43:59 -0300
commitba0ac271e6a64915bb6086a5c711800a23916698 (patch)
tree957425341f74f424b5071575a019b69c97aa68f8 /src/man/firejail.txt
parentRELNOTES: add build and ci items (diff)
downloadfirejail-ba0ac271e6a64915bb6086a5c711800a23916698.tar.gz
firejail-ba0ac271e6a64915bb6086a5c711800a23916698.tar.zst
firejail-ba0ac271e6a64915bb6086a5c711800a23916698.zip
docs: mention risk of SUID binaries and also firejail-users(5)
On the introduction of firejail(1), mention the main risk of SUID binaries and that by default, only trusted users should be allowed to run firejail (and how to accomplish that). Note: The added comment line is completely discarded (so there is no extraneous blank line); see groff_man(7) for details. Suggested by @emerajid on #5288. Relates to #4601.
Diffstat (limited to 'src/man/firejail.txt')
-rw-r--r--src/man/firejail.txt11
1 files changed, 11 insertions, 0 deletions
diff --git a/src/man/firejail.txt b/src/man/firejail.txt
index 087d1c85a..531bb6138 100644
--- a/src/man/firejail.txt
+++ b/src/man/firejail.txt
@@ -67,6 +67,17 @@ Firejail allows the user to manage application security using security profiles.
67Each profile defines a set of permissions for a specific application or group 67Each profile defines a set of permissions for a specific application or group
68of applications. The software includes security profiles for a number of more common 68of applications. The software includes security profiles for a number of more common
69Linux programs, such as Mozilla Firefox, Chromium, VLC, Transmission etc. 69Linux programs, such as Mozilla Firefox, Chromium, VLC, Transmission etc.
70.\" TODO: Explain the security/usability tradeoffs from #4601.
71.PP
72Firejail is currently implemented as an SUID binary, which means that if a
73malicious or compromised user account manages to exploit a bug in Firejail,
74that could ultimately lead to a privilege escalation to root.
75To mitigate this, it is recommended to only allow trusted users to run firejail
76(see firejail-users(5) for details on how to achieve that).
77For more details on the security/usability tradeoffs of Firejail, see:
78.UR https://github.com/netblue30/firejail/discussions/4601
79#4601
80.UE
70.PP 81.PP
71Alternative sandbox technologies like snap (https://snapcraft.io/) and flatpak (https://flatpak.org/) 82Alternative sandbox technologies like snap (https://snapcraft.io/) and flatpak (https://flatpak.org/)
72are not supported. Snap and flatpak packages have their own native management tools and will 83are not supported. Snap and flatpak packages have their own native management tools and will