aboutsummaryrefslogtreecommitdiffstats
path: root/src/man
diff options
context:
space:
mode:
authorLibravatar netblue30 <netblue30@protonmail.com>2022-10-23 07:38:29 -0400
committerLibravatar netblue30 <netblue30@protonmail.com>2022-10-23 07:38:29 -0400
commita0985a135392c0776d45cf8e27ebf15bc7fff198 (patch)
treef796ca075c61e103abfd54c01872655c9610e8dc /src/man
parentMerge branch 'master' of ssh://github.com/netblue30/firejail (diff)
downloadfirejail-a0985a135392c0776d45cf8e27ebf15bc7fff198.tar.gz
firejail-a0985a135392c0776d45cf8e27ebf15bc7fff198.tar.zst
firejail-a0985a135392c0776d45cf8e27ebf15bc7fff198.zip
dnstrace and snitrace
Diffstat (limited to 'src/man')
-rw-r--r--src/man/firejail.txt159
1 files changed, 83 insertions, 76 deletions
diff --git a/src/man/firejail.txt b/src/man/firejail.txt
index c26d21ec9..49fd18a04 100644
--- a/src/man/firejail.txt
+++ b/src/man/firejail.txt
@@ -779,6 +779,46 @@ $ firejail \-\-list
779.br 779.br
780$ firejail \-\-dns.print=3272 780$ firejail \-\-dns.print=3272
781 781
782#ifdef HAVE_NETWORK
783.TP
784\fB\-\-dnstrace[=name|pid]
785Monitor DNS queries. The sandbox can be specified by name or pid. Only networked sandboxes
786created with \-\-net are supported. This option is only available when running the sandbox as root.
787.br
788
789.br
790Without a name/pid, Firejail will monitor the main system network namespace.
791.br
792
793.br
794$ sudo firejail --dnstrace=browser
795.br
79611:31:43 9.9.9.9 linux.com (type 1)
797.br
79811:31:45 9.9.9.9 fonts.googleapis.com (type 1) NXDOMAIN
799.br
80011:31:45 9.9.9.9 js.hs-scripts.com (type 1) NXDOMAIN
801.br
80211:31:45 9.9.9.9 www.linux.com (type 1)
803.br
80411:31:45 9.9.9.9 fonts.googleapis.com (type 1) NXDOMAIN
805.br
80611:31:52 9.9.9.9 js.hs-scripts.com (type 1) NXDOMAIN
807.br
80811:32:05 9.9.9.9 secure.gravatar.com (type 1)
809.br
81011:32:06 9.9.9.9 secure.gravatar.com (type 1)
811.br
81211:32:08 9.9.9.9 taikai.network (type 1)
813.br
81411:32:08 9.9.9.9 cdn.jsdelivr.net (type 1)
815.br
81611:32:08 9.9.9.9 taikai.azureedge.net (type 1)
817.br
81811:32:08 9.9.9.9 www.youtube.com (type 1)
819.br
820#endif
821
782.TP 822.TP
783\fB\-\-env=name=value 823\fB\-\-env=name=value
784Set environment variable in the new sandbox. 824Set environment variable in the new sandbox.
@@ -1578,82 +1618,6 @@ the country the traffic originates from is added to the trace.
1578We also use the static IP map in /usr/lib/firejail/static-ip-map 1618We also use the static IP map in /usr/lib/firejail/static-ip-map
1579to print the domain names for some of the more common websites and cloud platforms. 1619to print the domain names for some of the more common websites and cloud platforms.
1580No external services are contacted for reverse IP lookup. 1620No external services are contacted for reverse IP lookup.
1581.TP
1582\fB\-\-nettrace-dns[=name|pid]
1583Monitor DNS queries. The sandbox can be specified by name or pid. Only networked sandboxes
1584created with \-\-net are supported. This option is only available when running the sandbox as root.
1585.br
1586
1587.br
1588Without a name/pid, Firejail will monitor the main system network namespace.
1589.br
1590
1591.br
1592$ sudo firejail --nettrace-dns=browser
1593.br
159411:31:43 9.9.9.9 linux.com (type 1)
1595.br
159611:31:45 9.9.9.9 fonts.googleapis.com (type 1) NXDOMAIN
1597.br
159811:31:45 9.9.9.9 js.hs-scripts.com (type 1) NXDOMAIN
1599.br
160011:31:45 9.9.9.9 www.linux.com (type 1)
1601.br
160211:31:45 9.9.9.9 fonts.googleapis.com (type 1) NXDOMAIN
1603.br
160411:31:52 9.9.9.9 js.hs-scripts.com (type 1) NXDOMAIN
1605.br
160611:32:05 9.9.9.9 secure.gravatar.com (type 1)
1607.br
160811:32:06 9.9.9.9 secure.gravatar.com (type 1)
1609.br
161011:32:08 9.9.9.9 taikai.network (type 1)
1611.br
161211:32:08 9.9.9.9 cdn.jsdelivr.net (type 1)
1613.br
161411:32:08 9.9.9.9 taikai.azureedge.net (type 1)
1615.br
161611:32:08 9.9.9.9 www.youtube.com (type 1)
1617.br
1618.TP
1619\fB\-\-nettrace-sni[=name|pid]
1620Monitor Server Name Indication (TLS/SNI). The sandbox can be specified by name or pid. Only networked sandboxes
1621created with \-\-net are supported. This option is only available when running the sandbox as root.
1622.br
1623
1624.br
1625Without a name/pid, Firejail will monitor the main system network namespace.
1626.br
1627
1628.br
1629$ sudo firejail --nettrace-sni=browser
1630.br
163107:49:51 23.185.0.3 linux.com
1632.br
163307:49:51 23.185.0.3 www.linux.com
1634.br
163507:50:05 192.0.73.2 secure.gravatar.com
1636.br
163707:52:35 172.67.68.93 www.howtoforge.com
1638.br
163907:52:37 13.225.103.59 sf.ezoiccdn.com
1640.br
164107:52:42 142.250.176.3 www.gstatic.com
1642.br
164307:53:03 173.236.250.32 www.linuxlinks.com
1644.br
164507:53:05 192.0.77.37 c0.wp.com
1646.br
164707:53:08 192.0.78.32 jetpack.wordpress.com
1648.br
164907:53:09 192.0.77.32 s0.wp.com
1650.br
165107:53:09 192.0.77.2 i0.wp.com
1652.br
165307:53:10 192.0.77.2 i0.wp.com
1654.br
165507:53:11 192.0.73.2 1.gravatar.com
1656.br
1657#endif 1621#endif
1658.TP 1622.TP
1659\fB\-\-nice=value 1623\fB\-\-nice=value
@@ -2833,6 +2797,49 @@ $ firejail \-\-list
28333272:netblue::firejail \-\-private firefox 27973272:netblue::firejail \-\-private firefox
2834.br 2798.br
2835$ firejail \-\-shutdown=3272 2799$ firejail \-\-shutdown=3272
2800
2801#ifdef HAVE_NETWORK
2802.TP
2803\fB\-\-snitrace[=name|pid]
2804Monitor Server Name Indication (TLS/SNI). The sandbox can be specified by name or pid. Only networked sandboxes
2805created with \-\-net are supported. This option is only available when running the sandbox as root.
2806.br
2807
2808.br
2809Without a name/pid, Firejail will monitor the main system network namespace.
2810.br
2811
2812.br
2813$ sudo firejail --snitrace=browser
2814.br
281507:49:51 23.185.0.3 linux.com
2816.br
281707:49:51 23.185.0.3 www.linux.com
2818.br
281907:50:05 192.0.73.2 secure.gravatar.com
2820.br
282107:52:35 172.67.68.93 www.howtoforge.com
2822.br
282307:52:37 13.225.103.59 sf.ezoiccdn.com
2824.br
282507:52:42 142.250.176.3 www.gstatic.com
2826.br
282707:53:03 173.236.250.32 www.linuxlinks.com
2828.br
282907:53:05 192.0.77.37 c0.wp.com
2830.br
283107:53:08 192.0.78.32 jetpack.wordpress.com
2832.br
283307:53:09 192.0.77.32 s0.wp.com
2834.br
283507:53:09 192.0.77.2 i0.wp.com
2836.br
283707:53:10 192.0.77.2 i0.wp.com
2838.br
283907:53:11 192.0.73.2 1.gravatar.com
2840.br
2841#endif
2842
2836.TP 2843.TP
2837\fB\-\-tab 2844\fB\-\-tab
2838Enable shell tab completion in sandboxes using private or whitelisted home directories. 2845Enable shell tab completion in sandboxes using private or whitelisted home directories.