aboutsummaryrefslogtreecommitdiffstats
path: root/todo
diff options
context:
space:
mode:
authorLibravatar netblue30 <netblue30@yahoo.com>2016-02-21 09:43:33 -0500
committerLibravatar netblue30 <netblue30@yahoo.com>2016-02-21 09:43:33 -0500
commitc89ebb846a9df5288b482941fe8d205f675be39b (patch)
tree14bf7bb798142c869b4a1edf1d0ddf818a37581d /todo
parenttesting (diff)
downloadfirejail-c89ebb846a9df5288b482941fe8d205f675be39b.tar.gz
firejail-c89ebb846a9df5288b482941fe8d205f675be39b.tar.zst
firejail-c89ebb846a9df5288b482941fe8d205f675be39b.zip
small fixes
Diffstat (limited to 'todo')
-rw-r--r--todo100
1 files changed, 5 insertions, 95 deletions
diff --git a/todo b/todo
index 8e8ffc9f2..662ca935b 100644
--- a/todo
+++ b/todo
@@ -1,41 +1,4 @@
11. Getting "Warning: failed to unmount /sys" on --chroot and --overlay 11. Disable /dev/tcp in bash. Compiled time: --enable-net-redirections, --disable-net-redirections
2
32. Startup warnings on Arch Linux:
4
5(all fine here)
6$ ./firejail
7Parent pid 2495, child pid 2496
8Child process initialized
9$
10
11(warnings)
12$ ./firejail --overlay
13Parent pid 2500, child pid 2501
14OverlayFS configured in /home/ablive/.firejail/2500 directory
15Warning: /var/lock not mounted
16Warning: cannot find /var/run/utmp
17Warning: failed to unmount /sys
18Child process initialized
19$
20
21(warnings)
22$ ./firejail --chroot=/media/mylinux
23Parent pid 2503, child pid 2504
24Warning: cannot find /var/run/utmp
25Dropping all Linux capabilities and enforcing default seccomp filter
26Warning: failed to unmount /sys
27Child process initialized
28$
29
305. Add IRC clients: KVIrc (KDE), BitchX (CLI), Smuxi, Konversation (KDE), HexChat, Irssi (CLI), WeeChat (CLI)
31RSS: Liferea, akregator (KDE), newsbeuter (CLI), rawdog,
32
336. Tests not working on Arch:
34profile_syntax.exp (profile syntax)
35fs_chroot.exp (chroot as user)
36private-etc.exp
37
387. Disable /dev/tcp in bash. Compiled time: --enable-net-redirections, --disable-net-redirections
39ksh and zsh seem to have it. 2ksh and zsh seem to have it.
40 3
41Tests: 4Tests:
@@ -50,74 +13,21 @@ cat <&3
50c) A list of attacks 13c) A list of attacks
51http://www.lanmaster53.com/2011/05/7-linux-shells-using-built-in-tools/ 14http://www.lanmaster53.com/2011/05/7-linux-shells-using-built-in-tools/
52 15
538. SELinux 162. SELinux integration
54 17
55Firefox selinux disabled (RedHat): http://danwalsh.livejournal.com/72697.html 18Firefox selinux disabled (RedHat): http://danwalsh.livejournal.com/72697.html
56Firefox selinux enabled (Gentoo hardened): http://blog.siphos.be/2015/08/why-we-do-confine-firefox/ 19Firefox selinux enabled (Gentoo hardened): http://blog.siphos.be/2015/08/why-we-do-confine-firefox/
57"desktops are notoriously difficult to use a mandatory access control system on" 20"desktops are notoriously difficult to use a mandatory access control system on"
58 21
599. blacklist .muttrc, contains passwords in clear text 223. abstract unix socket bridge, example for ibus:
60
6110. abstract unix socket bridge, example for ibus:
62 23
63before the sandbox is started 24before the sandbox is started
64socat UNIX-LISTEN:/tmp/mysoc,fork ABSTRACT-CONNECT:/tmp/dbus-awBoQTCc & 25socat UNIX-LISTEN:/tmp/mysoc,fork ABSTRACT-CONNECT:/tmp/dbus-awBoQTCc &
65
66in sandbox 26in sandbox
67socat ABSTRACT-LISTEN:/tmp/dbus-awBoQTCc,fork UNIX-CONNECT:/tmp/mysock 27socat ABSTRACT-LISTEN:/tmp/dbus-awBoQTCc,fork UNIX-CONNECT:/tmp/mysock
68 28
6912. do not allow symlinks for --bind 295. add support for --ip, --iprange, --mac and --mtu for --interface option
70
7113. While using --net=eth0 assign the name of the interface inside the sandbox as eth0
72
7315. do not attempt to mount /sys if unmount fails
74
75$ firejail --noprofile --chroot=/tmp/chroot
76Parent pid 13915, child pid 13916
77Warning: cannot mount tmpfs on top of /var/log
78Warning: cannot find /var/run/utmp
79Warning: cannot find home directory
80Dropping all Linux capabilities and enforcing default seccomp filter
81Warning: failed to unmount /sys
82Warning: failed to mount /sys
83Warning: cannot disable /sys/firmware directory
84Warning: cannot disable /sys/hypervisor directory
85Warning: cannot disable /sys/fs directory
86Warning: cannot disable /sys/module directory
87Warning: cannot disable /sys/power directory
88Child process initialized
89
9016. add support for --ip, --iprange, --mac and --mtu for --interface option
91
9217. private-home clashing with blacklist
93whitelist clashing with blacklist
94
9519. Try --overlay on a Ubuntu 14.04 32bit.Without adding --dns, there will be no network connectivity - see issue 151
96
9721. restrict chars in filenames
98
99try to open url-encoded filenames
100
101const char badChars[] = "-\n\r ,;'\\<\"";
102(https://www.securecoding.cert.org/confluence/display/c/MSC09-C.+Character+encoding%3A+Use+subset+of+ASCII+for+safety)
103
104strip = array("~", "`", "!", "@", "#", "$", "%", "^", "&", "*", "(", ")", "_", "=", "+", "[", "{", "]",
105 "}", "\\", "|", ";", ":", "\"", "'", "&#8216;", "&#8217;", "&#8220;", "&#8221;", "&#8211;", "&#8212;",
106 "—", "–", ",", "<", ".", ">", "/", "?");
107(https://github.com/vito/chyrp/blob/35c646dda657300b345a233ab10eaca7ccd4ec10/includes/helpers.php#L516)
108
109$special_chars = array("?", "[", "]", "/", "\\", "=", "<", ">", ":", ";", ",", "'", "\"", "&", "$", "#", "*", "(", ")", "|", "~", "`", "!", "{", "}");
110(wordpress)
111
112rework the calls to invalid_filename(), depending if globing is allowed or not, include * in the list for non-globing files
113
114The POSIX standard defines what a “portable filename” is. This turns out to be just A-Z, a-z, 0-9, <period>, <underscore>, and <hyphen>
115http://pubs.opengroup.org/onlinepubs/9699919799/basedefs/V1_chap03.html#tag_03_276
116
11722. --shutdown does not clear sandboxes started with --join on Debian jessie
118 30
11923. to document: 316. --shutdown does not clear sandboxes started with --join
120 32
121http://lwn.net/Articles/414813/
122echo 1 > /proc/sys/kernel/dmesg_restrict
123 33