aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--README.md2
-rw-r--r--RELNOTES2
-rw-r--r--etc/inc/archiver-common.inc13
-rw-r--r--etc/inc/disable-common.inc3
-rw-r--r--etc/inc/disable-programs.inc11
-rw-r--r--etc/inc/disable-shell.inc1
-rw-r--r--etc/profile-a-l/7z.profile2
-rw-r--r--etc/profile-a-l/alacarte.profile6
-rw-r--r--etc/profile-a-l/ar.profile2
-rw-r--r--etc/profile-a-l/atom.profile32
-rw-r--r--etc/profile-a-l/authenticator-rs.profile12
-rw-r--r--etc/profile-a-l/balsa.profile2
-rw-r--r--etc/profile-a-l/beaker.profile21
-rw-r--r--etc/profile-a-l/brave.profile4
-rw-r--r--etc/profile-a-l/bsdtar.profile2
-rw-r--r--etc/profile-a-l/chromium-common.profile1
-rw-r--r--etc/profile-a-l/chromium.profile1
-rw-r--r--etc/profile-a-l/discord-common.profile37
-rw-r--r--etc/profile-a-l/electron.profile28
-rw-r--r--etc/profile-a-l/element-desktop.profile5
-rw-r--r--etc/profile-a-l/feh.profile1
-rw-r--r--etc/profile-a-l/fractal.profile4
-rw-r--r--etc/profile-a-l/freetube.profile13
-rw-r--r--etc/profile-a-l/github-desktop.profile46
-rw-r--r--etc/profile-a-l/homebank.profile2
-rw-r--r--etc/profile-a-l/jitsi-meet-desktop.profile22
-rw-r--r--etc/profile-a-l/kazam.profile8
-rw-r--r--etc/profile-a-l/keepassxc.profile7
-rw-r--r--etc/profile-a-l/kube.profile2
-rw-r--r--etc/profile-a-l/librewolf.profile28
-rw-r--r--etc/profile-a-l/links.profile1
-rw-r--r--etc/profile-a-l/lynx.profile1
-rw-r--r--etc/profile-m-z/matrix-mirage.profile24
-rw-r--r--etc/profile-m-z/menulibre.profile4
-rw-r--r--etc/profile-m-z/microsoft-edge-dev.profile20
-rw-r--r--etc/profile-m-z/microsoft-edge.profile11
-rw-r--r--etc/profile-m-z/min.profile2
-rw-r--r--etc/profile-m-z/minitube.profile6
-rw-r--r--etc/profile-m-z/mirage.profile7
-rw-r--r--etc/profile-m-z/mtpaint.profile4
-rw-r--r--etc/profile-m-z/musictube.profile8
-rw-r--r--etc/profile-m-z/nheko.profile18
-rw-r--r--etc/profile-m-z/nuclear.profile17
-rw-r--r--etc/profile-m-z/onboard.profile6
-rw-r--r--etc/profile-m-z/otter-browser.profile6
-rw-r--r--etc/profile-m-z/photoflare.profile4
-rw-r--r--etc/profile-m-z/quaternion.profile4
-rw-r--r--etc/profile-m-z/riot-desktop.profile2
-rw-r--r--etc/profile-m-z/riot-web.profile7
-rw-r--r--etc/profile-m-z/rocketchat.profile20
-rw-r--r--etc/profile-m-z/servo.profile48
-rw-r--r--etc/profile-m-z/signal-desktop.profile33
-rw-r--r--etc/profile-m-z/skypeforlinux.profile33
-rw-r--r--etc/profile-m-z/slack.profile33
-rw-r--r--etc/profile-m-z/spectral.profile8
-rw-r--r--etc/profile-m-z/ssh.profile2
-rw-r--r--etc/profile-m-z/strawberry.profile2
-rw-r--r--etc/profile-m-z/tar.profile4
-rw-r--r--etc/profile-m-z/teams-for-linux.profile22
-rw-r--r--etc/profile-m-z/teams.profile24
-rw-r--r--etc/profile-m-z/twitch.profile21
-rw-r--r--etc/profile-m-z/unzip.profile2
-rw-r--r--etc/profile-m-z/whalebird.profile22
-rw-r--r--etc/profile-m-z/wire-desktop.profile24
-rw-r--r--etc/profile-m-z/youtube.profile21
-rw-r--r--etc/profile-m-z/youtubemusic-nativefier.profile19
-rw-r--r--etc/profile-m-z/ytmdesktop.profile20
-rw-r--r--etc/profile-m-z/zoom.profile44
-rw-r--r--src/firecfg/firecfg.config4
-rw-r--r--src/firejail/fs_home.c51
-rw-r--r--src/firejail/main.c12
-rw-r--r--src/firejail/no_sandbox.c11
-rw-r--r--src/firejail/profile.c17
-rw-r--r--src/firejail/pulseaudio.c23
-rw-r--r--src/firejail/sandbox.c2
-rw-r--r--src/firejail/util.c15
-rw-r--r--src/firejail/x11.c2
-rw-r--r--src/man/firejail.txt10
78 files changed, 527 insertions, 494 deletions
diff --git a/README.md b/README.md
index c92d5bf30..8d3b3c3bb 100644
--- a/README.md
+++ b/README.md
@@ -195,4 +195,4 @@ Stats:
195 195
196### New profiles: 196### New profiles:
197 197
198spectacle, chromium-browser-privacy, gtk-straw-viewer, gtk-youtube-viewer, gtk2-youtube-viewer, gtk3-youtube-viewer, straw-viewer, lutris, dolphin-emu, authenticator-rs 198spectacle, chromium-browser-privacy, gtk-straw-viewer, gtk-youtube-viewer, gtk2-youtube-viewer, gtk3-youtube-viewer, straw-viewer, lutris, dolphin-emu, authenticator-rs, servo
diff --git a/RELNOTES b/RELNOTES
index 4eda50bc8..5f5b451e1 100644
--- a/RELNOTES
+++ b/RELNOTES
@@ -5,7 +5,7 @@ firejail (0.9.65) baseline; urgency=low
5 * Setup guide for new users: contrib/firejail-welcome.sh 5 * Setup guide for new users: contrib/firejail-welcome.sh
6 * new profiles: spectacle, chromium-browser-privacy, gtk-straw-viewer 6 * new profiles: spectacle, chromium-browser-privacy, gtk-straw-viewer
7 * new profiles: gtk-youtube-viewer, gtk2-youtube-viewer, gtk3-youtube-viewer 7 * new profiles: gtk-youtube-viewer, gtk2-youtube-viewer, gtk3-youtube-viewer
8 * new profiles: straw-viewer, lutris, dolphin-emu, authenticator-rs 8 * new profiles: straw-viewer, lutris, dolphin-emu, authenticator-rs, servo
9 9
10 -- netblue30 <netblue30@yahoo.com> Wed, 21 Oct 2020 09:00:00 -0500 10 -- netblue30 <netblue30@yahoo.com> Wed, 21 Oct 2020 09:00:00 -0500
11 11
diff --git a/etc/inc/archiver-common.inc b/etc/inc/archiver-common.inc
index 2c5e4d8bf..9812e3ebb 100644
--- a/etc/inc/archiver-common.inc
+++ b/etc/inc/archiver-common.inc
@@ -6,12 +6,21 @@ include archiver-common.local
6 6
7blacklist ${RUNUSER} 7blacklist ${RUNUSER}
8 8
9include disable-common.inc 9# WARNING:
10# Users can (un)restrict file access for **all** archivers by commenting/uncommenting the needed
11# include file(s) here or by putting those into archiver-common.local.
12# Another option is to do this **per archiver** in the relevant <archiver>.local.
13# Just beware that things tend to break when overtightening profiles. For example, because you only
14# need to (un)compress files in ${DOWNLOADS}, other applications may need access to ${HOME}/.local/share.
15
16# Uncomment the next line (or put it into your archiver-common.local) if you don't need to compress files in disable-common.inc.
17#include disable-common.inc
10include disable-devel.inc 18include disable-devel.inc
11include disable-exec.inc 19include disable-exec.inc
12include disable-interpreters.inc 20include disable-interpreters.inc
13include disable-passwdmgr.inc 21include disable-passwdmgr.inc
14include disable-programs.inc 22# Uncomment the next line (or put it into your archiver-common.local) if you don't need to compress files in disable-programs.inc.
23#include disable-programs.inc
15include disable-shell.inc 24include disable-shell.inc
16 25
17apparmor 26apparmor
diff --git a/etc/inc/disable-common.inc b/etc/inc/disable-common.inc
index 2b56bb5be..d88506d90 100644
--- a/etc/inc/disable-common.inc
+++ b/etc/inc/disable-common.inc
@@ -517,16 +517,19 @@ blacklist /proc/config.gz
517blacklist ${PATH}/dig 517blacklist ${PATH}/dig
518blacklist ${PATH}/dlint 518blacklist ${PATH}/dlint
519blacklist ${PATH}/dns2tcp 519blacklist ${PATH}/dns2tcp
520blacklist ${PATH}/dnssec-*
520blacklist ${PATH}/dnswalk 521blacklist ${PATH}/dnswalk
521blacklist ${PATH}/drill 522blacklist ${PATH}/drill
522blacklist ${PATH}/host 523blacklist ${PATH}/host
523blacklist ${PATH}/iodine 524blacklist ${PATH}/iodine
524blacklist ${PATH}/kdig 525blacklist ${PATH}/kdig
526blacklist ${PATH}/khost
525blacklist ${PATH}/knsupdate 527blacklist ${PATH}/knsupdate
526blacklist ${PATH}/ldns-* 528blacklist ${PATH}/ldns-*
527blacklist ${PATH}/ldnsd 529blacklist ${PATH}/ldnsd
528blacklist ${PATH}/nslookup 530blacklist ${PATH}/nslookup
529blacklist ${PATH}/resolvectl 531blacklist ${PATH}/resolvectl
532blacklist ${PATH}/unbound-host
530 533
531# rest of ${RUNUSER} 534# rest of ${RUNUSER}
532blacklist ${RUNUSER}/*.lock 535blacklist ${RUNUSER}/*.lock
diff --git a/etc/inc/disable-programs.inc b/etc/inc/disable-programs.inc
index 59bd28f95..7ab11e620 100644
--- a/etc/inc/disable-programs.inc
+++ b/etc/inc/disable-programs.inc
@@ -303,11 +303,13 @@ blacklist ${HOME}/.config/mana
303blacklist ${HOME}/.config/mate-calc 303blacklist ${HOME}/.config/mate-calc
304blacklist ${HOME}/.config/mate/eom 304blacklist ${HOME}/.config/mate/eom
305blacklist ${HOME}/.config/mate/mate-dictionary 305blacklist ${HOME}/.config/mate/mate-dictionary
306blacklist ${HOME}/.config/matrix-mirage
306blacklist ${HOME}/.config/meld 307blacklist ${HOME}/.config/meld
307blacklist ${HOME}/.config/meteo-qt 308blacklist ${HOME}/.config/meteo-qt
308blacklist ${HOME}/.config/menulibre.cfg 309blacklist ${HOME}/.config/menulibre.cfg
309blacklist ${HOME}/.config/mfusion 310blacklist ${HOME}/.config/mfusion
310blacklist ${HOME}/.config/Microsoft 311blacklist ${HOME}/.config/Microsoft
312blacklist ${HOME}/.config/microsoft-edge-dev
311blacklist ${HOME}/.config/midori 313blacklist ${HOME}/.config/midori
312blacklist ${HOME}/.config/mirage 314blacklist ${HOME}/.config/mirage
313blacklist ${HOME}/.config/mono 315blacklist ${HOME}/.config/mono
@@ -554,6 +556,7 @@ blacklist ${HOME}/.kino-history
554blacklist ${HOME}/.kinorc 556blacklist ${HOME}/.kinorc
555blacklist ${HOME}/.klatexformula 557blacklist ${HOME}/.klatexformula
556blacklist ${HOME}/.kodi 558blacklist ${HOME}/.kodi
559blacklist ${HOME}/.librewolf
557blacklist ${HOME}/.lincity-ng 560blacklist ${HOME}/.lincity-ng
558blacklist ${HOME}/.links 561blacklist ${HOME}/.links
559blacklist ${HOME}/.linphone-history.db 562blacklist ${HOME}/.linphone-history.db
@@ -589,7 +592,7 @@ blacklist ${HOME}/.local/share/agenda
589blacklist ${HOME}/.local/share/apps/korganizer 592blacklist ${HOME}/.local/share/apps/korganizer
590blacklist ${HOME}/.local/share/aspyr-media 593blacklist ${HOME}/.local/share/aspyr-media
591blacklist ${HOME}/.local/share/autokey 594blacklist ${HOME}/.local/share/autokey
592blacklist ${HOME}/.local/share/authenticator-rs 595blacklist ${HOME}/.local/share/authenticator-rs
593blacklist ${HOME}/.local/share/backintime 596blacklist ${HOME}/.local/share/backintime
594blacklist ${HOME}/.local/share/baloo 597blacklist ${HOME}/.local/share/baloo
595blacklist ${HOME}/.local/share/barrier 598blacklist ${HOME}/.local/share/barrier
@@ -671,6 +674,7 @@ blacklist ${HOME}/.local/share/lugaru
671blacklist ${HOME}/.local/share/lutris 674blacklist ${HOME}/.local/share/lutris
672blacklist ${HOME}/.local/share/mana 675blacklist ${HOME}/.local/share/mana
673blacklist ${HOME}/.local/share/maps-places.json 676blacklist ${HOME}/.local/share/maps-places.json
677blacklist ${HOME}/.local/share/matrix-mirage
674blacklist ${HOME}/.local/share/meld 678blacklist ${HOME}/.local/share/meld
675blacklist ${HOME}/.local/share/midori 679blacklist ${HOME}/.local/share/midori
676blacklist ${HOME}/.local/share/mirage 680blacklist ${HOME}/.local/share/mirage
@@ -940,9 +944,12 @@ blacklist ${HOME}/.cache/ksplashqml
940blacklist ${HOME}/.cache/kube 944blacklist ${HOME}/.cache/kube
941blacklist ${HOME}/.cache/kwin 945blacklist ${HOME}/.cache/kwin
942blacklist ${HOME}/.cache/libgweather 946blacklist ${HOME}/.cache/libgweather
947blacklist ${HOME}/.cache/librewolf
943blacklist ${HOME}/.cache/liferea 948blacklist ${HOME}/.cache/liferea
944blacklist ${HOME}/.cache/lutris 949blacklist ${HOME}/.cache/lutris
945blacklist ${HOME}/.cache/Mendeley Ltd. 950blacklist ${HOME}/.cache/Mendeley Ltd.
951blacklist ${HOME}/.cache/matrix-mirage
952blacklist ${HOME}/.cache/microsoft-edge-dev
946blacklist ${HOME}/.cache/midori 953blacklist ${HOME}/.cache/midori
947blacklist ${HOME}/.cache/minetest 954blacklist ${HOME}/.cache/minetest
948blacklist ${HOME}/.cache/mirage 955blacklist ${HOME}/.cache/mirage
@@ -958,7 +965,7 @@ blacklist ${HOME}/.cache/ms-skype-online
958blacklist ${HOME}/.cache/ms-word-online 965blacklist ${HOME}/.cache/ms-word-online
959blacklist ${HOME}/.cache/mutt 966blacklist ${HOME}/.cache/mutt
960blacklist ${HOME}/.cache/mypaint 967blacklist ${HOME}/.cache/mypaint
961blacklist ${HOME}/.cache/nheko/nheko 968blacklist ${HOME}/.cache/nheko
962blacklist ${HOME}/.cache/netsurf 969blacklist ${HOME}/.cache/netsurf
963blacklist ${HOME}/.cache/okular 970blacklist ${HOME}/.cache/okular
964blacklist ${HOME}/.cache/opera 971blacklist ${HOME}/.cache/opera
diff --git a/etc/inc/disable-shell.inc b/etc/inc/disable-shell.inc
index e66d23c9f..8274b0215 100644
--- a/etc/inc/disable-shell.inc
+++ b/etc/inc/disable-shell.inc
@@ -8,6 +8,7 @@ blacklist ${PATH}/dash
8blacklist ${PATH}/fish 8blacklist ${PATH}/fish
9blacklist ${PATH}/ksh 9blacklist ${PATH}/ksh
10blacklist ${PATH}/mksh 10blacklist ${PATH}/mksh
11blacklist ${PATH}/oksh
11blacklist ${PATH}/sh 12blacklist ${PATH}/sh
12blacklist ${PATH}/tclsh 13blacklist ${PATH}/tclsh
13blacklist ${PATH}/tcsh 14blacklist ${PATH}/tcsh
diff --git a/etc/profile-a-l/7z.profile b/etc/profile-a-l/7z.profile
index 4f9e72a79..5e1c17b28 100644
--- a/etc/profile-a-l/7z.profile
+++ b/etc/profile-a-l/7z.profile
@@ -10,5 +10,3 @@ include globals.local
10noblacklist ${PATH}/bash 10noblacklist ${PATH}/bash
11noblacklist ${PATH}/sh 11noblacklist ${PATH}/sh
12include archiver-common.inc 12include archiver-common.inc
13
14private-bin 7z,7z*,bash,p7zip,sh
diff --git a/etc/profile-a-l/alacarte.profile b/etc/profile-a-l/alacarte.profile
index 5fabf8283..98188d2a7 100644
--- a/etc/profile-a-l/alacarte.profile
+++ b/etc/profile-a-l/alacarte.profile
@@ -11,7 +11,7 @@ include allow-python3.inc
11 11
12include disable-common.inc 12include disable-common.inc
13include disable-devel.inc 13include disable-devel.inc
14include disable-exec.inc 14include disable-exec.inc
15include disable-interpreters.inc 15include disable-interpreters.inc
16include disable-programs.inc 16include disable-programs.inc
17include disable-passwdmgr.inc 17include disable-passwdmgr.inc
@@ -25,7 +25,7 @@ whitelist /usr/share/icons
25whitelist /var/lib/app-info/icons 25whitelist /var/lib/app-info/icons
26whitelist /var/lib/flatpak/exports/share/applications 26whitelist /var/lib/flatpak/exports/share/applications
27whitelist /var/lib/flatpak/exports/share/icons 27whitelist /var/lib/flatpak/exports/share/icons
28include whitelist-runuser-common.inc 28include whitelist-runuser-common.inc
29include whitelist-usr-share-common.inc 29include whitelist-usr-share-common.inc
30include whitelist-var-common.inc 30include whitelist-var-common.inc
31 31
@@ -49,7 +49,7 @@ shell none
49tracelog 49tracelog
50 50
51disable-mnt 51disable-mnt
52private-bin alacarte,bash,python*,sh 52# private-bin alacarte,bash,python*,sh
53private-cache 53private-cache
54private-dev 54private-dev
55private-etc alternatives,dconf,fonts,gtk-3.0,locale.alias,locale.conf,login.defs,mime.types,nsswitch.conf,passwd,pki,X11,xdg 55private-etc alternatives,dconf,fonts,gtk-3.0,locale.alias,locale.conf,login.defs,mime.types,nsswitch.conf,passwd,pki,X11,xdg
diff --git a/etc/profile-a-l/ar.profile b/etc/profile-a-l/ar.profile
index a600eddef..c2b215807 100644
--- a/etc/profile-a-l/ar.profile
+++ b/etc/profile-a-l/ar.profile
@@ -8,5 +8,3 @@ include ar.local
8include globals.local 8include globals.local
9 9
10include archiver-common.inc 10include archiver-common.inc
11
12private-bin ar
diff --git a/etc/profile-a-l/atom.profile b/etc/profile-a-l/atom.profile
index cf0a5a42b..f21a5febf 100644
--- a/etc/profile-a-l/atom.profile
+++ b/etc/profile-a-l/atom.profile
@@ -6,31 +6,27 @@ include atom.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9# Disabled until someone reported positive feedback
10ignore include disable-devel.inc
11ignore include disable-interpreters.inc
12ignore include disable-xdg.inc
13ignore whitelist ${DOWNLOADS}
14ignore include whitelist-common.inc
15ignore include whitelist-runuser-common.inc
16ignore include whitelist-usr-share-common.inc
17ignore include whitelist-var-common.inc
18ignore apparmor
19ignore disable-mnt
20
9noblacklist ${HOME}/.atom 21noblacklist ${HOME}/.atom
10noblacklist ${HOME}/.config/Atom 22noblacklist ${HOME}/.config/Atom
11 23
12# Allows files commonly used by IDEs 24# Allows files commonly used by IDEs
13include allow-common-devel.inc 25include allow-common-devel.inc
14 26
15include disable-common.inc
16include disable-exec.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19
20caps.keep sys_admin,sys_chroot
21# net none 27# net none
22netfilter 28netfilter
23nodvd
24nogroups
25nosound 29nosound
26notv
27nou2f
28novideo
29shell none
30
31private-cache
32private-dev
33private-tmp
34 30
35dbus-user none 31# Redirect
36dbus-system none 32include electron.profile
diff --git a/etc/profile-a-l/authenticator-rs.profile b/etc/profile-a-l/authenticator-rs.profile
index 1eb802d9b..fb12018f5 100644
--- a/etc/profile-a-l/authenticator-rs.profile
+++ b/etc/profile-a-l/authenticator-rs.profile
@@ -6,7 +6,7 @@ include authenticator-rs.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9noblacklist ${HOME}/.local/share/authenticator-rs 9noblacklist ${HOME}/.local/share/authenticator-rs
10 10
11include disable-common.inc 11include disable-common.inc
12include disable-devel.inc 12include disable-devel.inc
@@ -18,12 +18,12 @@ include disable-shell.inc
18include disable-xdg.inc 18include disable-xdg.inc
19 19
20mkdir ${HOME}/.local/share/authenticator-rs 20mkdir ${HOME}/.local/share/authenticator-rs
21whitelist ${HOME}/.local/share/authenticator-rs 21whitelist ${HOME}/.local/share/authenticator-rs
22whitelist ${DOWNLOADS} 22whitelist ${DOWNLOADS}
23whitelist /usr/share/uk.co.grumlimited.authenticator-rs 23whitelist /usr/share/uk.co.grumlimited.authenticator-rs
24include whitelist-common.inc 24include whitelist-common.inc
25include whitelist-runuser-common.inc 25include whitelist-runuser-common.inc
26include whitelist-usr-share-common.inc 26include whitelist-usr-share-common.inc
27include whitelist-var-common.inc 27include whitelist-var-common.inc
28 28
29apparmor 29apparmor
diff --git a/etc/profile-a-l/balsa.profile b/etc/profile-a-l/balsa.profile
index a401ac592..cda6b1aa0 100644
--- a/etc/profile-a-l/balsa.profile
+++ b/etc/profile-a-l/balsa.profile
@@ -58,7 +58,7 @@ shell none
58tracelog 58tracelog
59 59
60# disable-mnt 60# disable-mnt
61# Add "gpg,gpg2,gpg-agent,pinentry-curses,pinentry-emacs,pinentry-fltk,pinentry-gnome3,pinentry-gtk,pinentry-gtk2,pinentry-gtk-2,pinentry-qt,pinentry-qt4,pinentry-tty,pinentry-x2go,pinentry-kwallet" for gpg 61# Add "gpg,gpg2,gpg-agent,pinentry-curses,pinentry-emacs,pinentry-fltk,pinentry-gnome3,pinentry-gtk,pinentry-gtk2,pinentry-gtk-2,pinentry-qt,pinentry-qt4,pinentry-tty,pinentry-x2go,pinentry-kwallet" for gpg
62# Add "ignore private-bin" for hyperlinks or have a look at the private-bins in firefox.profile and firefox-common.profile. 62# Add "ignore private-bin" for hyperlinks or have a look at the private-bins in firefox.profile and firefox-common.profile.
63private-bin balsa,balsa-ab 63private-bin balsa,balsa-ab
64private-cache 64private-cache
diff --git a/etc/profile-a-l/beaker.profile b/etc/profile-a-l/beaker.profile
index cc1886a49..f3a9568bd 100644
--- a/etc/profile-a-l/beaker.profile
+++ b/etc/profile-a-l/beaker.profile
@@ -3,17 +3,26 @@
3# Persistent local customizations 3# Persistent local customizations
4include beaker.local 4include beaker.local
5# Persistent global definitions 5# Persistent global definitions
6# added by included profile 6include globals.local
7#include globals.local
8 7
9noblacklist ${HOME}/.config/Beaker Browser 8# Disabled until someone reported positive feedback
9ignore include disable-exec.inc
10ignore include disable-xdg.inc
11ignore include whitelist-runuser-common.inc
12ignore include whitelist-usr-share-common.inc
13ignore include whitelist-var-common.inc
14ignore nou2f
15ignore novideo
16ignore shell none
17ignore disable-mnt
18ignore private-cache
19ignore private-dev
20ignore private-tmp
10 21
11include disable-devel.inc 22noblacklist ${HOME}/.config/Beaker Browser
12include disable-interpreters.inc
13 23
14mkdir ${HOME}/.config/Beaker Browser 24mkdir ${HOME}/.config/Beaker Browser
15whitelist ${HOME}/.config/Beaker Browser 25whitelist ${HOME}/.config/Beaker Browser
16include whitelist-common.inc
17 26
18# Redirect 27# Redirect
19include electron.profile 28include electron.profile
diff --git a/etc/profile-a-l/brave.profile b/etc/profile-a-l/brave.profile
index 904d3e94f..5a5e9eacd 100644
--- a/etc/profile-a-l/brave.profile
+++ b/etc/profile-a-l/brave.profile
@@ -10,10 +10,6 @@ include globals.local
10ignore noexec /tmp 10ignore noexec /tmp
11# TOR is installed in ${HOME} 11# TOR is installed in ${HOME}
12ignore noexec ${HOME} 12ignore noexec ${HOME}
13# Disable for now, see https://github.com/netblue30/firejail/pull/3688#issuecomment-718711565
14ignore whitelist /usr/share/chromium
15ignore include whitelist-runuser-common.inc
16ignore include whitelist-usr-share-common.inc
17 13
18noblacklist ${HOME}/.cache/BraveSoftware 14noblacklist ${HOME}/.cache/BraveSoftware
19noblacklist ${HOME}/.config/BraveSoftware 15noblacklist ${HOME}/.config/BraveSoftware
diff --git a/etc/profile-a-l/bsdtar.profile b/etc/profile-a-l/bsdtar.profile
index f2116f4ab..c37f4071e 100644
--- a/etc/profile-a-l/bsdtar.profile
+++ b/etc/profile-a-l/bsdtar.profile
@@ -8,6 +8,4 @@ include globals.local
8 8
9include archiver-common.inc 9include archiver-common.inc
10 10
11# support compressed archives
12private-bin bash,bsdcat,bsdcpio,bsdtar,bzip2,compress,gtar,gzip,lbzip2,libarchive,lz4,lzip,lzma,lzop,sh,xz
13private-etc alternatives,group,localtime,passwd 11private-etc alternatives,group,localtime,passwd
diff --git a/etc/profile-a-l/chromium-common.profile b/etc/profile-a-l/chromium-common.profile
index 6a9cf99b0..ce9c652c6 100644
--- a/etc/profile-a-l/chromium-common.profile
+++ b/etc/profile-a-l/chromium-common.profile
@@ -25,7 +25,6 @@ mkdir ${HOME}/.local/share/pki
25whitelist ${DOWNLOADS} 25whitelist ${DOWNLOADS}
26whitelist ${HOME}/.pki 26whitelist ${HOME}/.pki
27whitelist ${HOME}/.local/share/pki 27whitelist ${HOME}/.local/share/pki
28whitelist /usr/share/chromium
29include whitelist-common.inc 28include whitelist-common.inc
30include whitelist-runuser-common.inc 29include whitelist-runuser-common.inc
31include whitelist-usr-share-common.inc 30include whitelist-usr-share-common.inc
diff --git a/etc/profile-a-l/chromium.profile b/etc/profile-a-l/chromium.profile
index dab9ce449..14f1bbe64 100644
--- a/etc/profile-a-l/chromium.profile
+++ b/etc/profile-a-l/chromium.profile
@@ -15,6 +15,7 @@ mkdir ${HOME}/.config/chromium
15whitelist ${HOME}/.cache/chromium 15whitelist ${HOME}/.cache/chromium
16whitelist ${HOME}/.config/chromium 16whitelist ${HOME}/.config/chromium
17whitelist ${HOME}/.config/chromium-flags.conf 17whitelist ${HOME}/.config/chromium-flags.conf
18whitelist /usr/share/chromium
18 19
19# private-bin chromium,chromium-browser,chromedriver 20# private-bin chromium,chromium-browser,chromedriver
20 21
diff --git a/etc/profile-a-l/discord-common.profile b/etc/profile-a-l/discord-common.profile
index 35bea4aaa..e6edbd7eb 100644
--- a/etc/profile-a-l/discord-common.profile
+++ b/etc/profile-a-l/discord-common.profile
@@ -6,33 +6,24 @@ include discord-common.local
6# added by caller profile 6# added by caller profile
7#include globals.local 7#include globals.local
8 8
9ignore noexec ${HOME} 9# Disabled until someone reported positive feedback
10ignore include disable-interpreters.inc
11ignore include disable-xdg.inc
12ignore include whitelist-runuser-common.inc
13ignore include whitelist-usr-share-common.inc
14ignore apparmor
15ignore disable-mnt
16ignore private-cache
17ignore dbus-user none
18ignore dbus-system none
10 19
11include disable-common.inc 20ignore noexec ${HOME}
12include disable-devel.inc
13include disable-exec.inc
14include disable-passwdmgr.inc
15include disable-programs.inc
16 21
17whitelist ${DOWNLOADS}
18whitelist ${HOME}/.config/BetterDiscord 22whitelist ${HOME}/.config/BetterDiscord
19whitelist ${HOME}/.local/share/betterdiscordctl 23whitelist ${HOME}/.local/share/betterdiscordctl
20include whitelist-common.inc
21include whitelist-var-common.inc
22
23caps.drop all
24netfilter
25nodvd
26nogroups
27nonewprivs
28noroot
29notv
30nou2f
31novideo
32protocol unix,inet,inet6,netlink
33seccomp !chroot
34 24
35private-bin bash,cut,echo,egrep,fish,grep,head,sed,sh,tclsh,tr,xdg-mime,xdg-open,zsh 25private-bin bash,cut,echo,egrep,fish,grep,head,sed,sh,tclsh,tr,xdg-mime,xdg-open,zsh
36private-dev
37private-etc alternatives,ca-certificates,crypto-policies,fonts,group,ld.so.cache,localtime,login.defs,machine-id,password,pki,resolv.conf,ssl 26private-etc alternatives,ca-certificates,crypto-policies,fonts,group,ld.so.cache,localtime,login.defs,machine-id,password,pki,resolv.conf,ssl
38private-tmp 27
28# Redirect
29include electron.profile
diff --git a/etc/profile-a-l/electron.profile b/etc/profile-a-l/electron.profile
index 9b99c7ffb..d3be07c9d 100644
--- a/etc/profile-a-l/electron.profile
+++ b/etc/profile-a-l/electron.profile
@@ -3,25 +3,39 @@
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4# Persistent local customizations 4# Persistent local customizations
5include electron.local 5include electron.local
6# Persistent global definitions
7include globals.local
8 6
9include disable-common.inc 7include disable-common.inc
8include disable-devel.inc
9include disable-exec.inc
10include disable-interpreters.inc
10include disable-passwdmgr.inc 11include disable-passwdmgr.inc
11include disable-programs.inc 12include disable-programs.inc
13include disable-xdg.inc
12 14
13whitelist ${DOWNLOADS} 15whitelist ${DOWNLOADS}
16include whitelist-common.inc
17include whitelist-runuser-common.inc
18include whitelist-usr-share-common.inc
19include whitelist-var-common.inc
20
21# Uncomment the next line (or add it to your chromium-common.local)
22# if your kernel allows unprivileged userns clone.
23#include chromium-common-hardened.inc
14 24
15apparmor 25apparmor
16caps.drop all 26caps.keep sys_admin,sys_chroot
17netfilter 27netfilter
18nodvd 28nodvd
19nogroups 29nogroups
20nonewprivs
21noroot
22notv 30notv
23protocol unix,inet,inet6,netlink 31nou2f
24seccomp 32novideo
33shell none
34
35disable-mnt
36private-cache
37private-dev
38private-tmp
25 39
26dbus-user none 40dbus-user none
27dbus-system none 41dbus-system none
diff --git a/etc/profile-a-l/element-desktop.profile b/etc/profile-a-l/element-desktop.profile
index 2d56369cd..48a826f2e 100644
--- a/etc/profile-a-l/element-desktop.profile
+++ b/etc/profile-a-l/element-desktop.profile
@@ -7,6 +7,8 @@ include element-desktop.local
7# added by included profile 7# added by included profile
8#include globals.local 8#include globals.local
9 9
10ignore dbus-user none
11
10noblacklist ${HOME}/.config/Element 12noblacklist ${HOME}/.config/Element
11 13
12mkdir ${HOME}/.config/Element 14mkdir ${HOME}/.config/Element
@@ -15,5 +17,8 @@ whitelist /opt/Element
15 17
16private-opt Element 18private-opt Element
17 19
20dbus-user filter
21dbus-user.talk org.freedesktop.secrets
22
18# Redirect 23# Redirect
19include riot-desktop.profile 24include riot-desktop.profile
diff --git a/etc/profile-a-l/feh.profile b/etc/profile-a-l/feh.profile
index 3ee07e559..8ac7755de 100644
--- a/etc/profile-a-l/feh.profile
+++ b/etc/profile-a-l/feh.profile
@@ -1,6 +1,7 @@
1# Firejail profile for feh 1# Firejail profile for feh
2# Description: imlib2 based image viewer 2# Description: imlib2 based image viewer
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4quiet
4# Persistent local customizations 5# Persistent local customizations
5include feh.local 6include feh.local
6# Persistent global definitions 7# Persistent global definitions
diff --git a/etc/profile-a-l/fractal.profile b/etc/profile-a-l/fractal.profile
index ab907eb0d..c3af29e15 100644
--- a/etc/profile-a-l/fractal.profile
+++ b/etc/profile-a-l/fractal.profile
@@ -1,5 +1,5 @@
1# Firejail profile for fractal 1# Firejail profile for fractal
2# Description: Desktop client for Matrix 2# Description: Desktop client for Matrix
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4# Persistent local customizations 4# Persistent local customizations
5include fractal.local 5include fractal.local
@@ -21,7 +21,7 @@ mkdir ${HOME}/.cache/fractal
21whitelist ${HOME}/.cache/fractal 21whitelist ${HOME}/.cache/fractal
22whitelist ${DOWNLOADS} 22whitelist ${DOWNLOADS}
23include whitelist-common.inc 23include whitelist-common.inc
24include whitelist-runuser-common.inc 24include whitelist-runuser-common.inc
25include whitelist-usr-share-common.inc 25include whitelist-usr-share-common.inc
26include whitelist-var-common.inc 26include whitelist-var-common.inc
27 27
diff --git a/etc/profile-a-l/freetube.profile b/etc/profile-a-l/freetube.profile
index 91f0caf87..e6aff533d 100644
--- a/etc/profile-a-l/freetube.profile
+++ b/etc/profile-a-l/freetube.profile
@@ -8,24 +8,13 @@ include globals.local
8 8
9noblacklist ${HOME}/.config/FreeTube 9noblacklist ${HOME}/.config/FreeTube
10 10
11include disable-devel.inc 11include disable-shell.inc
12include disable-exec.inc
13include disable-interpreters.inc
14include disable-shell.inc
15include disable-xdg.inc
16 12
17mkdir ${HOME}/.config/FreeTube 13mkdir ${HOME}/.config/FreeTube
18whitelist ${HOME}/.config/FreeTube 14whitelist ${HOME}/.config/FreeTube
19 15
20seccomp !chroot
21shell none
22
23disable-mnt
24private-bin freetube 16private-bin freetube
25private-cache
26private-dev
27private-etc alsa,alternatives,asound.conf,ca-certificates,crypto-policies,fonts,gtk-2.0,gtk-3.0,host.conf,hostname,hosts,mime.types,nsswitch.conf,pki,pulse,resolv.conf,ssl,X11,xdg 17private-etc alsa,alternatives,asound.conf,ca-certificates,crypto-policies,fonts,gtk-2.0,gtk-3.0,host.conf,hostname,hosts,mime.types,nsswitch.conf,pki,pulse,resolv.conf,ssl,X11,xdg
28private-tmp
29 18
30# Redirect 19# Redirect
31include electron.profile 20include electron.profile
diff --git a/etc/profile-a-l/github-desktop.profile b/etc/profile-a-l/github-desktop.profile
index 152396553..325c54ced 100644
--- a/etc/profile-a-l/github-desktop.profile
+++ b/etc/profile-a-l/github-desktop.profile
@@ -6,43 +6,35 @@ include github-desktop.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9# Note: On debian-based distributions the binary might be located in
10# /opt/GitHub Desktop/github-desktop, and therefore not be in PATH.
11# If that's the case you can start GitHub Desktop with firejail via
12# `firejail "/opt/GitHub Desktop/github-desktop"`.
13
14# Disabled until someone reported positive feedback
15ignore include disable-xdg.inc
16ignore whitelist ${DOWNLOADS}
17ignore include whitelist-common.inc
18ignore include whitelist-runuser-common.inc
19ignore include whitelist-usr-share-common.inc
20ignore include whitelist-var-common.inc
21ignore apparmor
22ignore dbus-user none
23ignore dbus-system none
24
9noblacklist ${HOME}/.config/GitHub Desktop 25noblacklist ${HOME}/.config/GitHub Desktop
10noblacklist ${HOME}/.config/git 26noblacklist ${HOME}/.config/git
11noblacklist ${HOME}/.gitconfig 27noblacklist ${HOME}/.gitconfig
12noblacklist ${HOME}/.git-credentials 28noblacklist ${HOME}/.git-credentials
13 29
14include disable-common.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-devel.inc
18include disable-exec.inc
19include disable-interpreters.inc
20
21caps.drop all
22netfilter
23# no3d 30# no3d
24nodvd
25nogroups
26nonewprivs
27noroot
28nosound 31nosound
29notv
30nou2f
31novideo
32protocol unix,inet,inet6,netlink
33seccomp !chroot
34 32
35# Note: On debian-based distributions the binary might be located in
36# /opt/GitHub Desktop/github-desktop, and therefore not be in PATH.
37# If that's the case you can start GitHub Desktop with firejail via
38# `firejail "/opt/GitHub Desktop/github-desktop"`.
39
40disable-mnt
41# private-bin github-desktop 33# private-bin github-desktop
42private-cache
43?HAS_APPIMAGE: ignore private-dev 34?HAS_APPIMAGE: ignore private-dev
44private-dev
45# private-lib 35# private-lib
46private-tmp
47 36
48# memory-deny-write-execute 37# memory-deny-write-execute
38
39# Redirect
40include electron.profile
diff --git a/etc/profile-a-l/homebank.profile b/etc/profile-a-l/homebank.profile
index 8e600a2d7..da32de640 100644
--- a/etc/profile-a-l/homebank.profile
+++ b/etc/profile-a-l/homebank.profile
@@ -10,7 +10,7 @@ noblacklist ${HOME}/.config/homebank
10 10
11include disable-common.inc 11include disable-common.inc
12include disable-devel.inc 12include disable-devel.inc
13include disable-exec.inc 13include disable-exec.inc
14include disable-interpreters.inc 14include disable-interpreters.inc
15include disable-programs.inc 15include disable-programs.inc
16include disable-passwdmgr.inc 16include disable-passwdmgr.inc
diff --git a/etc/profile-a-l/jitsi-meet-desktop.profile b/etc/profile-a-l/jitsi-meet-desktop.profile
index c4121d835..e5beb741a 100644
--- a/etc/profile-a-l/jitsi-meet-desktop.profile
+++ b/etc/profile-a-l/jitsi-meet-desktop.profile
@@ -6,34 +6,22 @@ include jitsi-meet-desktop.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9# Disabled until someone reported positive feedback
10ignore nou2f
11ignore novideo
12ignore shell none
13
9ignore noexec /tmp 14ignore noexec /tmp
10 15
11noblacklist ${HOME}/.config/Jitsi Meet 16noblacklist ${HOME}/.config/Jitsi Meet
12 17
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-xdg.inc
17
18nowhitelist ${DOWNLOADS} 18nowhitelist ${DOWNLOADS}
19 19
20mkdir ${HOME}/.config/Jitsi Meet 20mkdir ${HOME}/.config/Jitsi Meet
21
22whitelist ${HOME}/.config/Jitsi Meet 21whitelist ${HOME}/.config/Jitsi Meet
23 22
24include whitelist-common.inc
25include whitelist-usr-share-common.inc
26include whitelist-runuser-common.inc
27include whitelist-var-common.inc
28
29seccomp !chroot
30
31disable-mnt
32private-bin bash,jitsi-meet-desktop 23private-bin bash,jitsi-meet-desktop
33private-cache
34private-dev
35private-etc alsa,alternatives,asound.conf,bumblebee,ca-certificates,crypto-policies,drirc,fonts,glvnd,group,host.conf,hostname,hosts,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,locale,locale.alias,locale.conf,localtime,machine-id,mime.types,nsswitch.conf,nvidia,pango,passwd,pki,protocols,pulse,resolv.conf,rpc,services,ssl,X11,xdg 24private-etc alsa,alternatives,asound.conf,bumblebee,ca-certificates,crypto-policies,drirc,fonts,glvnd,group,host.conf,hostname,hosts,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,locale,locale.alias,locale.conf,localtime,machine-id,mime.types,nsswitch.conf,nvidia,pango,passwd,pki,protocols,pulse,resolv.conf,rpc,services,ssl,X11,xdg
36private-tmp
37 25
38# Redirect 26# Redirect
39include electron.profile 27include electron.profile
diff --git a/etc/profile-a-l/kazam.profile b/etc/profile-a-l/kazam.profile
index 9899ff195..9c095e106 100644
--- a/etc/profile-a-l/kazam.profile
+++ b/etc/profile-a-l/kazam.profile
@@ -12,12 +12,12 @@ noblacklist ${PICTURES}
12noblacklist ${VIDEOS} 12noblacklist ${VIDEOS}
13noblacklist ${HOME}/.config/kazam 13noblacklist ${HOME}/.config/kazam
14 14
15include allow-python2.inc 15include allow-python2.inc
16include allow-python3.inc 16include allow-python3.inc
17 17
18include disable-common.inc 18include disable-common.inc
19include disable-devel.inc 19include disable-devel.inc
20include disable-exec.inc 20include disable-exec.inc
21include disable-interpreters.inc 21include disable-interpreters.inc
22include disable-programs.inc 22include disable-programs.inc
23include disable-passwdmgr.inc 23include disable-passwdmgr.inc
@@ -25,7 +25,7 @@ include disable-shell.inc
25include disable-xdg.inc 25include disable-xdg.inc
26 26
27whitelist /usr/share/kazam 27whitelist /usr/share/kazam
28include whitelist-runuser-common.inc 28include whitelist-runuser-common.inc
29include whitelist-usr-share-common.inc 29include whitelist-usr-share-common.inc
30include whitelist-var-common.inc 30include whitelist-var-common.inc
31 31
diff --git a/etc/profile-a-l/keepassxc.profile b/etc/profile-a-l/keepassxc.profile
index 58db056b2..456f1820d 100644
--- a/etc/profile-a-l/keepassxc.profile
+++ b/etc/profile-a-l/keepassxc.profile
@@ -73,12 +73,11 @@ dbus-user.talk org.freedesktop.login1.Session
73dbus-user.talk org.gnome.ScreenSaver 73dbus-user.talk org.gnome.ScreenSaver
74dbus-user.talk org.gnome.SessionManager 74dbus-user.talk org.gnome.SessionManager
75dbus-user.talk org.gnome.SessionManager.Presence 75dbus-user.talk org.gnome.SessionManager.Presence
76# Uncomment or add to your keepassxc.local to allow Notifications/Tray. 76# Uncomment or add to your keepassxc.local to allow Notifications.
77#dbus-user.talk org.freedesktop.Notifications 77#dbus-user.talk org.freedesktop.Notifications
78# Uncomment or add to your keepassxc.local to allow Tray.
78#dbus-user.talk org.kde.StatusNotifierWatcher 79#dbus-user.talk org.kde.StatusNotifierWatcher
79# These numbers seems to be not stable, see #3713. Play around with them. 80#dbus-user.own org.kde.*
80#dbus-user.own org.kde.StatusNotifierItem-2-2
81#dbus-user.own org.kde.StatusNotifierItem-10-2
82dbus-system none 81dbus-system none
83 82
84# Mutex is stored in /tmp by default, which is broken by private-tmp 83# Mutex is stored in /tmp by default, which is broken by private-tmp
diff --git a/etc/profile-a-l/kube.profile b/etc/profile-a-l/kube.profile
index cf3a69fd7..e0cfb9f24 100644
--- a/etc/profile-a-l/kube.profile
+++ b/etc/profile-a-l/kube.profile
@@ -63,7 +63,7 @@ shell none
63tracelog 63tracelog
64 64
65# disable-mnt 65# disable-mnt
66# Add "gpg,gpg2,gpg-agent,pinentry-curses,pinentry-emacs,pinentry-fltk,pinentry-gnome3,pinentry-gtk,pinentry-gtk2,pinentry-gtk-2,pinentry-qt,pinentry-qt4,pinentry-tty,pinentry-x2go,pinentry-kwallet" for gpg 66# Add "gpg,gpg2,gpg-agent,pinentry-curses,pinentry-emacs,pinentry-fltk,pinentry-gnome3,pinentry-gtk,pinentry-gtk2,pinentry-gtk-2,pinentry-qt,pinentry-qt4,pinentry-tty,pinentry-x2go,pinentry-kwallet" for gpg
67# Add "ignore private-bin" for hyperlinks or have a look at the private-bins in firefox.profile and firefox-common.profile. 67# Add "ignore private-bin" for hyperlinks or have a look at the private-bins in firefox.profile and firefox-common.profile.
68private-bin kube,sink_synchronizer 68private-bin kube,sink_synchronizer
69private-cache 69private-cache
diff --git a/etc/profile-a-l/librewolf.profile b/etc/profile-a-l/librewolf.profile
new file mode 100644
index 000000000..5208cb979
--- /dev/null
+++ b/etc/profile-a-l/librewolf.profile
@@ -0,0 +1,28 @@
1# Firejail profile for Librewolf
2# Description: Firefox fork based on privacy
3# This file is overwritten after every install/update
4# Persistent local customizations
5include librewolf.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.cache/librewolf
10noblacklist ${HOME}/.librewolf
11
12mkdir ${HOME}/.cache/librewolf
13mkdir ${HOME}/.librewolf
14whitelist ${HOME}/.cache/librewolf
15whitelist ${HOME}/.librewolf
16
17# Uncomment (or add to librewolf.local) the following lines if you want to
18# use the migration wizard.
19#noblacklist ${HOME}/.mozilla
20#whitelist ${HOME}/.mozilla
21
22# librewolf requires a shell to launch on Arch. We can possibly remove sh though.
23#private-bin bash,dbus-launch,dbus-send,env,librewolf,python*,sh,which
24# private-etc must first be enabled in firefox-common.profile
25#private-etc librewolf
26
27# Redirect
28include firefox-common.profile
diff --git a/etc/profile-a-l/links.profile b/etc/profile-a-l/links.profile
index b2f94d3cf..ccc77f274 100644
--- a/etc/profile-a-l/links.profile
+++ b/etc/profile-a-l/links.profile
@@ -1,6 +1,7 @@
1# Firejail profile for links 1# Firejail profile for links
2# Description: Text WWW browser 2# Description: Text WWW browser
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4quiet
4# Persistent local customizations 5# Persistent local customizations
5include links.local 6include links.local
6# Persistent global definitions 7# Persistent global definitions
diff --git a/etc/profile-a-l/lynx.profile b/etc/profile-a-l/lynx.profile
index dbd0a61e5..76a0e7ed0 100644
--- a/etc/profile-a-l/lynx.profile
+++ b/etc/profile-a-l/lynx.profile
@@ -1,6 +1,7 @@
1# Firejail profile for lynx 1# Firejail profile for lynx
2# Description: Classic non-graphical (text-mode) web browser 2# Description: Classic non-graphical (text-mode) web browser
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4quiet
4# Persistent local customizations 5# Persistent local customizations
5include lynx.local 6include lynx.local
6# Persistent global definitions 7# Persistent global definitions
diff --git a/etc/profile-m-z/matrix-mirage.profile b/etc/profile-m-z/matrix-mirage.profile
new file mode 100644
index 000000000..b3080df88
--- /dev/null
+++ b/etc/profile-m-z/matrix-mirage.profile
@@ -0,0 +1,24 @@
1# Firejail profile for matrix-mirage
2# Description: Debian name for mirage binary/package
3# This file is overwritten after every install/update
4# Persistent local customizations
5include matrix-mirage.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10noblacklist ${HOME}/.cache/matrix-mirage
11noblacklist ${HOME}/.config/matrix-mirage
12noblacklist ${HOME}/.local/share/matrix-mirage
13
14mkdir ${HOME}/.cache/matrix-mirage
15mkdir ${HOME}/.config/matrix-mirage
16mkdir ${HOME}/.local/share/matrix-mirage
17whitelist ${HOME}/.cache/matrix-mirage
18whitelist ${HOME}/.config/matrix-mirage
19whitelist ${HOME}/.local/share/matrix-mirage
20
21private-bin matrix-mirage
22
23# Redirect
24include mirage.profile
diff --git a/etc/profile-m-z/menulibre.profile b/etc/profile-m-z/menulibre.profile
index c70090a25..8a98209a2 100644
--- a/etc/profile-m-z/menulibre.profile
+++ b/etc/profile-m-z/menulibre.profile
@@ -11,7 +11,7 @@ include allow-python3.inc
11 11
12include disable-common.inc 12include disable-common.inc
13include disable-devel.inc 13include disable-devel.inc
14include disable-exec.inc 14include disable-exec.inc
15include disable-interpreters.inc 15include disable-interpreters.inc
16include disable-programs.inc 16include disable-programs.inc
17include disable-passwdmgr.inc 17include disable-passwdmgr.inc
@@ -25,7 +25,7 @@ whitelist /usr/share/menulibre
25whitelist /var/lib/app-info/icons 25whitelist /var/lib/app-info/icons
26whitelist /var/lib/flatpak/exports/share/applications 26whitelist /var/lib/flatpak/exports/share/applications
27whitelist /var/lib/flatpak/exports/share/icons 27whitelist /var/lib/flatpak/exports/share/icons
28include whitelist-runuser-common.inc 28include whitelist-runuser-common.inc
29include whitelist-usr-share-common.inc 29include whitelist-usr-share-common.inc
30include whitelist-var-common.inc 30include whitelist-var-common.inc
31 31
diff --git a/etc/profile-m-z/microsoft-edge-dev.profile b/etc/profile-m-z/microsoft-edge-dev.profile
new file mode 100644
index 000000000..039cd36a8
--- /dev/null
+++ b/etc/profile-m-z/microsoft-edge-dev.profile
@@ -0,0 +1,20 @@
1# Firejail profile for Microsoft Edge Dev
2# Description: Web browser from Microsoft,dev channel
3# This file is overwritten after every install/update
4# Persistent local customizations
5include microsoft-edge-dev.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.cache/microsoft-edge-dev
10noblacklist ${HOME}/.config/microsoft-edge-dev
11
12mkdir ${HOME}/.cache/microsoft-edge-dev
13mkdir ${HOME}/.config/microsoft-edge-dev
14whitelist ${HOME}/.cache/microsoft-edge-dev
15whitelist ${HOME}/.config/microsoft-edge-dev
16
17private-opt microsoft
18
19# Redirect
20include chromium-common.profile
diff --git a/etc/profile-m-z/microsoft-edge.profile b/etc/profile-m-z/microsoft-edge.profile
new file mode 100644
index 000000000..f427507d1
--- /dev/null
+++ b/etc/profile-m-z/microsoft-edge.profile
@@ -0,0 +1,11 @@
1# Firejail profile for Microsoft Edge
2# Description: Web browser from Microsoft
3# This file is overwritten after every install/update
4# Persistent local customizations
5include microsoft-edge.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# Redirect
11include microsoft-edge-dev.profile
diff --git a/etc/profile-m-z/min.profile b/etc/profile-m-z/min.profile
index be85fdbc4..7f3aeab44 100644
--- a/etc/profile-m-z/min.profile
+++ b/etc/profile-m-z/min.profile
@@ -6,8 +6,6 @@ include min.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9nowhitelist /usr/share/chromium
10
11noblacklist ${HOME}/.config/Min 9noblacklist ${HOME}/.config/Min
12 10
13mkdir ${HOME}/.config/Min 11mkdir ${HOME}/.config/Min
diff --git a/etc/profile-m-z/minitube.profile b/etc/profile-m-z/minitube.profile
index 39ecc7127..78ef5e398 100644
--- a/etc/profile-m-z/minitube.profile
+++ b/etc/profile-m-z/minitube.profile
@@ -19,7 +19,7 @@ include disable-exec.inc
19include disable-interpreters.inc 19include disable-interpreters.inc
20include disable-passwdmgr.inc 20include disable-passwdmgr.inc
21include disable-programs.inc 21include disable-programs.inc
22include disable-shell.inc 22include disable-shell.inc
23include disable-xdg.inc 23include disable-xdg.inc
24 24
25mkdir ${HOME}/.cache/Flavio Tordini 25mkdir ${HOME}/.cache/Flavio Tordini
@@ -30,8 +30,8 @@ whitelist ${HOME}/.cache/Flavio Tordini
30whitelist ${HOME}/.config/Flavio Tordini 30whitelist ${HOME}/.config/Flavio Tordini
31whitelist ${HOME}/.local/share/Flavio Tordini 31whitelist ${HOME}/.local/share/Flavio Tordini
32whitelist /usr/share/minitube 32whitelist /usr/share/minitube
33include whitelist-common.inc 33include whitelist-common.inc
34include whitelist-runuser-common.inc 34include whitelist-runuser-common.inc
35include whitelist-usr-share-common.inc 35include whitelist-usr-share-common.inc
36include whitelist-var-common.inc 36include whitelist-var-common.inc
37 37
diff --git a/etc/profile-m-z/mirage.profile b/etc/profile-m-z/mirage.profile
index 4a5f12aec..7130267e8 100644
--- a/etc/profile-m-z/mirage.profile
+++ b/etc/profile-m-z/mirage.profile
@@ -1,5 +1,5 @@
1# Firejail profile for mirage 1# Firejail profile for mirage
2# Description: Desktop client for Matrix 2# Description: Desktop client for Matrix
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4# Persistent local customizations 4# Persistent local customizations
5include mirage.local 5include mirage.local
@@ -9,6 +9,7 @@ include globals.local
9noblacklist ${HOME}/.cache/mirage 9noblacklist ${HOME}/.cache/mirage
10noblacklist ${HOME}/.config/mirage 10noblacklist ${HOME}/.config/mirage
11noblacklist ${HOME}/.local/share/mirage 11noblacklist ${HOME}/.local/share/mirage
12noblacklist /sbin
12 13
13include allow-python2.inc 14include allow-python2.inc
14include allow-python3.inc 15include allow-python3.inc
@@ -30,7 +31,7 @@ whitelist ${HOME}/.config/mirage
30whitelist ${HOME}/.local/share/mirage 31whitelist ${HOME}/.local/share/mirage
31whitelist ${DOWNLOADS} 32whitelist ${DOWNLOADS}
32include whitelist-common.inc 33include whitelist-common.inc
33include whitelist-runuser-common.inc 34include whitelist-runuser-common.inc
34include whitelist-usr-share-common.inc 35include whitelist-usr-share-common.inc
35include whitelist-var-common.inc 36include whitelist-var-common.inc
36 37
@@ -49,7 +50,7 @@ shell none
49tracelog 50tracelog
50 51
51disable-mnt 52disable-mnt
52private-bin mirage 53private-bin ldconfig,mirage
53private-cache 54private-cache
54private-dev 55private-dev
55private-etc alsa,alternatives,asound.conf,ca-certificates,crypto-policies,fonts,gtk-2.0,gtk-3.0,host.conf,hostname,hosts,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,locale,locale.alias,locale.conf,mime.types,nsswitch.conf,pki,pulse,resolv.conf,selinux,ssl,X11,xdg 56private-etc alsa,alternatives,asound.conf,ca-certificates,crypto-policies,fonts,gtk-2.0,gtk-3.0,host.conf,hostname,hosts,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,locale,locale.alias,locale.conf,mime.types,nsswitch.conf,pki,pulse,resolv.conf,selinux,ssl,X11,xdg
diff --git a/etc/profile-m-z/mtpaint.profile b/etc/profile-m-z/mtpaint.profile
index cfd00e8ae..9f1f0f53d 100644
--- a/etc/profile-m-z/mtpaint.profile
+++ b/etc/profile-m-z/mtpaint.profile
@@ -10,14 +10,14 @@ noblacklist ${PICTURES}
10 10
11include disable-common.inc 11include disable-common.inc
12include disable-devel.inc 12include disable-devel.inc
13include disable-exec.inc 13include disable-exec.inc
14include disable-interpreters.inc 14include disable-interpreters.inc
15include disable-passwdmgr.inc 15include disable-passwdmgr.inc
16include disable-programs.inc 16include disable-programs.inc
17include disable-shell.inc 17include disable-shell.inc
18include disable-xdg.inc 18include disable-xdg.inc
19 19
20include whitelist-runuser-common.inc 20include whitelist-runuser-common.inc
21include whitelist-usr-share-common.inc 21include whitelist-usr-share-common.inc
22include whitelist-var-common.inc 22include whitelist-var-common.inc
23 23
diff --git a/etc/profile-m-z/musictube.profile b/etc/profile-m-z/musictube.profile
index 955df698d..dbfd12619 100644
--- a/etc/profile-m-z/musictube.profile
+++ b/etc/profile-m-z/musictube.profile
@@ -1,5 +1,5 @@
1# Firejail profile for musictube 1# Firejail profile for musictube
2# Description: Stream music 2# Description: Stream music
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4# Persistent local customizations 4# Persistent local customizations
5include musictube.local 5include musictube.local
@@ -16,7 +16,7 @@ include disable-exec.inc
16include disable-interpreters.inc 16include disable-interpreters.inc
17include disable-passwdmgr.inc 17include disable-passwdmgr.inc
18include disable-programs.inc 18include disable-programs.inc
19include disable-shell.inc 19include disable-shell.inc
20include disable-xdg.inc 20include disable-xdg.inc
21 21
22mkdir ${HOME}/.cache/Flavio Tordini 22mkdir ${HOME}/.cache/Flavio Tordini
@@ -26,8 +26,8 @@ whitelist ${HOME}/.cache/Flavio Tordini
26whitelist ${HOME}/.config/Flavio Tordini 26whitelist ${HOME}/.config/Flavio Tordini
27whitelist ${HOME}/.local/share/Flavio Tordini 27whitelist ${HOME}/.local/share/Flavio Tordini
28whitelist /usr/share/musictube 28whitelist /usr/share/musictube
29include whitelist-common.inc 29include whitelist-common.inc
30include whitelist-runuser-common.inc 30include whitelist-runuser-common.inc
31include whitelist-usr-share-common.inc 31include whitelist-usr-share-common.inc
32include whitelist-var-common.inc 32include whitelist-var-common.inc
33 33
diff --git a/etc/profile-m-z/nheko.profile b/etc/profile-m-z/nheko.profile
index 701098f4b..42e7e92fc 100644
--- a/etc/profile-m-z/nheko.profile
+++ b/etc/profile-m-z/nheko.profile
@@ -7,7 +7,7 @@ include nheko.local
7include globals.local 7include globals.local
8 8
9noblacklist ${HOME}/.config/nheko 9noblacklist ${HOME}/.config/nheko
10noblacklist ${HOME}/.cache/nheko/nheko 10noblacklist ${HOME}/.cache/nheko
11 11
12include disable-common.inc 12include disable-common.inc
13include disable-devel.inc 13include disable-devel.inc
@@ -16,14 +16,19 @@ include disable-interpreters.inc
16include disable-passwdmgr.inc 16include disable-passwdmgr.inc
17include disable-programs.inc 17include disable-programs.inc
18include disable-shell.inc 18include disable-shell.inc
19include disable-xdg.inc
19 20
20mkdir ${HOME}/.config/nheko 21mkdir ${HOME}/.config/nheko
21mkdir ${HOME}/.cache/nheko/nheko 22mkdir ${HOME}/.cache/nheko/nheko
22whitelist ${HOME}/.config/nheko 23whitelist ${HOME}/.config/nheko
23whitelist ${HOME}/.cache/nheko/nheko 24whitelist ${HOME}/.cache/nheko
24whitelist ${DOWNLOADS} 25whitelist ${DOWNLOADS}
25include whitelist-common.inc 26include whitelist-common.inc
27include whitelist-runuser-common.inc
28include whitelist-usr-share-common.inc
29include whitelist-var-common.inc
26 30
31apparmor
27caps.drop all 32caps.drop all
28netfilter 33netfilter
29nodvd 34nodvd
@@ -38,5 +43,14 @@ tracelog
38 43
39disable-mnt 44disable-mnt
40private-bin nheko 45private-bin nheko
46private-cache
47private-dev
48private-etc alsa,alternatives,asound.conf,ca-certificates,crypto-policies,fonts,gtk-2.0,gtk-3.0,host.conf,hostname,hosts,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,locale,locale.alias,locale.conf,mime.types,nsswitch.conf,pki,pulse,resolv.conf,selinux,ssl,X11,xdg
41private-tmp 49private-tmp
42 50
51dbus-user none
52# Comment the above line and uncomment below lines for notification popups
53# dbus-user filter
54# dbus-user.talk org.freedesktop.Notifications
55# dbus-user.talk org.kde.StatusNotifierWatcher
56dbus-system none
diff --git a/etc/profile-m-z/nuclear.profile b/etc/profile-m-z/nuclear.profile
index 1b97eda9b..886403b9e 100644
--- a/etc/profile-m-z/nuclear.profile
+++ b/etc/profile-m-z/nuclear.profile
@@ -10,31 +10,16 @@ ignore dbus-user
10 10
11noblacklist ${HOME}/.config/nuclear 11noblacklist ${HOME}/.config/nuclear
12 12
13include disable-devel.inc 13include disable-shell.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-shell.inc
17include disable-xdg.inc
18 14
19mkdir ${HOME}/.config/nuclear 15mkdir ${HOME}/.config/nuclear
20whitelist ${HOME}/.config/nuclear 16whitelist ${HOME}/.config/nuclear
21include whitelist-common.inc
22include whitelist-runuser-common.inc
23include whitelist-usr-share-common.inc
24include whitelist-var-common.inc
25 17
26no3d 18no3d
27nou2f
28novideo
29shell none
30 19
31disable-mnt
32# private-bin nuclear 20# private-bin nuclear
33private-cache
34private-dev
35private-etc alsa,alternatives,asound.conf,ca-certificates,crypto-policies,fonts,gtk-2.0,gtk-3.0,host.conf,hostname,hosts,mime.types,nsswitch.conf,pki,pulse,resolv.conf,selinux,ssl,X11,xdg 21private-etc alsa,alternatives,asound.conf,ca-certificates,crypto-policies,fonts,gtk-2.0,gtk-3.0,host.conf,hostname,hosts,mime.types,nsswitch.conf,pki,pulse,resolv.conf,selinux,ssl,X11,xdg
36private-opt nuclear 22private-opt nuclear
37private-tmp
38 23
39# Redirect 24# Redirect
40include electron.profile 25include electron.profile
diff --git a/etc/profile-m-z/onboard.profile b/etc/profile-m-z/onboard.profile
index 3a235a677..f7cb8790b 100644
--- a/etc/profile-m-z/onboard.profile
+++ b/etc/profile-m-z/onboard.profile
@@ -13,7 +13,7 @@ include allow-python3.inc
13 13
14include disable-common.inc 14include disable-common.inc
15include disable-devel.inc 15include disable-devel.inc
16include disable-exec.inc 16include disable-exec.inc
17include disable-interpreters.inc 17include disable-interpreters.inc
18include disable-programs.inc 18include disable-programs.inc
19include disable-passwdmgr.inc 19include disable-passwdmgr.inc
@@ -23,9 +23,9 @@ include disable-xdg.inc
23mkdir ${HOME}/.config/onboard 23mkdir ${HOME}/.config/onboard
24whitelist ${HOME}/.config/onboard 24whitelist ${HOME}/.config/onboard
25whitelist /usr/share/onboard 25whitelist /usr/share/onboard
26include whitelist-common.inc 26include whitelist-common.inc
27include whitelist-usr-share-common.inc 27include whitelist-usr-share-common.inc
28include whitelist-runuser-common.inc 28include whitelist-runuser-common.inc
29include whitelist-var-common.inc 29include whitelist-var-common.inc
30 30
31apparmor 31apparmor
diff --git a/etc/profile-m-z/otter-browser.profile b/etc/profile-m-z/otter-browser.profile
index 652b6b7cb..aa26ddd4e 100644
--- a/etc/profile-m-z/otter-browser.profile
+++ b/etc/profile-m-z/otter-browser.profile
@@ -1,5 +1,5 @@
1# Firejail profile for otter-browser 1# Firejail profile for otter-browser
2# Description: Lightweight web browser based on Qt5 2# Description: Lightweight web browser based on Qt5
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4# Persistent local customizations 4# Persistent local customizations
5include otter-browser.local 5include otter-browser.local
@@ -32,7 +32,7 @@ whitelist ${HOME}/.pki
32whitelist ${HOME}/.local/share/pki 32whitelist ${HOME}/.local/share/pki
33whitelist /usr/share/otter-browser 33whitelist /usr/share/otter-browser
34include whitelist-common.inc 34include whitelist-common.inc
35include whitelist-runuser-common.inc 35include whitelist-runuser-common.inc
36include whitelist-usr-share-common.inc 36include whitelist-usr-share-common.inc
37include whitelist-var-common.inc 37include whitelist-var-common.inc
38 38
@@ -54,6 +54,6 @@ private-bin bash,otter-browser,sh,which
54private-cache 54private-cache
55?BROWSER_DISABLE_U2F: private-dev 55?BROWSER_DISABLE_U2F: private-dev
56private-etc alternatives,asound.conf,ca-certificates,crypto-policies,dconf,fonts,group,gtk-2.0,gtk-3.0,hostname,hosts,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,localtime,machine-id,mailcap,mime.types,nsswitch.conf,pango,passwd,pki,pulse,resolv.conf,selinux,ssl,X11,xdg 56private-etc alternatives,asound.conf,ca-certificates,crypto-policies,dconf,fonts,group,gtk-2.0,gtk-3.0,hostname,hosts,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,localtime,machine-id,mailcap,mime.types,nsswitch.conf,pango,passwd,pki,pulse,resolv.conf,selinux,ssl,X11,xdg
57private-tmp 57private-tmp
58 58
59dbus-system none 59dbus-system none
diff --git a/etc/profile-m-z/photoflare.profile b/etc/profile-m-z/photoflare.profile
index d9df3e3b3..9e6b4a87d 100644
--- a/etc/profile-m-z/photoflare.profile
+++ b/etc/profile-m-z/photoflare.profile
@@ -10,14 +10,14 @@ noblacklist ${PICTURES}
10 10
11include disable-common.inc 11include disable-common.inc
12include disable-devel.inc 12include disable-devel.inc
13include disable-exec.inc 13include disable-exec.inc
14include disable-interpreters.inc 14include disable-interpreters.inc
15include disable-passwdmgr.inc 15include disable-passwdmgr.inc
16include disable-programs.inc 16include disable-programs.inc
17include disable-shell.inc 17include disable-shell.inc
18include disable-xdg.inc 18include disable-xdg.inc
19 19
20include whitelist-runuser-common.inc 20include whitelist-runuser-common.inc
21include whitelist-usr-share-common.inc 21include whitelist-usr-share-common.inc
22include whitelist-var-common.inc 22include whitelist-var-common.inc
23 23
diff --git a/etc/profile-m-z/quaternion.profile b/etc/profile-m-z/quaternion.profile
index 2133c74d3..3041860b3 100644
--- a/etc/profile-m-z/quaternion.profile
+++ b/etc/profile-m-z/quaternion.profile
@@ -1,5 +1,5 @@
1# Firejail profile for quaternion 1# Firejail profile for quaternion
2# Description: Desktop client for Matrix 2# Description: Desktop client for Matrix
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4# Persistent local customizations 4# Persistent local customizations
5include quaternion.local 5include quaternion.local
@@ -25,7 +25,7 @@ whitelist ${HOME}/.config/Quotient
25whitelist ${DOWNLOADS} 25whitelist ${DOWNLOADS}
26whitelist /usr/share/Quotient/quaternion 26whitelist /usr/share/Quotient/quaternion
27include whitelist-common.inc 27include whitelist-common.inc
28include whitelist-runuser-common.inc 28include whitelist-runuser-common.inc
29include whitelist-usr-share-common.inc 29include whitelist-usr-share-common.inc
30include whitelist-var-common.inc 30include whitelist-var-common.inc
31 31
diff --git a/etc/profile-m-z/riot-desktop.profile b/etc/profile-m-z/riot-desktop.profile
index 4372fabe1..e91d25196 100644
--- a/etc/profile-m-z/riot-desktop.profile
+++ b/etc/profile-m-z/riot-desktop.profile
@@ -7,7 +7,5 @@ include riot-desktop.local
7# added by included profile 7# added by included profile
8#include globals.local 8#include globals.local
9 9
10seccomp !chroot
11
12# Redirect 10# Redirect
13include riot-web.profile 11include riot-web.profile
diff --git a/etc/profile-m-z/riot-web.profile b/etc/profile-m-z/riot-web.profile
index b930adf2b..687c943b0 100644
--- a/etc/profile-m-z/riot-web.profile
+++ b/etc/profile-m-z/riot-web.profile
@@ -4,14 +4,15 @@
4# Persistent local customizations 4# Persistent local customizations
5include riot-web.local 5include riot-web.local
6# Persistent global definitions 6# Persistent global definitions
7# added by included profile 7include globals.local
8#include globals.local 8
9ignore noexec /tmp
9 10
10noblacklist ${HOME}/.config/Riot 11noblacklist ${HOME}/.config/Riot
11 12
12mkdir ${HOME}/.config/Riot 13mkdir ${HOME}/.config/Riot
13whitelist ${HOME}/.config/Riot 14whitelist ${HOME}/.config/Riot
14include whitelist-common.inc 15whitelist /usr/share/webapps/element
15 16
16# Redirect 17# Redirect
17include electron.profile 18include electron.profile
diff --git a/etc/profile-m-z/rocketchat.profile b/etc/profile-m-z/rocketchat.profile
index a574e4e8b..8d3607c75 100644
--- a/etc/profile-m-z/rocketchat.profile
+++ b/etc/profile-m-z/rocketchat.profile
@@ -3,14 +3,28 @@
3# Persistent local customizations 3# Persistent local customizations
4include rocketchat.local 4include rocketchat.local
5# Persistent global definitions 5# Persistent global definitions
6# added by included profile 6include globals.local
7#include globals.local 7
8# Disabled until someone reported positive feedback
9ignore include disable-devel.inc
10ignore include disable-exec.inc
11ignore include disable-interpreters.inc
12ignore include disable-xdg.inc
13ignore include whitelist-runuser-common.inc
14ignore include whitelist-usr-share-common.inc
15ignore include whitelist-var-common.inc
16ignore nou2f
17ignore novideo
18ignore shell none
19ignore disable-mnt
20ignore private-cache
21ignore private-dev
22ignore private-tmp
8 23
9noblacklist ${HOME}/.config/Rocket.Chat 24noblacklist ${HOME}/.config/Rocket.Chat
10 25
11mkdir ${HOME}/.config/Rocket.Chat 26mkdir ${HOME}/.config/Rocket.Chat
12whitelist ${HOME}/.config/Rocket.Chat 27whitelist ${HOME}/.config/Rocket.Chat
13include whitelist-common.inc
14 28
15# Redirect 29# Redirect
16include electron.profile 30include electron.profile
diff --git a/etc/profile-m-z/servo.profile b/etc/profile-m-z/servo.profile
new file mode 100644
index 000000000..65da5d0de
--- /dev/null
+++ b/etc/profile-m-z/servo.profile
@@ -0,0 +1,48 @@
1# Firejail profile for servo
2# Description: The Servo Browser Engine
3# This file is overwritten after every install/update
4# Persistent local customizations
5include servo.local
6# Persistent global definitions
7include globals.local
8
9# Servo is usually installed inside $HOME
10ignore noexec ${HOME}
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-xdg.inc
19
20# Add a whitelist for the directory where servo is installed and uncomment the lines below.
21#whitelist ${DOWNLOADS}
22#include whitelist-common.inc
23include whitelist-runuser-common.inc
24include whitelist-usr-share-common.inc
25include whitelist-var-common.inc
26
27caps.drop all
28netfilter
29nodvd
30nogroups
31nonewprivs
32noroot
33notv
34nou2f
35novideo
36protocol unix,inet,inet6
37seccomp
38shell none
39tracelog
40
41disable-mnt
42private-bin servo,sh
43private-cache
44private-dev
45private-tmp
46
47dbus-user none
48dbus-system none
diff --git a/etc/profile-m-z/signal-desktop.profile b/etc/profile-m-z/signal-desktop.profile
index c28571270..08e1c1f03 100644
--- a/etc/profile-m-z/signal-desktop.profile
+++ b/etc/profile-m-z/signal-desktop.profile
@@ -5,6 +5,13 @@ include signal-desktop.local
5# Persistent global definitions 5# Persistent global definitions
6include globals.local 6include globals.local
7 7
8# Disabled until someone reported positive feedback
9ignore include-xdg.inc
10ignore include whitelist-runuser-common.inc
11ignore include whitelist-usr-share-common.inc
12ignore private-cache
13ignore novideo
14
8ignore noexec /tmp 15ignore noexec /tmp
9 16
10noblacklist ${HOME}/.config/Signal 17noblacklist ${HOME}/.config/Signal
@@ -14,32 +21,12 @@ noblacklist ${HOME}/.mozilla
14whitelist ${HOME}/.mozilla/firefox/profiles.ini 21whitelist ${HOME}/.mozilla/firefox/profiles.ini
15read-only ${HOME}/.mozilla/firefox/profiles.ini 22read-only ${HOME}/.mozilla/firefox/profiles.ini
16 23
17include disable-common.inc
18include disable-devel.inc
19include disable-exec.inc 24include disable-exec.inc
20include disable-interpreters.inc
21include disable-programs.inc
22include disable-passwdmgr.inc
23 25
24mkdir ${HOME}/.config/Signal 26mkdir ${HOME}/.config/Signal
25whitelist ${DOWNLOADS}
26whitelist ${HOME}/.config/Signal 27whitelist ${HOME}/.config/Signal
27include whitelist-common.inc 28
28include whitelist-var-common.inc
29
30apparmor
31caps.keep sys_admin,sys_chroot
32netfilter
33nodvd
34nogroups
35notv
36nou2f
37shell none
38
39disable-mnt
40private-dev
41private-etc alternatives,ca-certificates,crypto-policies,fonts,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,machine-id,nsswitch.conf,pki,resolv.conf,ssl 29private-etc alternatives,ca-certificates,crypto-policies,fonts,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,machine-id,nsswitch.conf,pki,resolv.conf,ssl
42private-tmp
43 30
44dbus-user none 31# Redirect
45dbus-system none 32include electron.profile
diff --git a/etc/profile-m-z/skypeforlinux.profile b/etc/profile-m-z/skypeforlinux.profile
index 341c25a95..b39763981 100644
--- a/etc/profile-m-z/skypeforlinux.profile
+++ b/etc/profile-m-z/skypeforlinux.profile
@@ -5,27 +5,24 @@ include skypeforlinux.local
5# Persistent global definitions 5# Persistent global definitions
6include globals.local 6include globals.local
7 7
8# Disabled until someone reported positive feedback
9ignore whitelist ${DOWNLOADS}
10ignore include whitelist-common.inc
11ignore include whitelist-runuser-common.inc
12ignore include whitelist-usr-share-common.inc
13ignore include whitelist-var-common.inc
14ignore nou2f
15ignore novideo
16ignore private-dev
17ignore dbus-user none
18ignore dbus-system none
19
8# breaks Skype 20# breaks Skype
9ignore noexec /tmp 21ignore noexec /tmp
10 22
11noblacklist ${HOME}/.config/skypeforlinux 23noblacklist ${HOME}/.config/skypeforlinux
12 24
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19include disable-xdg.inc
20
21caps.keep sys_admin,sys_chroot
22netfilter
23nodvd
24nogroups
25notv
26shell none
27
28disable-mnt
29private-cache
30# private-dev - needs /dev/disk 25# private-dev - needs /dev/disk
31private-tmp 26
27# Redirect
28include electron.profile
diff --git a/etc/profile-m-z/slack.profile b/etc/profile-m-z/slack.profile
index 8ab3edd63..9ad772cd5 100644
--- a/etc/profile-m-z/slack.profile
+++ b/etc/profile-m-z/slack.profile
@@ -5,31 +5,26 @@ include slack.local
5# Persistent global definitions 5# Persistent global definitions
6include globals.local 6include globals.local
7 7
8# Disabled until someone reported positive feedback
9ignore include disable-exec.inc
10ignore include disable-xdg.inc
11ignore include whitelist-runuser-common.inc
12ignore include whitelist-usr-share-common.inc
13ignore apparmor
14ignore novideo
15ignore private-tmp
16ignore dbus-user none
17ignore dbus-system none
18
8noblacklist ${HOME}/.config/Slack 19noblacklist ${HOME}/.config/Slack
9 20
10include disable-common.inc
11include disable-devel.inc
12include disable-interpreters.inc
13include disable-passwdmgr.inc
14include disable-programs.inc
15include disable-shell.inc 21include disable-shell.inc
16 22
17mkdir ${HOME}/.config/Slack 23mkdir ${HOME}/.config/Slack
18whitelist ${HOME}/.config/Slack 24whitelist ${HOME}/.config/Slack
19whitelist ${DOWNLOADS}
20include whitelist-common.inc
21include whitelist-var-common.inc
22
23caps.keep sys_admin,sys_chroot
24netfilter
25nodvd
26nogroups
27notv
28nou2f
29shell none
30 25
31disable-mnt
32private-bin locale,slack 26private-bin locale,slack
33private-cache
34private-dev
35private-etc alternatives,asound.conf,ca-certificates,crypto-policies,debian_version,fedora-release,fonts,group,ld.so.cache,ld.so.conf,localtime,machine-id,os-release,passwd,pki,pulse,redhat-release,resolv.conf,ssl,system-release,system-release-cpe 27private-etc alternatives,asound.conf,ca-certificates,crypto-policies,debian_version,fedora-release,fonts,group,ld.so.cache,ld.so.conf,localtime,machine-id,os-release,passwd,pki,pulse,redhat-release,resolv.conf,ssl,system-release,system-release-cpe
28
29# Redirect
30include electron.profile
diff --git a/etc/profile-m-z/spectral.profile b/etc/profile-m-z/spectral.profile
index d7f94e144..093661d8c 100644
--- a/etc/profile-m-z/spectral.profile
+++ b/etc/profile-m-z/spectral.profile
@@ -1,5 +1,5 @@
1# Firejail profile for spectral 1# Firejail profile for spectral
2# Description: Desktop client for Matrix 2# Description: Desktop client for Matrix
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4# Persistent local customizations 4# Persistent local customizations
5include spectral.local 5include spectral.local
@@ -24,7 +24,7 @@ whitelist ${HOME}/.cache/ENCOM/Spectral
24whitelist ${HOME}/.config/ENCOM 24whitelist ${HOME}/.config/ENCOM
25whitelist ${DOWNLOADS} 25whitelist ${DOWNLOADS}
26include whitelist-common.inc 26include whitelist-common.inc
27include whitelist-runuser-common.inc 27include whitelist-runuser-common.inc
28include whitelist-usr-share-common.inc 28include whitelist-usr-share-common.inc
29include whitelist-var-common.inc 29include whitelist-var-common.inc
30 30
@@ -50,4 +50,8 @@ private-etc alsa,alternatives,asound.conf,ca-certificates,crypto-policies,fonts,
50private-tmp 50private-tmp
51 51
52dbus-user none 52dbus-user none
53# Comment the above line and uncomment below lines for notification popups
54# dbus-user filter
55# dbus-user.talk org.freedesktop.Notifications
56# dbus-user.talk org.kde.StatusNotifierWatcher
53dbus-system none 57dbus-system none
diff --git a/etc/profile-m-z/ssh.profile b/etc/profile-m-z/ssh.profile
index 78b12c2cb..d873a5672 100644
--- a/etc/profile-m-z/ssh.profile
+++ b/etc/profile-m-z/ssh.profile
@@ -34,7 +34,7 @@ nonewprivs
34# noroot - see issue #1543 34# noroot - see issue #1543
35nosound 35nosound
36notv 36notv
37# nou2f - OpenSSH >= 8.2 supports U2F 37# nou2f - OpenSSH >= 8.2 supports U2F
38novideo 38novideo
39protocol unix,inet,inet6 39protocol unix,inet,inet6
40seccomp 40seccomp
diff --git a/etc/profile-m-z/strawberry.profile b/etc/profile-m-z/strawberry.profile
index cd36c0d41..0801add28 100644
--- a/etc/profile-m-z/strawberry.profile
+++ b/etc/profile-m-z/strawberry.profile
@@ -21,7 +21,7 @@ include disable-xdg.inc
21 21
22include whitelist-runuser-common.inc 22include whitelist-runuser-common.inc
23include whitelist-usr-share-common.inc 23include whitelist-usr-share-common.inc
24include whitelist-var-common.inc 24include whitelist-var-common.inc
25 25
26apparmor 26apparmor
27caps.drop all 27caps.drop all
diff --git a/etc/profile-m-z/tar.profile b/etc/profile-m-z/tar.profile
index 5233f5e4e..f6efb0feb 100644
--- a/etc/profile-m-z/tar.profile
+++ b/etc/profile-m-z/tar.profile
@@ -13,9 +13,7 @@ noblacklist /var/lib/pacman
13ignore include disable-shell.inc 13ignore include disable-shell.inc
14include archiver-common.inc 14include archiver-common.inc
15 15
16# support compressed archives
17private-bin awk,bash,bzip2,compress,firejail,grep,gtar,gzip,lbzip2,lzip,lzma,lzop,sh,tar,xz
18private-etc alternatives,group,localtime,login.defs,passwd 16private-etc alternatives,group,localtime,login.defs,passwd
19private-lib libfakeroot,liblzma.so.*,libreadline.so.* 17#private-lib libfakeroot,liblzma.so.*,libreadline.so.*
20# Debian based distributions need this for 'dpkg --unpack' (incl. synaptic) 18# Debian based distributions need this for 'dpkg --unpack' (incl. synaptic)
21writable-var 19writable-var
diff --git a/etc/profile-m-z/teams-for-linux.profile b/etc/profile-m-z/teams-for-linux.profile
index a13c92bc3..eee083332 100644
--- a/etc/profile-m-z/teams-for-linux.profile
+++ b/etc/profile-m-z/teams-for-linux.profile
@@ -4,33 +4,23 @@
4# Persistent local customizations 4# Persistent local customizations
5include teams-for-linux.local 5include teams-for-linux.local
6# Persistent global definitions 6# Persistent global definitions
7# added by included profile 7include globals.local
8#include globals.local 8
9# Disabled until someone reported positive feedback
10ignore include disable-xdg.inc
11ignore include whitelist-runuser-common.inc
12ignore include whitelist-usr-share-common.inc
9 13
10ignore dbus-user none 14ignore dbus-user none
11ignore dbus-system none 15ignore dbus-system none
12 16
13noblacklist ${HOME}/.config/teams-for-linux 17noblacklist ${HOME}/.config/teams-for-linux
14 18
15include disable-devel.inc
16include disable-exec.inc
17include disable-interpreters.inc
18
19mkdir ${HOME}/.config/teams-for-linux 19mkdir ${HOME}/.config/teams-for-linux
20whitelist ${HOME}/.config/teams-for-linux 20whitelist ${HOME}/.config/teams-for-linux
21include whitelist-common.inc
22include whitelist-var-common.inc
23
24nou2f
25novideo
26shell none
27 21
28disable-mnt
29private-bin bash,cut,echo,egrep,grep,head,sed,sh,teams-for-linux,tr,xdg-mime,xdg-open,zsh 22private-bin bash,cut,echo,egrep,grep,head,sed,sh,teams-for-linux,tr,xdg-mime,xdg-open,zsh
30private-cache
31private-dev
32private-etc ca-certificates,crypto-policies,fonts,ld.so.cache,localtime,machine-id,pki,resolv.conf,ssl 23private-etc ca-certificates,crypto-policies,fonts,ld.so.cache,localtime,machine-id,pki,resolv.conf,ssl
33private-tmp
34 24
35# Redirect 25# Redirect
36include electron.profile 26include electron.profile
diff --git a/etc/profile-m-z/teams.profile b/etc/profile-m-z/teams.profile
index af1365571..c8d98cbaa 100644
--- a/etc/profile-m-z/teams.profile
+++ b/etc/profile-m-z/teams.profile
@@ -4,8 +4,14 @@
4# Persistent local customizations 4# Persistent local customizations
5include teams.local 5include teams.local
6# Persistent global definitions 6# Persistent global definitions
7# added by included profile 7include globals.local
8#include globals.local 8
9# Disabled until someone reported positive feedback
10ignore include disable-xdg.inc
11ignore include whitelist-runuser-common.inc
12ignore include whitelist-usr-share-common.inc
13ignore novideo
14ignore private-tmp
9 15
10# see #3404 16# see #3404
11ignore apparmor 17ignore apparmor
@@ -15,24 +21,10 @@ ignore dbus-system none
15noblacklist ${HOME}/.config/teams 21noblacklist ${HOME}/.config/teams
16noblacklist ${HOME}/.config/Microsoft 22noblacklist ${HOME}/.config/Microsoft
17 23
18include disable-devel.inc
19include disable-exec.inc
20include disable-interpreters.inc
21
22mkdir ${HOME}/.config/teams 24mkdir ${HOME}/.config/teams
23mkdir ${HOME}/.config/Microsoft 25mkdir ${HOME}/.config/Microsoft
24whitelist ${HOME}/.config/teams 26whitelist ${HOME}/.config/teams
25whitelist ${HOME}/.config/Microsoft 27whitelist ${HOME}/.config/Microsoft
26include whitelist-common.inc
27include whitelist-var-common.inc
28
29nou2f
30seccomp !chroot
31shell none
32
33disable-mnt
34private-cache
35private-dev
36 28
37# Redirect 29# Redirect
38include electron.profile 30include electron.profile
diff --git a/etc/profile-m-z/twitch.profile b/etc/profile-m-z/twitch.profile
index 3c50344f1..2f573c872 100644
--- a/etc/profile-m-z/twitch.profile
+++ b/etc/profile-m-z/twitch.profile
@@ -6,31 +6,20 @@ include twitch.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9# Disabled until someone reported positive feedback
10ignore nou2f
11ignore novideo
12
9noblacklist ${HOME}/.config/Twitch 13noblacklist ${HOME}/.config/Twitch
10 14
11include disable-devel.inc 15include disable-shell.inc
12include disable-exec.inc
13include disable-interpreters.inc
14include disable-shell.inc
15include disable-xdg.inc
16 16
17mkdir ${HOME}/.config/Twitch 17mkdir ${HOME}/.config/Twitch
18whitelist ${HOME}/.config/Twitch 18whitelist ${HOME}/.config/Twitch
19include whitelist-common.inc
20include whitelist-runuser-common.inc
21include whitelist-usr-share-common.inc
22include whitelist-var-common.inc
23
24seccomp !chroot
25shell none
26 19
27disable-mnt
28private-bin twitch 20private-bin twitch
29private-cache
30private-dev
31private-etc alsa,alternatives,asound.conf,ati,bumblebee,ca-certificates,crypto-policies,drirc,fonts,gtk-2.0,gtk-3.0,host.conf,hostname,hosts,mime.types,nsswitch.conf,nvidia,pki,pulse,resolv.conf,selinux,ssl,X11,xdg 21private-etc alsa,alternatives,asound.conf,ati,bumblebee,ca-certificates,crypto-policies,drirc,fonts,gtk-2.0,gtk-3.0,host.conf,hostname,hosts,mime.types,nsswitch.conf,nvidia,pki,pulse,resolv.conf,selinux,ssl,X11,xdg
32private-opt Twitch 22private-opt Twitch
33private-tmp
34 23
35# Redirect 24# Redirect
36include electron.profile 25include electron.profile
diff --git a/etc/profile-m-z/unzip.profile b/etc/profile-m-z/unzip.profile
index be480923e..8da9ea820 100644
--- a/etc/profile-m-z/unzip.profile
+++ b/etc/profile-m-z/unzip.profile
@@ -10,8 +10,6 @@ include globals.local
10# GNOME Shell integration (chrome-gnome-shell) 10# GNOME Shell integration (chrome-gnome-shell)
11noblacklist ${HOME}/.local/share/gnome-shell 11noblacklist ${HOME}/.local/share/gnome-shell
12 12
13noroot
14include archiver-common.inc 13include archiver-common.inc
15 14
16private-bin unzip
17private-etc alternatives,group,localtime,passwd 15private-etc alternatives,group,localtime,passwd
diff --git a/etc/profile-m-z/whalebird.profile b/etc/profile-m-z/whalebird.profile
index 187c49ed8..22a84274d 100644
--- a/etc/profile-m-z/whalebird.profile
+++ b/etc/profile-m-z/whalebird.profile
@@ -4,36 +4,24 @@
4# Persistent local customizations 4# Persistent local customizations
5include whalebird.local 5include whalebird.local
6# Persistent global definitions 6# Persistent global definitions
7# added by included profile 7include globals.local
8#include globals.local 8
9# Disabled until someone reported positive feedback
10ignore include whitelist-runuser-common.inc
11ignore include whitelist-usr-share-common.inc
9 12
10ignore dbus-user none 13ignore dbus-user none
11ignore dbus-system none 14ignore dbus-system none
12 15
13noblacklist ${HOME}/.config/Whalebird 16noblacklist ${HOME}/.config/Whalebird
14 17
15include disable-devel.inc
16include disable-exec.inc
17include disable-interpreters.inc
18include disable-xdg.inc
19
20mkdir ${HOME}/.config/Whalebird 18mkdir ${HOME}/.config/Whalebird
21whitelist ${HOME}/.config/Whalebird 19whitelist ${HOME}/.config/Whalebird
22include whitelist-common.inc
23include whitelist-var-common.inc
24 20
25no3d 21no3d
26nou2f
27novideo
28protocol unix,inet,inet6
29shell none
30 22
31disable-mnt
32private-bin whalebird 23private-bin whalebird
33private-cache
34private-dev
35private-etc fonts,machine-id 24private-etc fonts,machine-id
36private-tmp
37 25
38# Redirect 26# Redirect
39include electron.profile 27include electron.profile
diff --git a/etc/profile-m-z/wire-desktop.profile b/etc/profile-m-z/wire-desktop.profile
index d265c6bae..151cd2adb 100644
--- a/etc/profile-m-z/wire-desktop.profile
+++ b/etc/profile-m-z/wire-desktop.profile
@@ -4,33 +4,29 @@
4# Persistent local customizations 4# Persistent local customizations
5include wire-desktop.local 5include wire-desktop.local
6# Persistent global definitions 6# Persistent global definitions
7# added by included profile 7include globals.local
8#include globals.local
9 8
10# Debian/Ubuntu use /opt/Wire. As that is not in PATH by default, run `firejail /opt/Wire/wire-desktop` to start it. 9# Debian/Ubuntu use /opt/Wire. As that is not in PATH by default, run `firejail /opt/Wire/wire-desktop` to start it.
11 10
11# Disabled until someone reported positive feedback
12ignore include disable-exec.inc
13ignore include disable-xdg.inc
14ignore include whitelist-runuser-common.inc
15ignore include whitelist-usr-share-common.inc
16ignore include whitelist-var-common.inc
17ignore novideo
18ignore private-cache
19
12ignore dbus-user none 20ignore dbus-user none
13ignore dbus-system none 21ignore dbus-system none
14 22
15noblacklist ${HOME}/.config/Wire 23noblacklist ${HOME}/.config/Wire
16 24
17include disable-devel.inc
18include disable-interpreters.inc
19
20mkdir ${HOME}/.config/Wire 25mkdir ${HOME}/.config/Wire
21whitelist ${HOME}/.config/Wire 26whitelist ${HOME}/.config/Wire
22include whitelist-common.inc
23
24nou2f
25ignore seccomp
26seccomp !chroot
27shell none
28 27
29disable-mnt
30private-bin bash,electron,electron[0-9],electron[0-9][0-9],env,sh,wire-desktop 28private-bin bash,electron,electron[0-9],electron[0-9][0-9],env,sh,wire-desktop
31private-dev
32private-etc alternatives,ca-certificates,crypto-policies,fonts,machine-id,pki,resolv.conf,ssl 29private-etc alternatives,ca-certificates,crypto-policies,fonts,machine-id,pki,resolv.conf,ssl
33private-tmp
34 30
35# Redirect 31# Redirect
36include electron.profile 32include electron.profile
diff --git a/etc/profile-m-z/youtube.profile b/etc/profile-m-z/youtube.profile
index a6c7750a9..ad7ceaee4 100644
--- a/etc/profile-m-z/youtube.profile
+++ b/etc/profile-m-z/youtube.profile
@@ -6,32 +6,19 @@ include youtube.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9# Disabled until someone reported positive feedback
10ignore nou2f
11
9noblacklist ${HOME}/.config/Youtube 12noblacklist ${HOME}/.config/Youtube
10 13
11include disable-devel.inc 14include disable-shell.inc
12include disable-exec.inc
13include disable-interpreters.inc
14include disable-shell.inc
15include disable-xdg.inc
16 15
17mkdir ${HOME}/.config/Youtube 16mkdir ${HOME}/.config/Youtube
18whitelist ${HOME}/.config/Youtube 17whitelist ${HOME}/.config/Youtube
19include whitelist-common.inc
20include whitelist-runuser-common.inc
21include whitelist-usr-share-common.inc
22include whitelist-var-common.inc
23
24novideo
25seccomp !chroot
26shell none
27 18
28disable-mnt
29private-bin youtube 19private-bin youtube
30private-cache
31private-dev
32private-etc alsa,alternatives,asound.conf,ati,bumblebee,ca-certificates,crypto-policies,drirc,fonts,gtk-2.0,gtk-3.0,host.conf,hostname,hosts,mime.types,nsswitch.conf,nvidia,pki,pulse,resolv.conf,selinux,ssl,X11,xdg 20private-etc alsa,alternatives,asound.conf,ati,bumblebee,ca-certificates,crypto-policies,drirc,fonts,gtk-2.0,gtk-3.0,host.conf,hostname,hosts,mime.types,nsswitch.conf,nvidia,pki,pulse,resolv.conf,selinux,ssl,X11,xdg
33private-opt Youtube 21private-opt Youtube
34private-tmp
35 22
36# Redirect 23# Redirect
37include electron.profile 24include electron.profile
diff --git a/etc/profile-m-z/youtubemusic-nativefier.profile b/etc/profile-m-z/youtubemusic-nativefier.profile
index 3a94a5707..74b0e38b9 100644
--- a/etc/profile-m-z/youtubemusic-nativefier.profile
+++ b/etc/profile-m-z/youtubemusic-nativefier.profile
@@ -8,31 +8,14 @@ include globals.local
8 8
9noblacklist ${HOME}/.config/youtubemusic-nativefier-040164 9noblacklist ${HOME}/.config/youtubemusic-nativefier-040164
10 10
11include disable-devel.inc 11include disable-shell.inc
12include disable-exec.inc
13include disable-interpreters.inc
14include disable-shell.inc
15include disable-xdg.inc
16 12
17mkdir ${HOME}/.config/youtubemusic-nativefier-040164 13mkdir ${HOME}/.config/youtubemusic-nativefier-040164
18whitelist ${HOME}/.config/youtubemusic-nativefier-040164 14whitelist ${HOME}/.config/youtubemusic-nativefier-040164
19include whitelist-common.inc
20include whitelist-runuser-common.inc
21include whitelist-usr-share-common.inc
22include whitelist-var-common.inc
23 15
24nou2f
25novideo
26seccomp !chroot
27shell none
28
29disable-mnt
30private-bin youtubemusic-nativefier 16private-bin youtubemusic-nativefier
31private-cache
32private-dev
33private-etc alsa,alternatives,asound.conf,ati,bumblebee,ca-certificates,crypto-policies,drirc,fonts,gtk-2.0,gtk-3.0,host.conf,hostname,hosts,mime.types,nsswitch.conf,nvidia,pki,pulse,resolv.conf,selinux,ssl,X11,xdg 17private-etc alsa,alternatives,asound.conf,ati,bumblebee,ca-certificates,crypto-policies,drirc,fonts,gtk-2.0,gtk-3.0,host.conf,hostname,hosts,mime.types,nsswitch.conf,nvidia,pki,pulse,resolv.conf,selinux,ssl,X11,xdg
34private-opt youtubemusic-nativefier 18private-opt youtubemusic-nativefier
35private-tmp
36 19
37# Redirect 20# Redirect
38include electron.profile 21include electron.profile
diff --git a/etc/profile-m-z/ytmdesktop.profile b/etc/profile-m-z/ytmdesktop.profile
index 5c37b838b..ab46fccc2 100644
--- a/etc/profile-m-z/ytmdesktop.profile
+++ b/etc/profile-m-z/ytmdesktop.profile
@@ -10,30 +10,12 @@ ignore dbus-user none
10 10
11noblacklist ${HOME}/.config/youtube-music-desktop-app 11noblacklist ${HOME}/.config/youtube-music-desktop-app
12 12
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-xdg.inc
17
18mkdir ${HOME}/.config/youtube-music-desktop-app 13mkdir ${HOME}/.config/youtube-music-desktop-app
19whitelist ${HOME}/.config/youtube-music-desktop-app 14whitelist ${HOME}/.config/youtube-music-desktop-app
20include whitelist-common.inc
21include whitelist-runuser-common.inc
22include whitelist-usr-share-common.inc
23include whitelist-var-common.inc
24
25nou2f
26novideo
27seccomp !chroot
28shell none
29 15
30disable-mnt
31# private-bin env,ytmdesktop 16# private-bin env,ytmdesktop
32private-cache
33private-dev
34private-etc alsa,alternatives,asound.conf,ati,bumblebee,ca-certificates,crypto-policies,drirc,fonts,gtk-2.0,gtk-3.0,host.conf,hostname,hosts,mime.types,nsswitch.conf,nvidia,pki,pulse,resolv.conf,selinux,ssl,X11,xdg 17private-etc alsa,alternatives,asound.conf,ati,bumblebee,ca-certificates,crypto-policies,drirc,fonts,gtk-2.0,gtk-3.0,host.conf,hostname,hosts,mime.types,nsswitch.conf,nvidia,pki,pulse,resolv.conf,selinux,ssl,X11,xdg
35# private-opt 18# private-opt
36private-tmp
37 19
38# Redirect 20# Redirect
39include electron.profile 21include electron.profile
diff --git a/etc/profile-m-z/zoom.profile b/etc/profile-m-z/zoom.profile
index 889e8c02e..e8cd64c93 100644
--- a/etc/profile-m-z/zoom.profile
+++ b/etc/profile-m-z/zoom.profile
@@ -6,16 +6,20 @@ include zoom.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9# Disabled until someone reported positive feedback
10ignore apparmor
11ignore novideo
12ignore dbus-user none
13ignore dbus-system none
14
15# nogroups breaks webcam access on non-systemd systems (see #3711).
16# If you use such a system uncomment the line below or put 'ignore nogroups' in your zoom.local
17#ignore nogroups
18
9noblacklist ${HOME}/.config/zoomus.conf 19noblacklist ${HOME}/.config/zoomus.conf
10noblacklist ${HOME}/.zoom 20noblacklist ${HOME}/.zoom
11 21
12include disable-common.inc 22nowhitelist ${DOWNLOADS}
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-xdg.inc
19 23
20mkdir ${HOME}/.cache/zoom 24mkdir ${HOME}/.cache/zoom
21mkfile ${HOME}/.config/zoomus.conf 25mkfile ${HOME}/.config/zoomus.conf
@@ -23,29 +27,9 @@ mkdir ${HOME}/.zoom
23whitelist ${HOME}/.cache/zoom 27whitelist ${HOME}/.cache/zoom
24whitelist ${HOME}/.config/zoomus.conf 28whitelist ${HOME}/.config/zoomus.conf
25whitelist ${HOME}/.zoom 29whitelist ${HOME}/.zoom
26include whitelist-common.inc
27include whitelist-runuser-common.inc
28include whitelist-usr-share-common.inc
29include whitelist-var-common.inc
30 30
31caps.drop all
32netfilter
33nodvd
34# nogroups breaks webcam access on non-systemd systems (see #3711).
35# If you use such a system comment the line below or put 'ignore nogroups' in your zoom.local
36nogroups
37nonewprivs
38noroot
39notv
40nou2f
41protocol unix,inet,inet6,netlink
42seccomp !chroot
43shell none
44tracelog
45
46disable-mnt
47private-cache
48private-dev
49# Disable for now, see https://github.com/netblue30/firejail/issues/3726 31# Disable for now, see https://github.com/netblue30/firejail/issues/3726
50#private-etc alternatives,ca-certificates,crypto-policies,fonts,group,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,machine-id,nsswitch.conf,pki,resolv.conf,ssl 32#private-etc alternatives,ca-certificates,crypto-policies,fonts,group,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,machine-id,nsswitch.conf,pki,resolv.conf,ssl
51private-tmp 33
34# Redirect
35include electron.profile
diff --git a/src/firecfg/firecfg.config b/src/firecfg/firecfg.config
index 3f1591cbd..23b1e364a 100644
--- a/src/firecfg/firecfg.config
+++ b/src/firecfg/firecfg.config
@@ -423,6 +423,7 @@ kwrite
423leafpad 423leafpad
424# less - breaks man 424# less - breaks man
425libreoffice 425libreoffice
426librewolf
426liferea 427liferea
427lightsoff 428lightsoff
428lincity-ng 429lincity-ng
@@ -462,6 +463,7 @@ mate-calculator
462mate-color-select 463mate-color-select
463mate-dictionary 464mate-dictionary
464mathematica 465mathematica
466matrix-mirage
465mattermost-desktop 467mattermost-desktop
466mcabber 468mcabber
467mediainfo 469mediainfo
@@ -473,6 +475,8 @@ mencoder
473mendeleydesktop 475mendeleydesktop
474menulibre 476menulibre
475meteo-qt 477meteo-qt
478microsoft-edge
479microsoft-edge-dev
476midori 480midori
477min 481min
478mindless 482mindless
diff --git a/src/firejail/fs_home.c b/src/firejail/fs_home.c
index af891d61f..8c7c19203 100644
--- a/src/firejail/fs_home.c
+++ b/src/firejail/fs_home.c
@@ -360,43 +360,38 @@ void fs_private(void) {
360 selinux_relabel_path("/root", "/root"); 360 selinux_relabel_path("/root", "/root");
361 fs_logger("tmpfs /root"); 361 fs_logger("tmpfs /root");
362 362
363 if (arg_allusers) { 363 // mask /home
364 if (u != 0) 364 if (!arg_allusers) {
365 // mask user home directory
366 // the directory should be owned by the current user
367 fs_tmpfs(homedir, 1);
368 }
369 else { // mask /home
370 if (arg_debug) 365 if (arg_debug)
371 printf("Mounting a new /home directory\n"); 366 printf("Mounting a new /home directory\n");
372 if (mount("tmpfs", "/home", "tmpfs", MS_NOSUID | MS_NODEV | MS_NOEXEC | MS_STRICTATIME, "mode=755,gid=0") < 0) 367 if (mount("tmpfs", "/home", "tmpfs", MS_NOSUID | MS_NODEV | MS_NOEXEC | MS_STRICTATIME, "mode=755,gid=0") < 0)
373 errExit("mounting /home directory"); 368 errExit("mounting /home directory");
374 selinux_relabel_path("/home", "/home"); 369 selinux_relabel_path("/home", "/home");
375 fs_logger("tmpfs /home"); 370 fs_logger("tmpfs /home");
371 }
376 372
377 if (u != 0) { 373 if (u != 0) {
378 if (strncmp(homedir, "/home/", 6) == 0) { 374 if (!arg_allusers && strncmp(homedir, "/home/", 6) == 0) {
379 // create /home/user 375 // create new empty /home/user directory
380 if (arg_debug) 376 if (arg_debug)
381 printf("Create a new user directory\n"); 377 printf("Create a new user directory\n");
382 if (mkdir(homedir, S_IRWXU) == -1) { 378 if (mkdir(homedir, S_IRWXU) == -1) {
383 if (mkpath_as_root(homedir) == -1) 379 if (mkpath_as_root(homedir) == -1)
384 errExit("mkpath"); 380 errExit("mkpath");
385 if (mkdir(homedir, S_IRWXU) == -1 && errno != EEXIST) 381 if (mkdir(homedir, S_IRWXU) == -1)
386 errExit("mkdir"); 382 errExit("mkdir");
387 }
388 if (chown(homedir, u, g) < 0)
389 errExit("chown");
390
391 selinux_relabel_path(homedir, homedir);
392 fs_logger2("mkdir", homedir);
393 fs_logger2("tmpfs", homedir);
394 } 383 }
395 else 384 if (chown(homedir, u, g) < 0)
396 // mask user home directory 385 errExit("chown");
397 // the directory should be owned by the current user 386
398 fs_tmpfs(homedir, 1); 387 selinux_relabel_path(homedir, homedir);
388 fs_logger2("mkdir", homedir);
389 fs_logger2("tmpfs", homedir);
399 } 390 }
391 else
392 // mask user home directory
393 // the directory should be owned by the current user
394 fs_tmpfs(homedir, 1);
400 } 395 }
401 396
402 skel(homedir, u, g); 397 skel(homedir, u, g);
diff --git a/src/firejail/main.c b/src/firejail/main.c
index 213d5c014..e5d8a4720 100644
--- a/src/firejail/main.c
+++ b/src/firejail/main.c
@@ -867,7 +867,8 @@ char *guess_shell(void) {
867 shell = getenv("SHELL"); 867 shell = getenv("SHELL");
868 if (shell) { 868 if (shell) {
869 invalid_filename(shell, 0); // no globbing 869 invalid_filename(shell, 0); // no globbing
870 if (!is_dir(shell) && strstr(shell, "..") == NULL && stat(shell, &s) == 0 && access(shell, X_OK) == 0) 870 if (!is_dir(shell) && strstr(shell, "..") == NULL && stat(shell, &s) == 0 && access(shell, X_OK) == 0 &&
871 strcmp(shell, PATH_FIREJAIL) != 0)
871 return shell; 872 return shell;
872 } 873 }
873 874
@@ -3029,8 +3030,15 @@ int main(int argc, char **argv, char **envp) {
3029 ptr += strlen(ptr); 3030 ptr += strlen(ptr);
3030 3031
3031 if (!arg_nogroups) { 3032 if (!arg_nogroups) {
3033 // add firejail group
3034 gid_t g = get_group_id("firejail");
3035 if (g) {
3036 sprintf(ptr, "%d %d 1\n", g, g);
3037 ptr += strlen(ptr);
3038 }
3039
3032 // add tty group 3040 // add tty group
3033 gid_t g = get_group_id("tty"); 3041 g = get_group_id("tty");
3034 if (g) { 3042 if (g) {
3035 sprintf(ptr, "%d %d 1\n", g, g); 3043 sprintf(ptr, "%d %d 1\n", g, g);
3036 ptr += strlen(ptr); 3044 ptr += strlen(ptr);
diff --git a/src/firejail/no_sandbox.c b/src/firejail/no_sandbox.c
index 22f36ef07..6c7803602 100644
--- a/src/firejail/no_sandbox.c
+++ b/src/firejail/no_sandbox.c
@@ -204,11 +204,12 @@ void run_no_sandbox(int argc, char **argv) {
204 break; 204 break;
205 } 205 }
206 } 206 }
207 // if shell is /usr/bin/firejail, replace it with /bin/bash 207
208 if (strcmp(cfg.shell, PATH_FIREJAIL) == 0) { 208// if shell is /usr/bin/firejail, replace it with /bin/bash
209 cfg.shell = "/bin/bash"; 209// if (strcmp(cfg.shell, PATH_FIREJAIL) == 0) {
210 prog_index = 0; 210// cfg.shell = "/bin/bash";
211 } 211// prog_index = 0;
212// }
212 213
213 if (prog_index == 0) { 214 if (prog_index == 0) {
214 assert(cfg.command_line == NULL); // runs cfg.shell 215 assert(cfg.command_line == NULL); // runs cfg.shell
diff --git a/src/firejail/profile.c b/src/firejail/profile.c
index ff8b47102..1ee8cdfcb 100644
--- a/src/firejail/profile.c
+++ b/src/firejail/profile.c
@@ -619,6 +619,17 @@ int profile_check_line(char *ptr, int lineno, const char *fname) {
619#endif 619#endif
620 return 0; 620 return 0;
621 } 621 }
622 else if (strncmp(ptr, "netns ", 6) == 0) {
623#ifdef HAVE_NETWORK
624 if (checkcfg(CFG_NETWORK)) {
625 arg_netns = ptr + 6;
626 check_netns(arg_netns);
627 }
628 else
629 warning_feature_disabled("networking");
630#endif
631 return 0;
632 }
622 else if (strcmp(ptr, "net none") == 0) { 633 else if (strcmp(ptr, "net none") == 0) {
623 arg_nonetwork = 1; 634 arg_nonetwork = 1;
624 cfg.bridge0.configured = 0; 635 cfg.bridge0.configured = 0;
@@ -745,6 +756,12 @@ int profile_check_line(char *ptr, int lineno, const char *fname) {
745 fprintf(stderr, "Error: invalid MAC address\n"); 756 fprintf(stderr, "Error: invalid MAC address\n");
746 exit(1); 757 exit(1);
747 } 758 }
759
760 // check multicast address
761 if (br->macsandbox[0] & 1) {
762 fprintf(stderr, "Error: invalid MAC address (multicast)\n");
763 exit(1);
764 }
748 } 765 }
749 else 766 else
750 warning_feature_disabled("networking"); 767 warning_feature_disabled("networking");
diff --git a/src/firejail/pulseaudio.c b/src/firejail/pulseaudio.c
index 84cbb1977..a5c924a70 100644
--- a/src/firejail/pulseaudio.c
+++ b/src/firejail/pulseaudio.c
@@ -31,6 +31,8 @@
31#define O_PATH 010000000 31#define O_PATH 010000000
32#endif 32#endif
33 33
34#define PULSE_CLIENT_SYSCONF "/etc/pulse/client.conf"
35
34// disable pulseaudio socket 36// disable pulseaudio socket
35void pulseaudio_disable(void) { 37void pulseaudio_disable(void) {
36 if (arg_debug) 38 if (arg_debug)
@@ -73,8 +75,8 @@ void pulseaudio_disable(void) {
73 closedir(dir); 75 closedir(dir);
74} 76}
75 77
76static void pulseaudio_set_environment(const char *path) { 78static void pulseaudio_fallback(const char *path) {
77 assert(path); 79 fmessage("Cannot mount tmpfs on %s/.config/pulse\n", cfg.homedir);
78 if (setenv("PULSE_CLIENTCONFIG", path, 1) < 0) 80 if (setenv("PULSE_CLIENTCONFIG", path, 1) < 0)
79 errExit("setenv"); 81 errExit("setenv");
80} 82}
@@ -84,9 +86,9 @@ void pulseaudio_init(void) {
84 struct stat s; 86 struct stat s;
85 87
86 // do we have pulseaudio in the system? 88 // do we have pulseaudio in the system?
87 if (stat("/etc/pulse/client.conf", &s) == -1) { 89 if (stat(PULSE_CLIENT_SYSCONF, &s) == -1) {
88 if (arg_debug) 90 if (arg_debug)
89 printf("/etc/pulse/client.conf not found\n"); 91 printf("%s not found\n", PULSE_CLIENT_SYSCONF);
90 return; 92 return;
91 } 93 }
92 94
@@ -101,7 +103,7 @@ void pulseaudio_init(void) {
101 char *pulsecfg = NULL; 103 char *pulsecfg = NULL;
102 if (asprintf(&pulsecfg, "%s/client.conf", RUN_PULSE_DIR) == -1) 104 if (asprintf(&pulsecfg, "%s/client.conf", RUN_PULSE_DIR) == -1)
103 errExit("asprintf"); 105 errExit("asprintf");
104 if (copy_file("/etc/pulse/client.conf", pulsecfg, -1, -1, 0644)) // root needed 106 if (copy_file(PULSE_CLIENT_SYSCONF, pulsecfg, -1, -1, 0644)) // root needed
105 errExit("copy_file"); 107 errExit("copy_file");
106 FILE *fp = fopen(pulsecfg, "a"); 108 FILE *fp = fopen(pulsecfg, "a");
107 if (!fp) 109 if (!fp)
@@ -126,11 +128,11 @@ void pulseaudio_init(void) {
126 if (create_empty_dir_as_user(homeusercfg, 0700)) 128 if (create_empty_dir_as_user(homeusercfg, 0700))
127 fs_logger2("create", homeusercfg); 129 fs_logger2("create", homeusercfg);
128 130
129 // if ~/.config/pulse now exists and there are no symbolic links, mount the new directory 131 // if ~/.config/pulse exists and there are no symbolic links, mount the new directory
130 // else set environment variable 132 // else set environment variable
131 int fd = safe_fd(homeusercfg, O_PATH|O_DIRECTORY|O_NOFOLLOW|O_CLOEXEC); 133 int fd = safe_fd(homeusercfg, O_PATH|O_DIRECTORY|O_NOFOLLOW|O_CLOEXEC);
132 if (fd == -1) { 134 if (fd == -1) {
133 pulseaudio_set_environment(pulsecfg); 135 pulseaudio_fallback(pulsecfg);
134 goto out; 136 goto out;
135 } 137 }
136 // confirm the actual mount destination is owned by the user 138 // confirm the actual mount destination is owned by the user
@@ -138,12 +140,12 @@ void pulseaudio_init(void) {
138 if (errno != EACCES) 140 if (errno != EACCES)
139 errExit("fstat"); 141 errExit("fstat");
140 close(fd); 142 close(fd);
141 pulseaudio_set_environment(pulsecfg); 143 pulseaudio_fallback(pulsecfg);
142 goto out; 144 goto out;
143 } 145 }
144 if (s.st_uid != getuid()) { 146 if (s.st_uid != getuid()) {
145 close(fd); 147 close(fd);
146 pulseaudio_set_environment(pulsecfg); 148 pulseaudio_fallback(pulsecfg);
147 goto out; 149 goto out;
148 } 150 }
149 // preserve a read-only mount 151 // preserve a read-only mount
@@ -171,8 +173,9 @@ void pulseaudio_init(void) {
171 char *p; 173 char *p;
172 if (asprintf(&p, "%s/client.conf", homeusercfg) == -1) 174 if (asprintf(&p, "%s/client.conf", homeusercfg) == -1)
173 errExit("asprintf"); 175 errExit("asprintf");
176 if (setenv("PULSE_CLIENTCONFIG", p, 1) < 0)
177 errExit("setenv");
174 fs_logger2("create", p); 178 fs_logger2("create", p);
175 pulseaudio_set_environment(p);
176 free(p); 179 free(p);
177 180
178 // RUN_PULSE_DIR not needed anymore, mask it 181 // RUN_PULSE_DIR not needed anymore, mask it
diff --git a/src/firejail/sandbox.c b/src/firejail/sandbox.c
index 991e5b2f2..d811fe45a 100644
--- a/src/firejail/sandbox.c
+++ b/src/firejail/sandbox.c
@@ -141,7 +141,7 @@ void set_apparmor(void) {
141} 141}
142#endif 142#endif
143 143
144void seccomp_debug(void) { 144static void seccomp_debug(void) {
145 if (arg_debug == 0) 145 if (arg_debug == 0)
146 return; 146 return;
147 147
diff --git a/src/firejail/util.c b/src/firejail/util.c
index e8b35a64b..a3927cc88 100644
--- a/src/firejail/util.c
+++ b/src/firejail/util.c
@@ -29,7 +29,6 @@
29#include <sys/ioctl.h> 29#include <sys/ioctl.h>
30#include <termios.h> 30#include <termios.h>
31#include <sys/wait.h> 31#include <sys/wait.h>
32#include <sys/syscall.h>
33#include <limits.h> 32#include <limits.h>
34 33
35#include <fcntl.h> 34#include <fcntl.h>
@@ -37,6 +36,7 @@
37#define O_PATH 010000000 36#define O_PATH 010000000
38#endif 37#endif
39 38
39#include <sys/syscall.h>
40#ifdef __NR_openat2 40#ifdef __NR_openat2
41#include <linux/openat2.h> 41#include <linux/openat2.h>
42#endif 42#endif
@@ -75,10 +75,11 @@ static void clean_supplementary_groups(gid_t gid) {
75 goto clean_all; 75 goto clean_all;
76 76
77 // clean supplementary group list 77 // clean supplementary group list
78 // allow only tty, audio, video, games 78 // allow only firejail, tty, audio, video, games
79 gid_t new_groups[MAX_GROUPS]; 79 gid_t new_groups[MAX_GROUPS];
80 int new_ngroups = 0; 80 int new_ngroups = 0;
81 char *allowed[] = { 81 char *allowed[] = {
82 "firejail",
82 "tty", 83 "tty",
83 "audio", 84 "audio",
84 "video", 85 "video",
@@ -1012,12 +1013,8 @@ int create_empty_dir_as_user(const char *dir, mode_t mode) {
1012 if (chmod(dir, mode) == -1) 1013 if (chmod(dir, mode) == -1)
1013 {;} // do nothing 1014 {;} // do nothing
1014 } 1015 }
1015 else if (arg_debug) { 1016 else if (arg_debug)
1016 char *str; 1017 printf("Directory %s not created: %s\n", dir, strerror(errno));
1017 if (asprintf(&str, "Directory %s not created", dir) == -1)
1018 errExit("asprintf");
1019 perror(str);
1020 }
1021#ifdef HAVE_GCOV 1018#ifdef HAVE_GCOV
1022 __gcov_flush(); 1019 __gcov_flush();
1023#endif 1020#endif
@@ -1164,12 +1161,12 @@ void disable_file_path(const char *path, const char *file) {
1164 1161
1165// open an existing file without following any symbolic link 1162// open an existing file without following any symbolic link
1166int safe_fd(const char *path, int flags) { 1163int safe_fd(const char *path, int flags) {
1164 flags |= O_NOFOLLOW;
1167 assert(path); 1165 assert(path);
1168 if (*path != '/' || strstr(path, "..")) { 1166 if (*path != '/' || strstr(path, "..")) {
1169 fprintf(stderr, "Error: invalid path %s\n", path); 1167 fprintf(stderr, "Error: invalid path %s\n", path);
1170 exit(1); 1168 exit(1);
1171 } 1169 }
1172 flags |= O_NOFOLLOW;
1173 int fd = -1; 1170 int fd = -1;
1174 1171
1175#ifdef __NR_openat2 // kernel 5.6 or better 1172#ifdef __NR_openat2 // kernel 5.6 or better
diff --git a/src/firejail/x11.c b/src/firejail/x11.c
index e10abad4e..4872a5207 100644
--- a/src/firejail/x11.c
+++ b/src/firejail/x11.c
@@ -1368,7 +1368,7 @@ void fs_x11(void) {
1368void x11_block(void) { 1368void x11_block(void) {
1369#ifdef HAVE_X11 1369#ifdef HAVE_X11
1370 // check abstract socket presence and network namespace options 1370 // check abstract socket presence and network namespace options
1371 if ((!arg_nonetwork && !cfg.bridge0.configured && !cfg.interface0.configured) 1371 if ((!arg_nonetwork && !arg_netns && !cfg.bridge0.configured && !cfg.interface0.configured)
1372 && x11_abstract_sockets_present()) { 1372 && x11_abstract_sockets_present()) {
1373 fprintf(stderr, "ERROR: --x11=none specified, but abstract X11 socket still accessible.\n" 1373 fprintf(stderr, "ERROR: --x11=none specified, but abstract X11 socket still accessible.\n"
1374 "Additional setup required. To block abstract X11 socket you can either:\n" 1374 "Additional setup required. To block abstract X11 socket you can either:\n"
diff --git a/src/man/firejail.txt b/src/man/firejail.txt
index 562b3eda3..347e2b31b 100644
--- a/src/man/firejail.txt
+++ b/src/man/firejail.txt
@@ -76,10 +76,10 @@ If an appropriate profile is not found, Firejail will use a default profile.
76The default profile is quite restrictive. In case the application doesn't work, use --noprofile option 76The default profile is quite restrictive. In case the application doesn't work, use --noprofile option
77to disable it. For more information, please see \fBSECURITY PROFILES\fR section below. 77to disable it. For more information, please see \fBSECURITY PROFILES\fR section below.
78.PP 78.PP
79If a program argument is not specified, Firejail starts /bin/bash shell. 79If a program argument is not specified, Firejail starts the user's preferred shell.
80Examples: 80Examples:
81.PP 81.PP
82$ firejail [OPTIONS] # starting a /bin/bash shell 82$ firejail [OPTIONS] # starting the program specified in $SHELL, usually /bin/bash
83.PP 83.PP
84$ firejail [OPTIONS] firefox # starting Mozilla Firefox 84$ firejail [OPTIONS] firefox # starting Mozilla Firefox
85.PP 85.PP
@@ -2476,7 +2476,7 @@ $ firejail \-\-shell=none script.sh
2476\fB\-\-shell=program 2476\fB\-\-shell=program
2477Set default user shell. Use this shell to run the application using \-c shell option. 2477Set default user shell. Use this shell to run the application using \-c shell option.
2478For example "firejail \-\-shell=/bin/dash firefox" will start Mozilla Firefox as "/bin/dash \-c firefox". 2478For example "firejail \-\-shell=/bin/dash firefox" will start Mozilla Firefox as "/bin/dash \-c firefox".
2479By default Bash shell (/bin/bash) is used. 2479By default the user's preferred shell is used.
2480.br 2480.br
2481 2481
2482.br 2482.br
@@ -3023,7 +3023,7 @@ We provide a tool that automates all this integration, please see \&\flfirecfg\f
3023.SH EXAMPLES 3023.SH EXAMPLES
3024.TP 3024.TP
3025\f\firejail 3025\f\firejail
3026Sandbox a regular /bin/bash session. 3026Sandbox a regular shell session.
3027.TP 3027.TP
3028\f\firejail firefox 3028\f\firejail firefox
3029Start Mozilla Firefox. 3029Start Mozilla Firefox.
@@ -3043,7 +3043,7 @@ Start Firefox in a new network namespace. An IP address is
3043assigned automatically. 3043assigned automatically.
3044.TP 3044.TP
3045\f\firejail \-\-net=br0 \-\-ip=10.10.20.5 \-\-net=br1 \-\-net=br2 3045\f\firejail \-\-net=br0 \-\-ip=10.10.20.5 \-\-net=br1 \-\-net=br2
3046Start a /bin/bash session in a new network namespace and connect it 3046Start a shell session in a new network namespace and connect it
3047to br0, br1, and br2 host bridge devices. IP addresses are assigned 3047to br0, br1, and br2 host bridge devices. IP addresses are assigned
3048automatically for the interfaces connected to br1 and b2 3048automatically for the interfaces connected to br1 and b2
3049#endif 3049#endif