aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--etc/inc/disable-common.inc12
-rw-r--r--etc/profile-a-l/abiword.profile4
-rw-r--r--etc/profile-a-l/akonadi_control.profile12
-rw-r--r--etc/profile-a-l/akregator.profile2
-rw-r--r--etc/profile-a-l/alacarte.profile2
-rw-r--r--etc/profile-a-l/amarok.profile8
-rw-r--r--etc/profile-a-l/android-studio.profile2
-rw-r--r--etc/profile-a-l/anki.profile2
-rw-r--r--etc/profile-a-l/arduino.profile2
-rw-r--r--etc/profile-a-l/aria2c.profile2
-rw-r--r--etc/profile-a-l/ark.profile6
-rw-r--r--etc/profile-a-l/artha.profile2
-rw-r--r--etc/profile-a-l/asunder.profile4
-rw-r--r--etc/profile-a-l/atom.profile2
-rw-r--r--etc/profile-a-l/atril.profile4
-rw-r--r--etc/profile-a-l/audacious.profile2
-rw-r--r--etc/profile-a-l/audacity.profile4
-rw-r--r--etc/profile-a-l/audio-recorder.profile4
-rw-r--r--etc/profile-a-l/authenticator.profile12
-rw-r--r--etc/profile-a-l/autokey-common.profile2
-rw-r--r--etc/profile-a-l/baloo_file.profile12
-rw-r--r--etc/profile-a-l/baobab.profile10
-rw-r--r--etc/profile-a-l/bcompare.profile2
-rw-r--r--etc/profile-a-l/bibletime.profile4
-rw-r--r--etc/profile-a-l/bijiben.profile2
-rw-r--r--etc/profile-a-l/bitlbee.profile2
-rw-r--r--etc/profile-a-l/bleachbit.profile6
-rw-r--r--etc/profile-a-l/bless.profile2
-rw-r--r--etc/profile-a-l/brackets.profile2
-rw-r--r--etc/profile-a-l/brasero.profile6
-rw-r--r--etc/profile-a-l/build-systems-common.profile2
-rw-r--r--etc/profile-a-l/calibre.profile2
-rw-r--r--etc/profile-a-l/calligra.profile8
-rw-r--r--etc/profile-a-l/cameramonitor.profile6
-rw-r--r--etc/profile-a-l/cantata.profile4
-rw-r--r--etc/profile-a-l/catfish.profile12
-rw-r--r--etc/profile-a-l/cawbird.profile2
-rw-r--r--etc/profile-a-l/chromium-browser-privacy.profile2
-rw-r--r--etc/profile-a-l/chromium-common.profile6
-rw-r--r--etc/profile-a-l/chromium.profile2
-rw-r--r--etc/profile-a-l/clac.profile4
-rw-r--r--etc/profile-a-l/claws-mail.profile2
-rw-r--r--etc/profile-a-l/clawsker.profile2
-rw-r--r--etc/profile-a-l/clementine.profile2
-rw-r--r--etc/profile-a-l/clion.profile2
-rw-r--r--etc/profile-a-l/clipgrab.profile6
-rw-r--r--etc/profile-a-l/code.profile2
-rw-r--r--etc/profile-a-l/com.github.bleakgrey.tootle.profile6
-rw-r--r--etc/profile-a-l/cower.profile4
-rw-r--r--etc/profile-a-l/curl.profile4
-rw-r--r--etc/profile-a-l/cyberfox.profile2
-rw-r--r--etc/profile-a-l/d-feet.profile4
-rw-r--r--etc/profile-a-l/dconf-editor.profile2
-rw-r--r--etc/profile-a-l/ddgtk.profile2
-rw-r--r--etc/profile-a-l/default.profile64
-rw-r--r--etc/profile-a-l/deluge.profile2
-rw-r--r--etc/profile-a-l/devhelp.profile8
-rw-r--r--etc/profile-a-l/dig.profile6
-rw-r--r--etc/profile-a-l/digikam.profile12
-rw-r--r--etc/profile-a-l/dino.profile3
-rw-r--r--etc/profile-a-l/display.profile2
-rw-r--r--etc/profile-a-l/dolphin-emu.profile2
-rw-r--r--etc/profile-a-l/drawio.profile6
-rw-r--r--etc/profile-a-l/drill.profile4
-rw-r--r--etc/profile-a-l/easystroke.profile4
-rw-r--r--etc/profile-a-l/electrum.profile4
-rw-r--r--etc/profile-a-l/email-common.profile2
-rw-r--r--etc/profile-a-l/engrampa.profile4
-rw-r--r--etc/profile-a-l/enpass.profile2
-rw-r--r--etc/profile-a-l/ephemeral.profile4
-rw-r--r--etc/profile-a-l/etr.profile2
-rw-r--r--etc/profile-a-l/evince.profile2
-rw-r--r--etc/profile-a-l/falkon.profile10
-rw-r--r--etc/profile-a-l/fdns.profile4
-rw-r--r--etc/profile-a-l/feedreader.profile4
-rw-r--r--etc/profile-a-l/ferdi.profile2
-rw-r--r--etc/profile-a-l/ffmpeg.profile2
-rw-r--r--etc/profile-a-l/file-roller.profile4
-rw-r--r--etc/profile-a-l/font-manager.profile4
-rw-r--r--etc/profile-a-l/franz.profile2
-rw-r--r--etc/profile-a-l/frozen-bubble.profile2
-rw-r--r--etc/profile-a-l/funnyboat.profile4
-rw-r--r--etc/profile-a-l/galculator.profile2
-rw-r--r--etc/profile-a-l/geary.profile4
-rw-r--r--etc/profile-a-l/gedit.profile14
-rw-r--r--etc/profile-a-l/geekbench.profile2
-rw-r--r--etc/profile-a-l/geeqie.profile2
-rw-r--r--etc/profile-a-l/gfeeds.profile2
-rw-r--r--etc/profile-a-l/ghostwriter.profile2
-rw-r--r--etc/profile-a-l/github-desktop.profile8
-rw-r--r--etc/profile-a-l/gjs.profile4
-rw-r--r--etc/profile-a-l/gmpc.profile2
-rw-r--r--etc/profile-a-l/gnome-books.profile2
-rw-r--r--etc/profile-a-l/gnome-calculator.profile2
-rw-r--r--etc/profile-a-l/gnome-characters.profile4
-rw-r--r--etc/profile-a-l/gnome-contacts.profile2
-rw-r--r--etc/profile-a-l/gnome-keyring.profile2
-rw-r--r--etc/profile-a-l/gnome-maps.profile2
-rw-r--r--etc/profile-a-l/gnome-mplayer.profile2
-rw-r--r--etc/profile-a-l/gnome-nettool.profile2
-rw-r--r--etc/profile-a-l/gnome-photos.profile2
-rw-r--r--etc/profile-a-l/gnome-pie.profile2
-rw-r--r--etc/profile-a-l/gnome-ring.profile2
-rw-r--r--etc/profile-a-l/gnome-schedule.profile2
-rw-r--r--etc/profile-a-l/gnome-system-log.profile6
-rw-r--r--etc/profile-a-l/gnome-weather.profile4
-rw-r--r--etc/profile-a-l/godot.profile2
-rw-r--r--etc/profile-a-l/goobox.profile6
-rw-r--r--etc/profile-a-l/google-play-music-desktop-player.profile4
-rw-r--r--etc/profile-a-l/gpa.profile2
-rw-r--r--etc/profile-a-l/gpg-agent.profile2
-rw-r--r--etc/profile-a-l/gpg.profile2
-rw-r--r--etc/profile-a-l/gpg2.profile2
-rw-r--r--etc/profile-a-l/gucharmap.profile6
-rw-r--r--etc/profile-a-l/gwenview.profile10
-rw-r--r--etc/profile-a-l/hexchat.profile6
-rw-r--r--etc/profile-a-l/homebank.profile4
-rw-r--r--etc/profile-a-l/iagno.profile4
-rw-r--r--etc/profile-a-l/idea.sh.profile2
-rw-r--r--etc/profile-a-l/img2txt.profile2
-rw-r--r--etc/profile-a-l/inkscape.profile2
-rw-r--r--etc/profile-a-l/ipcalc.profile14
-rw-r--r--etc/profile-a-l/k3b.profile14
-rw-r--r--etc/profile-a-l/kaffeine.profile2
-rw-r--r--etc/profile-a-l/kalgebra.profile4
-rw-r--r--etc/profile-a-l/kate.profile16
-rw-r--r--etc/profile-a-l/kazam.profile2
-rw-r--r--etc/profile-a-l/kcalc.profile2
-rw-r--r--etc/profile-a-l/kdeinit4.profile2
-rw-r--r--etc/profile-a-l/kdenlive.profile8
-rw-r--r--etc/profile-a-l/kfind.profile18
-rw-r--r--etc/profile-a-l/kget.profile2
-rw-r--r--etc/profile-a-l/kiwix-desktop.profile6
-rw-r--r--etc/profile-a-l/kmail.profile8
-rw-r--r--etc/profile-a-l/kmplayer.profile2
-rw-r--r--etc/profile-a-l/konversation.profile2
-rw-r--r--etc/profile-a-l/krita.profile6
-rw-r--r--etc/profile-a-l/krunner.profile18
-rw-r--r--etc/profile-a-l/ktorrent.profile4
-rw-r--r--etc/profile-a-l/kube.profile2
-rw-r--r--etc/profile-a-l/kwrite.profile8
-rw-r--r--etc/profile-a-l/less.profile4
-rw-r--r--etc/profile-a-l/liferea.profile4
-rw-r--r--etc/profile-a-l/links-common.profile2
-rw-r--r--etc/profile-a-l/lutris.profile12
-rw-r--r--etc/profile-a-l/lynx.profile4
-rw-r--r--etc/profile-a-l/lyx.profile2
-rw-r--r--etc/profile-m-z/PCSX2.profile4
-rw-r--r--etc/profile-m-z/QMediathekView.profile4
-rw-r--r--etc/profile-m-z/Viber.profile2
-rw-r--r--etc/profile-m-z/Xephyr.profile8
-rw-r--r--etc/profile-m-z/Xvfb.profile4
-rw-r--r--etc/profile-m-z/makepkg.profile4
-rw-r--r--etc/profile-m-z/midori.profile6
-rw-r--r--etc/profile-m-z/mpDris2.profile2
-rw-r--r--etc/profile-m-z/mplayer.profile4
-rw-r--r--etc/profile-m-z/mullvad-browser.profile4
-rw-r--r--etc/profile-m-z/multimc5.profile6
-rw-r--r--etc/profile-m-z/mumble.profile2
-rw-r--r--etc/profile-m-z/musescore.profile4
-rw-r--r--etc/profile-m-z/musixmatch.profile2
-rw-r--r--etc/profile-m-z/mutt.profile2
-rw-r--r--etc/profile-m-z/nano.profile2
-rw-r--r--etc/profile-m-z/ncdu.profile2
-rw-r--r--etc/profile-m-z/neomutt.profile2
-rw-r--r--etc/profile-m-z/nitroshare.profile8
-rw-r--r--etc/profile-m-z/nuclear.profile2
-rw-r--r--etc/profile-m-z/okular.profile11
-rw-r--r--etc/profile-m-z/onionshare-gui.profile2
-rw-r--r--etc/profile-m-z/openclonk.profile2
-rw-r--r--etc/profile-m-z/orage.profile2
-rw-r--r--etc/profile-m-z/otter-browser.profile2
-rw-r--r--etc/profile-m-z/pidgin.profile2
-rw-r--r--etc/profile-m-z/ping.profile2
-rw-r--r--etc/profile-m-z/pluma.profile8
-rw-r--r--etc/profile-m-z/plv.profile2
-rw-r--r--etc/profile-m-z/psi-plus.profile2
-rw-r--r--etc/profile-m-z/psi.profile2
-rw-r--r--etc/profile-m-z/pycharm-community.profile4
-rw-r--r--etc/profile-m-z/qbittorrent.profile4
-rw-r--r--etc/profile-m-z/qmmp.profile2
-rw-r--r--etc/profile-m-z/qpdfview.profile4
-rw-r--r--etc/profile-m-z/qtox.profile2
-rw-r--r--etc/profile-m-z/quassel.profile2
-rw-r--r--etc/profile-m-z/quiterss.profile2
-rw-r--r--etc/profile-m-z/rpcs3.profile3
-rw-r--r--etc/profile-m-z/rssguard.profile4
-rw-r--r--etc/profile-m-z/scribus.profile2
-rw-r--r--etc/profile-m-z/seamonkey.profile2
-rw-r--r--etc/profile-m-z/server.profile50
-rw-r--r--etc/profile-m-z/silentarmy.profile2
-rw-r--r--etc/profile-m-z/simple-scan.profile10
-rw-r--r--etc/profile-m-z/simutrans.profile2
-rw-r--r--etc/profile-m-z/skanlite.profile12
-rw-r--r--etc/profile-m-z/smplayer.profile6
-rw-r--r--etc/profile-m-z/sniffnet.profile4
-rw-r--r--etc/profile-m-z/sol.profile6
-rw-r--r--etc/profile-m-z/sound-juicer.profile4
-rw-r--r--etc/profile-m-z/sqlitebrowser.profile6
-rw-r--r--etc/profile-m-z/ssh.profile6
-rw-r--r--etc/profile-m-z/standardnotes-desktop.profile2
-rw-r--r--etc/profile-m-z/subdownloader.profile2
-rw-r--r--etc/profile-m-z/supertux2.profile2
-rw-r--r--etc/profile-m-z/sushi.profile2
-rw-r--r--etc/profile-m-z/sylpheed.profile2
-rw-r--r--etc/profile-m-z/sysprof.profile6
-rw-r--r--etc/profile-m-z/teamspeak3.profile2
-rw-r--r--etc/profile-m-z/thunderbird.profile6
-rw-r--r--etc/profile-m-z/tmux.profile12
-rw-r--r--etc/profile-m-z/torbrowser-launcher.profile4
-rw-r--r--etc/profile-m-z/totem.profile4
-rw-r--r--etc/profile-m-z/tracker.profile6
-rw-r--r--etc/profile-m-z/trojita.profile2
-rw-r--r--etc/profile-m-z/udiskie.profile4
-rw-r--r--etc/profile-m-z/unknown-horizons.profile6
-rw-r--r--etc/profile-m-z/viewnior.profile2
-rw-r--r--etc/profile-m-z/virtualbox.profile2
-rw-r--r--etc/profile-m-z/warzone2100.profile2
-rw-r--r--etc/profile-m-z/wine.profile10
-rw-r--r--etc/profile-m-z/wireshark.profile15
-rw-r--r--etc/profile-m-z/xed.profile10
-rw-r--r--etc/profile-m-z/xfburn.profile6
-rw-r--r--etc/profile-m-z/xfce4-mixer.profile2
-rw-r--r--etc/profile-m-z/xfce4-screenshooter.profile2
-rw-r--r--etc/profile-m-z/xplayer.profile8
-rw-r--r--etc/profile-m-z/xpra.profile6
-rw-r--r--etc/profile-m-z/xreader.profile4
-rw-r--r--etc/profile-m-z/xviewer.profile8
-rw-r--r--etc/profile-m-z/yelp.profile6
-rw-r--r--etc/profile-m-z/ytmdesktop.profile4
-rw-r--r--etc/profile-m-z/zeal.profile2
231 files changed, 555 insertions, 547 deletions
diff --git a/etc/inc/disable-common.inc b/etc/inc/disable-common.inc
index 1b0e00bc6..b688647b5 100644
--- a/etc/inc/disable-common.inc
+++ b/etc/inc/disable-common.inc
@@ -33,7 +33,8 @@ blacklist-nolog ${HOME}/.viminfo
33blacklist-nolog /tmp/clipmenu* 33blacklist-nolog /tmp/clipmenu*
34 34
35# X11 session autostart 35# X11 session autostart
36# blacklist ${HOME}/.xpra - this will kill --x11=xpra cmdline option for all programs 36# this will kill --x11=xpra cmdline option for all programs
37#blacklist ${HOME}/.xpra
37blacklist ${HOME}/.Xsession 38blacklist ${HOME}/.Xsession
38blacklist ${HOME}/.blackbox 39blacklist ${HOME}/.blackbox
39blacklist ${HOME}/.config/autostart 40blacklist ${HOME}/.config/autostart
@@ -241,8 +242,9 @@ blacklist /var/lib/mysql/mysql.sock
241blacklist /var/lib/mysqld/mysql.sock 242blacklist /var/lib/mysqld/mysql.sock
242blacklist /var/lib/pacman 243blacklist /var/lib/pacman
243blacklist /var/lib/upower 244blacklist /var/lib/upower
244# blacklist /var/log - a virtual /var/log directory (mostly empty) is build up by default for 245# a virtual /var/log directory (mostly empty) is build up by default for every
245# every sandbox, unless --writable-var-log switch is activated 246# sandbox, unless --writable-var-log switch is activated
247#blacklist /var/log
246blacklist /var/mail 248blacklist /var/mail
247blacklist /var/opt 249blacklist /var/opt
248blacklist /var/run/acpid.socket 250blacklist /var/run/acpid.socket
@@ -562,7 +564,7 @@ blacklist ${PATH}/bmon
562blacklist ${PATH}/fping 564blacklist ${PATH}/fping
563blacklist ${PATH}/fping6 565blacklist ${PATH}/fping6
564blacklist ${PATH}/hostname 566blacklist ${PATH}/hostname
565# blacklist ${PATH}/ip - breaks --ip=dhcp 567#blacklist ${PATH}/ip # breaks --ip=dhcp
566blacklist ${PATH}/mtr 568blacklist ${PATH}/mtr
567blacklist ${PATH}/mtr-packet 569blacklist ${PATH}/mtr-packet
568blacklist ${PATH}/netstat 570blacklist ${PATH}/netstat
@@ -611,8 +613,8 @@ blacklist /tmp/tmux-*
611blacklist ${PATH}/gnome-terminal 613blacklist ${PATH}/gnome-terminal
612blacklist ${PATH}/gnome-terminal.wrapper 614blacklist ${PATH}/gnome-terminal.wrapper
613blacklist ${PATH}/kgx 615blacklist ${PATH}/kgx
614# blacklist ${PATH}/konsole
615# konsole doesn't seem to have this problem - last tested on Ubuntu 16.04 616# konsole doesn't seem to have this problem - last tested on Ubuntu 16.04
617#blacklist ${PATH}/konsole
616blacklist ${PATH}/lilyterm 618blacklist ${PATH}/lilyterm
617blacklist ${PATH}/lxterminal 619blacklist ${PATH}/lxterminal
618blacklist ${PATH}/mate-terminal 620blacklist ${PATH}/mate-terminal
diff --git a/etc/profile-a-l/abiword.profile b/etc/profile-a-l/abiword.profile
index a0eed24ca..dcd1259cf 100644
--- a/etc/profile-a-l/abiword.profile
+++ b/etc/profile-a-l/abiword.profile
@@ -44,7 +44,7 @@ private-dev
44private-etc @x11 44private-etc @x11
45private-tmp 45private-tmp
46 46
47# dbus-user none 47#dbus-user none
48# dbus-system none 48#dbus-system none
49 49
50restrict-namespaces 50restrict-namespaces
diff --git a/etc/profile-a-l/akonadi_control.profile b/etc/profile-a-l/akonadi_control.profile
index 184036f24..275ff41ef 100644
--- a/etc/profile-a-l/akonadi_control.profile
+++ b/etc/profile-a-l/akonadi_control.profile
@@ -34,7 +34,7 @@ include whitelist-var-common.inc
34# disabled options below are not compatible with the apparmor profile for mysqld-akonadi. 34# disabled options below are not compatible with the apparmor profile for mysqld-akonadi.
35# this affects ubuntu and debian currently 35# this affects ubuntu and debian currently
36 36
37# apparmor 37#apparmor
38caps.drop all 38caps.drop all
39ipc-namespace 39ipc-namespace
40netfilter 40netfilter
@@ -42,17 +42,17 @@ no3d
42nodvd 42nodvd
43nogroups 43nogroups
44noinput 44noinput
45# nonewprivs 45#nonewprivs
46noroot 46noroot
47nosound 47nosound
48notv 48notv
49nou2f 49nou2f
50novideo 50novideo
51# protocol unix,inet,inet6,netlink 51#protocol unix,inet,inet6,netlink
52# seccomp !io_destroy,!io_getevents,!io_setup,!io_submit,!ioprio_set 52#seccomp !io_destroy,!io_getevents,!io_setup,!io_submit,!ioprio_set
53tracelog 53tracelog
54 54
55private-dev 55private-dev
56# private-tmp - breaks programs that depend on akonadi 56#private-tmp # breaks programs that depend on akonadi
57 57
58# restrict-namespaces 58#restrict-namespaces
diff --git a/etc/profile-a-l/akregator.profile b/etc/profile-a-l/akregator.profile
index d88a1fcad..9de992a76 100644
--- a/etc/profile-a-l/akregator.profile
+++ b/etc/profile-a-l/akregator.profile
@@ -49,4 +49,4 @@ private-dev
49private-tmp 49private-tmp
50 50
51deterministic-shutdown 51deterministic-shutdown
52# restrict-namespaces 52#restrict-namespaces
diff --git a/etc/profile-a-l/alacarte.profile b/etc/profile-a-l/alacarte.profile
index 22a303cdd..14c425cc6 100644
--- a/etc/profile-a-l/alacarte.profile
+++ b/etc/profile-a-l/alacarte.profile
@@ -49,7 +49,7 @@ seccomp.block-secondary
49tracelog 49tracelog
50 50
51disable-mnt 51disable-mnt
52# private-bin alacarte,bash,python*,sh 52#private-bin alacarte,bash,python*,sh
53private-cache 53private-cache
54private-dev 54private-dev
55private-etc @tls-ca,@x11,mime.types 55private-etc @tls-ca,@x11,mime.types
diff --git a/etc/profile-a-l/amarok.profile b/etc/profile-a-l/amarok.profile
index 389aae602..0c78ab20d 100644
--- a/etc/profile-a-l/amarok.profile
+++ b/etc/profile-a-l/amarok.profile
@@ -26,11 +26,11 @@ notv
26nou2f 26nou2f
27novideo 27novideo
28protocol unix,inet,inet6 28protocol unix,inet,inet6
29# seccomp 29#seccomp
30 30
31# private-bin amarok 31#private-bin amarok
32private-dev 32private-dev
33# private-etc alternatives,asound.conf,ca-certificates,crypto-policies,machine-id,pki,pulse,resolv.conf,ssl 33#private-etc alternatives,asound.conf,ca-certificates,crypto-policies,machine-id,pki,pulse,resolv.conf,ssl
34private-tmp 34private-tmp
35 35
36dbus-user filter 36dbus-user filter
@@ -45,4 +45,4 @@ dbus-user.talk org.freedesktop.Notifications
45#dbus-user.talk org.kde.knotify 45#dbus-user.talk org.kde.knotify
46dbus-system none 46dbus-system none
47 47
48# restrict-namespaces 48#restrict-namespaces
diff --git a/etc/profile-a-l/android-studio.profile b/etc/profile-a-l/android-studio.profile
index 3dfa0f95a..09289ace1 100644
--- a/etc/profile-a-l/android-studio.profile
+++ b/etc/profile-a-l/android-studio.profile
@@ -36,7 +36,7 @@ protocol unix,inet,inet6
36seccomp 36seccomp
37 37
38private-cache 38private-cache
39# private-tmp 39#private-tmp
40 40
41# noexec /tmp breaks 'Android Profiler' 41# noexec /tmp breaks 'Android Profiler'
42#noexec /tmp 42#noexec /tmp
diff --git a/etc/profile-a-l/anki.profile b/etc/profile-a-l/anki.profile
index 2d0bfcb6c..acf52509c 100644
--- a/etc/profile-a-l/anki.profile
+++ b/etc/profile-a-l/anki.profile
@@ -55,4 +55,4 @@ private-tmp
55dbus-user none 55dbus-user none
56dbus-system none 56dbus-system none
57 57
58# restrict-namespaces 58#restrict-namespaces
diff --git a/etc/profile-a-l/arduino.profile b/etc/profile-a-l/arduino.profile
index 85ea76939..a925e223f 100644
--- a/etc/profile-a-l/arduino.profile
+++ b/etc/profile-a-l/arduino.profile
@@ -21,7 +21,7 @@ caps.drop all
21netfilter 21netfilter
22no3d 22no3d
23nodvd 23nodvd
24# nogroups 24#nogroups
25nonewprivs 25nonewprivs
26noroot 26noroot
27nosound 27nosound
diff --git a/etc/profile-a-l/aria2c.profile b/etc/profile-a-l/aria2c.profile
index 7f9463c4f..65ffdfa1b 100644
--- a/etc/profile-a-l/aria2c.profile
+++ b/etc/profile-a-l/aria2c.profile
@@ -39,7 +39,7 @@ novideo
39protocol unix,inet,inet6,netlink 39protocol unix,inet,inet6,netlink
40seccomp 40seccomp
41 41
42# disable-mnt 42#disable-mnt
43# Add your custom event hook commands to 'private-bin' in your aria2c.local. 43# Add your custom event hook commands to 'private-bin' in your aria2c.local.
44private-bin aria2c,gzip 44private-bin aria2c,gzip
45# Add 'private-cache' to your aria2c.local if you don't use Lutris/winetricks (see issue #2772). 45# Add 'private-cache' to your aria2c.local if you don't use Lutris/winetricks (see issue #2772).
diff --git a/etc/profile-a-l/ark.profile b/etc/profile-a-l/ark.profile
index 272e06219..65e965248 100644
--- a/etc/profile-a-l/ark.profile
+++ b/etc/profile-a-l/ark.profile
@@ -22,7 +22,7 @@ include whitelist-var-common.inc
22 22
23apparmor 23apparmor
24caps.drop all 24caps.drop all
25# net none 25#net none
26netfilter 26netfilter
27nodvd 27nodvd
28nogroups 28nogroups
@@ -42,7 +42,7 @@ private-bin 7z,ark,bash,lrzip,lsar,lz4,lzop,p7zip,rar,sh,tclsh,unar,unrar,unzip,
42private-dev 42private-dev
43private-tmp 43private-tmp
44 44
45# dbus-user none 45#dbus-user none
46# dbus-system none 46#dbus-system none
47 47
48restrict-namespaces 48restrict-namespaces
diff --git a/etc/profile-a-l/artha.profile b/etc/profile-a-l/artha.profile
index 897140857..f6369eb86 100644
--- a/etc/profile-a-l/artha.profile
+++ b/etc/profile-a-l/artha.profile
@@ -35,7 +35,7 @@ include whitelist-var-common.inc
35apparmor 35apparmor
36caps.drop all 36caps.drop all
37ipc-namespace 37ipc-namespace
38# net none - breaks on Ubuntu 38#net none # breaks on Ubuntu
39no3d 39no3d
40nodvd 40nodvd
41nogroups 41nogroups
diff --git a/etc/profile-a-l/asunder.profile b/etc/profile-a-l/asunder.profile
index c09ad7936..601ef5c13 100644
--- a/etc/profile-a-l/asunder.profile
+++ b/etc/profile-a-l/asunder.profile
@@ -26,7 +26,7 @@ apparmor
26caps.drop all 26caps.drop all
27netfilter 27netfilter
28no3d 28no3d
29# nogroups 29#nogroups
30noinput 30noinput
31nonewprivs 31nonewprivs
32noroot 32noroot
@@ -44,5 +44,5 @@ dbus-user none
44dbus-system none 44dbus-system none
45 45
46# mdwe is disabled due to breaking hardware accelerated decoding 46# mdwe is disabled due to breaking hardware accelerated decoding
47# memory-deny-write-execute 47#memory-deny-write-execute
48restrict-namespaces 48restrict-namespaces
diff --git a/etc/profile-a-l/atom.profile b/etc/profile-a-l/atom.profile
index 8e8f8515f..f21a8c34a 100644
--- a/etc/profile-a-l/atom.profile
+++ b/etc/profile-a-l/atom.profile
@@ -26,7 +26,7 @@ noblacklist ${HOME}/.config/Atom
26# Allows files commonly used by IDEs 26# Allows files commonly used by IDEs
27include allow-common-devel.inc 27include allow-common-devel.inc
28 28
29# net none 29#net none
30nosound 30nosound
31 31
32# Redirect 32# Redirect
diff --git a/etc/profile-a-l/atril.profile b/etc/profile-a-l/atril.profile
index d0513d2a7..26b978158 100644
--- a/etc/profile-a-l/atril.profile
+++ b/etc/profile-a-l/atril.profile
@@ -22,7 +22,7 @@ include disable-xdg.inc
22 22
23include whitelist-var-common.inc 23include whitelist-var-common.inc
24 24
25# apparmor 25#apparmor
26caps.drop all 26caps.drop all
27machine-id 27machine-id
28no3d 28no3d
@@ -44,7 +44,7 @@ private-dev
44private-etc 44private-etc
45# atril uses webkit gtk to display epub files 45# atril uses webkit gtk to display epub files
46# waiting for globbing support in private-lib; for now hardcoding it to webkit2gtk-4.0 46# waiting for globbing support in private-lib; for now hardcoding it to webkit2gtk-4.0
47#private-lib webkit2gtk-4.0 - problems on Arch with the new version of WebKit 47#private-lib webkit2gtk-4.0 # problems on Arch with the new version of WebKit
48private-tmp 48private-tmp
49 49
50# webkit gtk killed by memory-deny-write-execute 50# webkit gtk killed by memory-deny-write-execute
diff --git a/etc/profile-a-l/audacious.profile b/etc/profile-a-l/audacious.profile
index 6abd87c92..6d1a07e2d 100644
--- a/etc/profile-a-l/audacious.profile
+++ b/etc/profile-a-l/audacious.profile
@@ -36,7 +36,7 @@ protocol unix,inet,inet6
36seccomp 36seccomp
37tracelog 37tracelog
38 38
39# private-bin audacious 39#private-bin audacious
40private-cache 40private-cache
41private-dev 41private-dev
42private-tmp 42private-tmp
diff --git a/etc/profile-a-l/audacity.profile b/etc/profile-a-l/audacity.profile
index c2a482b61..e70215891 100644
--- a/etc/profile-a-l/audacity.profile
+++ b/etc/profile-a-l/audacity.profile
@@ -54,7 +54,7 @@ private-etc @x11
54private-tmp 54private-tmp
55 55
56# problems on Fedora 27 56# problems on Fedora 27
57# dbus-user none 57#dbus-user none
58# dbus-system none 58#dbus-system none
59 59
60restrict-namespaces 60restrict-namespaces
diff --git a/etc/profile-a-l/audio-recorder.profile b/etc/profile-a-l/audio-recorder.profile
index deba11a47..816852a71 100644
--- a/etc/profile-a-l/audio-recorder.profile
+++ b/etc/profile-a-l/audio-recorder.profile
@@ -41,7 +41,7 @@ seccomp
41tracelog 41tracelog
42 42
43disable-mnt 43disable-mnt
44# private-bin audio-recorder 44#private-bin audio-recorder
45private-cache 45private-cache
46private-etc 46private-etc
47private-tmp 47private-tmp
@@ -50,5 +50,5 @@ dbus-user filter
50dbus-user.talk ca.desrt.dconf 50dbus-user.talk ca.desrt.dconf
51dbus-system none 51dbus-system none
52 52
53# memory-deny-write-execute - breaks on Arch 53#memory-deny-write-execute # breaks on Arch
54restrict-namespaces 54restrict-namespaces
diff --git a/etc/profile-a-l/authenticator.profile b/etc/profile-a-l/authenticator.profile
index 96c70a838..cbd97449d 100644
--- a/etc/profile-a-l/authenticator.profile
+++ b/etc/profile-a-l/authenticator.profile
@@ -19,7 +19,7 @@ include disable-exec.inc
19include disable-interpreters.inc 19include disable-interpreters.inc
20include disable-programs.inc 20include disable-programs.inc
21 21
22# apparmor 22#apparmor
23caps.drop all 23caps.drop all
24netfilter 24netfilter
25no3d 25no3d
@@ -31,19 +31,19 @@ noroot
31nosound 31nosound
32notv 32notv
33nou2f 33nou2f
34# novideo 34#novideo
35protocol unix,inet,inet6 35protocol unix,inet,inet6
36seccomp 36seccomp
37 37
38disable-mnt 38disable-mnt
39# private-bin authenticator,python* 39#private-bin authenticator,python*
40private-dev 40private-dev
41private-etc @tls-ca 41private-etc @tls-ca
42private-tmp 42private-tmp
43 43
44# makes settings immutable 44# makes settings immutable
45# dbus-user none 45#dbus-user none
46# dbus-system none 46#dbus-system none
47 47
48#memory-deny-write-execute - breaks on Arch (see issue #1803) 48#memory-deny-write-execute # breaks on Arch (see issue #1803)
49restrict-namespaces 49restrict-namespaces
diff --git a/etc/profile-a-l/autokey-common.profile b/etc/profile-a-l/autokey-common.profile
index 834eac11a..bc47b26a9 100644
--- a/etc/profile-a-l/autokey-common.profile
+++ b/etc/profile-a-l/autokey-common.profile
@@ -38,5 +38,5 @@ private-cache
38private-dev 38private-dev
39private-tmp 39private-tmp
40 40
41#memory-deny-write-execute - breaks on Arch (see issue #1803) 41#memory-deny-write-execute # breaks on Arch (see issue #1803)
42restrict-namespaces 42restrict-namespaces
diff --git a/etc/profile-a-l/baloo_file.profile b/etc/profile-a-l/baloo_file.profile
index 084b7c702..de4004724 100644
--- a/etc/profile-a-l/baloo_file.profile
+++ b/etc/profile-a-l/baloo_file.profile
@@ -7,10 +7,10 @@ include globals.local
7 7
8# Make home directory read-only and allow writing only to ${HOME}/.local/share/baloo 8# Make home directory read-only and allow writing only to ${HOME}/.local/share/baloo
9# Note: Baloo will not be able to update the "first run" key in its configuration files. 9# Note: Baloo will not be able to update the "first run" key in its configuration files.
10# mkdir ${HOME}/.local/share/baloo 10#mkdir ${HOME}/.local/share/baloo
11# read-only ${HOME} 11#read-only ${HOME}
12# read-write ${HOME}/.local/share/baloo 12#read-write ${HOME}/.local/share/baloo
13# ignore read-write 13#ignore read-write
14 14
15noblacklist ${HOME}/.config/baloofilerc 15noblacklist ${HOME}/.config/baloofilerc
16noblacklist ${HOME}/.kde/share/config/baloofilerc 16noblacklist ${HOME}/.kde/share/config/baloofilerc
@@ -31,7 +31,7 @@ include whitelist-var-common.inc
31apparmor 31apparmor
32caps.drop all 32caps.drop all
33machine-id 33machine-id
34# net none 34#net none
35netfilter 35netfilter
36no3d 36no3d
37nodvd 37nodvd
@@ -46,7 +46,7 @@ novideo
46protocol unix 46protocol unix
47# blacklisting of ioprio_set system calls breaks baloo_file 47# blacklisting of ioprio_set system calls breaks baloo_file
48seccomp !ioprio_set 48seccomp !ioprio_set
49# x11 xorg 49#x11 xorg
50 50
51private-bin baloo_file,baloo_file_extractor,baloo_filemetadata_temp_extractor,kbuildsycoca4 51private-bin baloo_file,baloo_file_extractor,baloo_filemetadata_temp_extractor,kbuildsycoca4
52private-cache 52private-cache
diff --git a/etc/profile-a-l/baobab.profile b/etc/profile-a-l/baobab.profile
index 31ef66a58..942d82941 100644
--- a/etc/profile-a-l/baobab.profile
+++ b/etc/profile-a-l/baobab.profile
@@ -6,13 +6,13 @@ include baobab.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9# include disable-common.inc 9#include disable-common.inc
10include disable-devel.inc 10include disable-devel.inc
11include disable-exec.inc 11include disable-exec.inc
12include disable-interpreters.inc 12include disable-interpreters.inc
13# include disable-programs.inc 13#include disable-programs.inc
14include disable-shell.inc 14include disable-shell.inc
15# include disable-xdg.inc 15#include disable-xdg.inc
16 16
17include whitelist-runuser-common.inc 17include whitelist-runuser-common.inc
18 18
@@ -37,8 +37,8 @@ private-bin baobab
37private-dev 37private-dev
38private-tmp 38private-tmp
39 39
40# dbus-user none 40#dbus-user none
41# dbus-system none 41#dbus-system none
42 42
43read-only ${HOME} 43read-only ${HOME}
44restrict-namespaces 44restrict-namespaces
diff --git a/etc/profile-a-l/bcompare.profile b/etc/profile-a-l/bcompare.profile
index d566b94e8..c0e024445 100644
--- a/etc/profile-a-l/bcompare.profile
+++ b/etc/profile-a-l/bcompare.profile
@@ -19,7 +19,7 @@ include disable-exec.inc
19include disable-interpreters.inc 19include disable-interpreters.inc
20# Add the next line to your bcompare.local if you don't need to compare files in disable-programs.inc. 20# Add the next line to your bcompare.local if you don't need to compare files in disable-programs.inc.
21#include disable-programs.inc 21#include disable-programs.inc
22#include disable-shell.inc - breaks launch 22#include disable-shell.inc # breaks launch
23include disable-write-mnt.inc 23include disable-write-mnt.inc
24 24
25apparmor 25apparmor
diff --git a/etc/profile-a-l/bibletime.profile b/etc/profile-a-l/bibletime.profile
index 3fb2a82c3..dcef2bff1 100644
--- a/etc/profile-a-l/bibletime.profile
+++ b/etc/profile-a-l/bibletime.profile
@@ -48,7 +48,7 @@ protocol unix,inet,inet6,netlink
48seccomp !chroot 48seccomp !chroot
49 49
50disable-mnt 50disable-mnt
51# private-bin bibletime 51#private-bin bibletime
52private-cache 52private-cache
53private-dev 53private-dev
54private-etc @tls-ca,sword,sword.conf 54private-etc @tls-ca,sword,sword.conf
@@ -57,4 +57,4 @@ private-tmp
57dbus-user none 57dbus-user none
58dbus-system none 58dbus-system none
59 59
60# restrict-namespaces 60#restrict-namespaces
diff --git a/etc/profile-a-l/bijiben.profile b/etc/profile-a-l/bijiben.profile
index 53d212e34..e596ec9d2 100644
--- a/etc/profile-a-l/bijiben.profile
+++ b/etc/profile-a-l/bijiben.profile
@@ -48,7 +48,7 @@ tracelog
48 48
49disable-mnt 49disable-mnt
50private-bin bijiben 50private-bin bijiben
51# private-cache -- access to .cache/tracker is required 51#private-cache # access to .cache/tracker is required
52private-dev 52private-dev
53private-etc @x11 53private-etc @x11
54private-tmp 54private-tmp
diff --git a/etc/profile-a-l/bitlbee.profile b/etc/profile-a-l/bitlbee.profile
index 988a1479e..0f10c7ce0 100644
--- a/etc/profile-a-l/bitlbee.profile
+++ b/etc/profile-a-l/bitlbee.profile
@@ -10,7 +10,7 @@ ignore noexec ${HOME}
10 10
11noblacklist /sbin 11noblacklist /sbin
12noblacklist /usr/sbin 12noblacklist /usr/sbin
13# noblacklist /var/log 13#noblacklist /var/log
14 14
15include disable-common.inc 15include disable-common.inc
16include disable-devel.inc 16include disable-devel.inc
diff --git a/etc/profile-a-l/bleachbit.profile b/etc/profile-a-l/bleachbit.profile
index 52d970d89..cd1b059b4 100644
--- a/etc/profile-a-l/bleachbit.profile
+++ b/etc/profile-a-l/bleachbit.profile
@@ -18,7 +18,7 @@ include disable-common.inc
18include disable-devel.inc 18include disable-devel.inc
19include disable-exec.inc 19include disable-exec.inc
20include disable-interpreters.inc 20include disable-interpreters.inc
21# include disable-programs.inc 21#include disable-programs.inc
22 22
23caps.drop all 23caps.drop all
24net none 24net none
@@ -36,11 +36,11 @@ protocol unix
36seccomp 36seccomp
37 37
38private-dev 38private-dev
39# private-tmp 39#private-tmp
40 40
41dbus-user none 41dbus-user none
42dbus-system none 42dbus-system none
43 43
44# memory-deny-write-execute breaks some systems, see issue #1850 44# memory-deny-write-execute breaks some systems, see issue #1850
45# memory-deny-write-execute 45#memory-deny-write-execute
46restrict-namespaces 46restrict-namespaces
diff --git a/etc/profile-a-l/bless.profile b/etc/profile-a-l/bless.profile
index 6dd540943..85f232751 100644
--- a/etc/profile-a-l/bless.profile
+++ b/etc/profile-a-l/bless.profile
@@ -31,7 +31,7 @@ novideo
31protocol unix 31protocol unix
32seccomp 32seccomp
33 33
34# private-bin bash,bless,mono,sh 34#private-bin bash,bless,mono,sh
35private-cache 35private-cache
36private-dev 36private-dev
37private-etc mono 37private-etc mono
diff --git a/etc/profile-a-l/brackets.profile b/etc/profile-a-l/brackets.profile
index a483c2b0a..684504937 100644
--- a/etc/profile-a-l/brackets.profile
+++ b/etc/profile-a-l/brackets.profile
@@ -32,4 +32,4 @@ seccomp !chroot,!ioperm
32private-cache 32private-cache
33private-dev 33private-dev
34 34
35# restrict-namespaces 35#restrict-namespaces
diff --git a/etc/profile-a-l/brasero.profile b/etc/profile-a-l/brasero.profile
index 12d7062ab..92184ef18 100644
--- a/etc/profile-a-l/brasero.profile
+++ b/etc/profile-a-l/brasero.profile
@@ -29,9 +29,9 @@ protocol unix
29seccomp 29seccomp
30tracelog 30tracelog
31 31
32# private-bin brasero 32#private-bin brasero
33private-cache 33private-cache
34# private-dev 34#private-dev
35# private-tmp 35#private-tmp
36 36
37restrict-namespaces 37restrict-namespaces
diff --git a/etc/profile-a-l/build-systems-common.profile b/etc/profile-a-l/build-systems-common.profile
index cf5f462ae..8616996d2 100644
--- a/etc/profile-a-l/build-systems-common.profile
+++ b/etc/profile-a-l/build-systems-common.profile
@@ -39,7 +39,7 @@ include whitelist-var-common.inc
39caps.drop all 39caps.drop all
40ipc-namespace 40ipc-namespace
41machine-id 41machine-id
42# net none 42#net none
43netfilter 43netfilter
44no3d 44no3d
45nodvd 45nodvd
diff --git a/etc/profile-a-l/calibre.profile b/etc/profile-a-l/calibre.profile
index b347941d7..cb9c92ffb 100644
--- a/etc/profile-a-l/calibre.profile
+++ b/etc/profile-a-l/calibre.profile
@@ -36,4 +36,4 @@ seccomp !chroot
36private-dev 36private-dev
37private-tmp 37private-tmp
38 38
39# restrict-namespaces 39#restrict-namespaces
diff --git a/etc/profile-a-l/calligra.profile b/etc/profile-a-l/calligra.profile
index c2972f902..ffb83b2ed 100644
--- a/etc/profile-a-l/calligra.profile
+++ b/etc/profile-a-l/calligra.profile
@@ -15,7 +15,7 @@ include disable-programs.inc
15 15
16caps.drop all 16caps.drop all
17ipc-namespace 17ipc-namespace
18# net none 18#net none
19netfilter 19netfilter
20nodvd 20nodvd
21nogroups 21nogroups
@@ -32,9 +32,9 @@ seccomp.block-secondary
32private-bin calligra,calligraauthor,calligraconverter,calligraflow,calligragemini,calligraplan,calligraplanwork,calligrasheets,calligrastage,calligrawords,dbus-launch,kbuildsycoca4,kdeinit4 32private-bin calligra,calligraauthor,calligraconverter,calligraflow,calligragemini,calligraplan,calligraplanwork,calligrasheets,calligrastage,calligrawords,dbus-launch,kbuildsycoca4,kdeinit4
33private-dev 33private-dev
34 34
35# dbus-user none 35#dbus-user none
36# dbus-system none 36#dbus-system none
37 37
38# noexec ${HOME} 38#noexec ${HOME}
39noexec /tmp 39noexec /tmp
40restrict-namespaces 40restrict-namespaces
diff --git a/etc/profile-a-l/cameramonitor.profile b/etc/profile-a-l/cameramonitor.profile
index df94ac859..4f8fd7187 100644
--- a/etc/profile-a-l/cameramonitor.profile
+++ b/etc/profile-a-l/cameramonitor.profile
@@ -48,8 +48,8 @@ private-cache
48private-etc 48private-etc
49private-tmp 49private-tmp
50 50
51# dbus-user none 51#dbus-user none
52# dbus-system none 52#dbus-system none
53 53
54# memory-deny-write-execute - breaks on Arch 54#memory-deny-write-execute # breaks on Arch
55restrict-namespaces 55restrict-namespaces
diff --git a/etc/profile-a-l/cantata.profile b/etc/profile-a-l/cantata.profile
index 7cb56efee..36c7c1091 100644
--- a/etc/profile-a-l/cantata.profile
+++ b/etc/profile-a-l/cantata.profile
@@ -22,7 +22,7 @@ include disable-programs.inc
22include disable-shell.inc 22include disable-shell.inc
23include disable-xdg.inc 23include disable-xdg.inc
24 24
25# apparmor 25#apparmor
26caps.drop all 26caps.drop all
27ipc-namespace 27ipc-namespace
28netfilter 28netfilter
@@ -34,7 +34,7 @@ novideo
34protocol unix,inet,inet6,netlink 34protocol unix,inet,inet6,netlink
35seccomp 35seccomp
36 36
37# private-etc alternatives,drirc,fonts,gcrypt,hosts,kde5rc,mpd.conf,passwd,samba,ssl,xdg 37#private-etc alternatives,drirc,fonts,gcrypt,hosts,kde5rc,mpd.conf,passwd,samba,ssl,xdg
38private-bin cantata,mpd,perl 38private-bin cantata,mpd,perl
39private-dev 39private-dev
40 40
diff --git a/etc/profile-a-l/catfish.profile b/etc/profile-a-l/catfish.profile
index e2df341e9..037f6ee40 100644
--- a/etc/profile-a-l/catfish.profile
+++ b/etc/profile-a-l/catfish.profile
@@ -15,10 +15,10 @@ noblacklist ${HOME}/.config/catfish
15include allow-python2.inc 15include allow-python2.inc
16include allow-python3.inc 16include allow-python3.inc
17 17
18# include disable-common.inc 18#include disable-common.inc
19# include disable-devel.inc 19#include disable-devel.inc
20include disable-interpreters.inc 20include disable-interpreters.inc
21# include disable-programs.inc 21#include disable-programs.inc
22 22
23whitelist /var/lib/mlocate 23whitelist /var/lib/mlocate
24include whitelist-var-common.inc 24include whitelist-var-common.inc
@@ -40,9 +40,9 @@ tracelog
40 40
41# These options work but are disabled in case 41# These options work but are disabled in case
42# a users wants to search in these directories. 42# a users wants to search in these directories.
43# private-bin bash,catfish,env,locate,ls,mlocate,python* 43#private-bin bash,catfish,env,locate,ls,mlocate,python*
44# private-dev 44#private-dev
45# private-tmp 45#private-tmp
46 46
47dbus-user none 47dbus-user none
48dbus-system none 48dbus-system none
diff --git a/etc/profile-a-l/cawbird.profile b/etc/profile-a-l/cawbird.profile
index 17887b6cc..7fdbc3881 100644
--- a/etc/profile-a-l/cawbird.profile
+++ b/etc/profile-a-l/cawbird.profile
@@ -41,7 +41,7 @@ private-dev
41private-etc @tls-ca,@x11,host.conf,mime.types 41private-etc @tls-ca,@x11,host.conf,mime.types
42private-tmp 42private-tmp
43 43
44# dbus-user none 44#dbus-user none
45dbus-system none 45dbus-system none
46 46
47restrict-namespaces 47restrict-namespaces
diff --git a/etc/profile-a-l/chromium-browser-privacy.profile b/etc/profile-a-l/chromium-browser-privacy.profile
index 8803a4d9d..67a3a43af 100644
--- a/etc/profile-a-l/chromium-browser-privacy.profile
+++ b/etc/profile-a-l/chromium-browser-privacy.profile
@@ -13,7 +13,7 @@ mkdir ${HOME}/.config/ungoogled-chromium
13whitelist ${HOME}/.cache/ungoogled-chromium 13whitelist ${HOME}/.cache/ungoogled-chromium
14whitelist ${HOME}/.config/ungoogled-chromium 14whitelist ${HOME}/.config/ungoogled-chromium
15 15
16# private-bin basename,bash,cat,chromium-browser-privacy,dirname,mkdir,readlink,sed,touch,which,xdg-settings 16#private-bin basename,bash,cat,chromium-browser-privacy,dirname,mkdir,readlink,sed,touch,which,xdg-settings
17 17
18# Redirect 18# Redirect
19include chromium.profile 19include chromium.profile
diff --git a/etc/profile-a-l/chromium-common.profile b/etc/profile-a-l/chromium-common.profile
index 878e0fe1d..37bfa0bfe 100644
--- a/etc/profile-a-l/chromium-common.profile
+++ b/etc/profile-a-l/chromium-common.profile
@@ -33,13 +33,15 @@ include whitelist-run-common.inc
33?BROWSER_DISABLE_U2F: nou2f 33?BROWSER_DISABLE_U2F: nou2f
34 34
35?BROWSER_DISABLE_U2F: private-dev 35?BROWSER_DISABLE_U2F: private-dev
36#private-tmp - issues when using multiple browser sessions 36#private-tmp # issues when using multiple browser sessions
37 37
38blacklist ${PATH}/curl 38blacklist ${PATH}/curl
39blacklist ${PATH}/wget 39blacklist ${PATH}/wget
40blacklist ${PATH}/wget2 40blacklist ${PATH}/wget2
41 41
42#dbus-user none - prevents access to passwords saved in GNOME Keyring and KWallet, also breaks Gnome connector. 42# This prevents access to passwords saved in GNOME Keyring and KWallet, also
43# breaks Gnome connector.
44#dbus-user none
43 45
44# The file dialog needs to work without d-bus. 46# The file dialog needs to work without d-bus.
45?HAS_NODBUS: env NO_CHROME_KDE_FILE_DIALOG=1 47?HAS_NODBUS: env NO_CHROME_KDE_FILE_DIALOG=1
diff --git a/etc/profile-a-l/chromium.profile b/etc/profile-a-l/chromium.profile
index 14f1bbe64..8c43aac9c 100644
--- a/etc/profile-a-l/chromium.profile
+++ b/etc/profile-a-l/chromium.profile
@@ -17,7 +17,7 @@ whitelist ${HOME}/.config/chromium
17whitelist ${HOME}/.config/chromium-flags.conf 17whitelist ${HOME}/.config/chromium-flags.conf
18whitelist /usr/share/chromium 18whitelist /usr/share/chromium
19 19
20# private-bin chromium,chromium-browser,chromedriver 20#private-bin chromium,chromium-browser,chromedriver
21 21
22# Redirect 22# Redirect
23include chromium-common.profile 23include chromium-common.profile
diff --git a/etc/profile-a-l/clac.profile b/etc/profile-a-l/clac.profile
index b654b3890..cd2b2522d 100644
--- a/etc/profile-a-l/clac.profile
+++ b/etc/profile-a-l/clac.profile
@@ -16,10 +16,10 @@ include disable-interpreters.inc
16include disable-proc.inc 16include disable-proc.inc
17include disable-programs.inc 17include disable-programs.inc
18include disable-shell.inc 18include disable-shell.inc
19#include disable-X11.inc - x11 none 19#include disable-X11.inc # x11 none
20include disable-xdg.inc 20include disable-xdg.inc
21 21
22#include whitelist-common.inc - see #903 22#include whitelist-common.inc # see #903
23include whitelist-run-common.inc 23include whitelist-run-common.inc
24include whitelist-runuser-common.inc 24include whitelist-runuser-common.inc
25include whitelist-usr-share-common.inc 25include whitelist-usr-share-common.inc
diff --git a/etc/profile-a-l/claws-mail.profile b/etc/profile-a-l/claws-mail.profile
index 7fefc68b1..53db480a4 100644
--- a/etc/profile-a-l/claws-mail.profile
+++ b/etc/profile-a-l/claws-mail.profile
@@ -18,7 +18,7 @@ whitelist ${HOME}/.claws-mail
18 18
19whitelist /usr/share/doc/claws-mail 19whitelist /usr/share/doc/claws-mail
20 20
21# private-bin claws-mail,curl,gpg,gpg2,gpg-agent,gpgsm,gpgme-config,pinentry,pinentry-gtk-2 21#private-bin claws-mail,curl,gpg,gpg2,gpg-agent,gpgsm,gpgme-config,pinentry,pinentry-gtk-2
22 22
23# Redirect 23# Redirect
24include email-common.profile 24include email-common.profile
diff --git a/etc/profile-a-l/clawsker.profile b/etc/profile-a-l/clawsker.profile
index 3b8eb7bbd..37d9e9e3a 100644
--- a/etc/profile-a-l/clawsker.profile
+++ b/etc/profile-a-l/clawsker.profile
@@ -50,5 +50,5 @@ private-tmp
50dbus-user none 50dbus-user none
51dbus-system none 51dbus-system none
52 52
53#memory-deny-write-execute - breaks on Arch (see issue #1803) 53#memory-deny-write-execute # breaks on Arch (see issue #1803)
54restrict-namespaces 54restrict-namespaces
diff --git a/etc/profile-a-l/clementine.profile b/etc/profile-a-l/clementine.profile
index ee01fa653..3e9363bb4 100644
--- a/etc/profile-a-l/clementine.profile
+++ b/etc/profile-a-l/clementine.profile
@@ -37,6 +37,6 @@ private-dev
37private-tmp 37private-tmp
38 38
39dbus-system none 39dbus-system none
40# dbus-user none 40#dbus-user none
41 41
42restrict-namespaces 42restrict-namespaces
diff --git a/etc/profile-a-l/clion.profile b/etc/profile-a-l/clion.profile
index 652809f1b..0cea1c7d4 100644
--- a/etc/profile-a-l/clion.profile
+++ b/etc/profile-a-l/clion.profile
@@ -37,7 +37,7 @@ seccomp
37 37
38private-cache 38private-cache
39private-dev 39private-dev
40# private-tmp 40#private-tmp
41 41
42noexec /tmp 42noexec /tmp
43restrict-namespaces 43restrict-namespaces
diff --git a/etc/profile-a-l/clipgrab.profile b/etc/profile-a-l/clipgrab.profile
index 3f3748e1a..2657876b8 100644
--- a/etc/profile-a-l/clipgrab.profile
+++ b/etc/profile-a-l/clipgrab.profile
@@ -46,7 +46,7 @@ private-dev
46private-tmp 46private-tmp
47 47
48# 'dbus-user none' breaks tray menu - add 'dbus-user none' to your clipgrab.local if you don't need it. 48# 'dbus-user none' breaks tray menu - add 'dbus-user none' to your clipgrab.local if you don't need it.
49# dbus-user none 49#dbus-user none
50# dbus-system none 50#dbus-system none
51 51
52# restrict-namespaces 52#restrict-namespaces
diff --git a/etc/profile-a-l/code.profile b/etc/profile-a-l/code.profile
index 19862bc92..1b69effc3 100644
--- a/etc/profile-a-l/code.profile
+++ b/etc/profile-a-l/code.profile
@@ -35,7 +35,7 @@ nosound
35# Disabling noexec ${HOME} for now since it will 35# Disabling noexec ${HOME} for now since it will
36# probably interfere with running some programmes 36# probably interfere with running some programmes
37# in VS Code 37# in VS Code
38# noexec ${HOME} 38#noexec ${HOME}
39noexec /tmp 39noexec /tmp
40 40
41# Redirect 41# Redirect
diff --git a/etc/profile-a-l/com.github.bleakgrey.tootle.profile b/etc/profile-a-l/com.github.bleakgrey.tootle.profile
index 180282869..b1275e96b 100644
--- a/etc/profile-a-l/com.github.bleakgrey.tootle.profile
+++ b/etc/profile-a-l/com.github.bleakgrey.tootle.profile
@@ -48,9 +48,9 @@ private-etc @tls-ca,@x11,host.conf,mime.types
48private-tmp 48private-tmp
49 49
50# Settings are immutable 50# Settings are immutable
51# dbus-user filter 51#dbus-user filter
52# dbus-user.own com.github.bleakgrey.tootle 52#dbus-user.own com.github.bleakgrey.tootle
53# dbus-user.talk ca.desrt.dconf 53#dbus-user.talk ca.desrt.dconf
54dbus-system none 54dbus-system none
55 55
56restrict-namespaces 56restrict-namespaces
diff --git a/etc/profile-a-l/cower.profile b/etc/profile-a-l/cower.profile
index 9b05b4416..c280cf22a 100644
--- a/etc/profile-a-l/cower.profile
+++ b/etc/profile-a-l/cower.profile
@@ -19,8 +19,8 @@ include disable-shell.inc
19include disable-xdg.inc 19include disable-xdg.inc
20 20
21# This profile could be significantly strengthened by adding the following to cower.local 21# This profile could be significantly strengthened by adding the following to cower.local
22# whitelist ${HOME}/<Your Build Folder> 22#whitelist ${HOME}/<Your Build Folder>
23# whitelist ${HOME}/.config/cower 23#whitelist ${HOME}/.config/cower
24 24
25caps.drop all 25caps.drop all
26ipc-namespace 26ipc-namespace
diff --git a/etc/profile-a-l/curl.profile b/etc/profile-a-l/curl.profile
index bfe8764d5..42ade7ce9 100644
--- a/etc/profile-a-l/curl.profile
+++ b/etc/profile-a-l/curl.profile
@@ -50,10 +50,10 @@ protocol inet,inet6
50seccomp 50seccomp
51tracelog 51tracelog
52 52
53# private-bin curl 53#private-bin curl
54private-cache 54private-cache
55private-dev 55private-dev
56# private-etc alternatives,ca-certificates,crypto-policies,pki,resolv.conf,ssl 56#private-etc alternatives,ca-certificates,crypto-policies,pki,resolv.conf,ssl
57private-etc @tls-ca 57private-etc @tls-ca
58private-tmp 58private-tmp
59 59
diff --git a/etc/profile-a-l/cyberfox.profile b/etc/profile-a-l/cyberfox.profile
index a303c5979..c7a42e0eb 100644
--- a/etc/profile-a-l/cyberfox.profile
+++ b/etc/profile-a-l/cyberfox.profile
@@ -15,7 +15,7 @@ whitelist ${HOME}/.cache/8pecxstudios
15whitelist /usr/share/8pecxstudios 15whitelist /usr/share/8pecxstudios
16whitelist /usr/share/cyberfox 16whitelist /usr/share/cyberfox
17 17
18# private-bin cyberfox,dbus-launch,dbus-send,env,sh,which 18#private-bin cyberfox,dbus-launch,dbus-send,env,sh,which
19# private-etc must first be enabled in firefox-common.profile 19# private-etc must first be enabled in firefox-common.profile
20#private-etc cyberfox 20#private-etc cyberfox
21 21
diff --git a/etc/profile-a-l/d-feet.profile b/etc/profile-a-l/d-feet.profile
index 7dd5ca260..75338eb6d 100644
--- a/etc/profile-a-l/d-feet.profile
+++ b/etc/profile-a-l/d-feet.profile
@@ -31,7 +31,7 @@ include whitelist-var-common.inc
31apparmor 31apparmor
32caps.drop all 32caps.drop all
33ipc-namespace 33ipc-namespace
34# net none - breaks on Ubuntu 34#net none # breaks on Ubuntu
35no3d 35no3d
36nodvd 36nodvd
37nogroups 37nogroups
@@ -52,5 +52,5 @@ private-dev
52private-etc dbus-1 52private-etc dbus-1
53private-tmp 53private-tmp
54 54
55#memory-deny-write-execute - breaks on Arch (see issue #1803) 55#memory-deny-write-execute # breaks on Arch (see issue #1803)
56restrict-namespaces 56restrict-namespaces
diff --git a/etc/profile-a-l/dconf-editor.profile b/etc/profile-a-l/dconf-editor.profile
index e2e2492bc..e8acd60b7 100644
--- a/etc/profile-a-l/dconf-editor.profile
+++ b/etc/profile-a-l/dconf-editor.profile
@@ -22,7 +22,7 @@ include whitelist-var-common.inc
22 22
23apparmor 23apparmor
24caps.drop all 24caps.drop all
25# net none - breaks application on older versions 25#net none # breaks application on older versions
26no3d 26no3d
27nodvd 27nodvd
28nogroups 28nogroups
diff --git a/etc/profile-a-l/ddgtk.profile b/etc/profile-a-l/ddgtk.profile
index 9811c90d6..0fa88f232 100644
--- a/etc/profile-a-l/ddgtk.profile
+++ b/etc/profile-a-l/ddgtk.profile
@@ -50,5 +50,5 @@ private-tmp
50dbus-user none 50dbus-user none
51dbus-system none 51dbus-system none
52 52
53# memory-deny-write-execute - breaks on Arch 53#memory-deny-write-execute # breaks on Arch
54restrict-namespaces 54restrict-namespaces
diff --git a/etc/profile-a-l/default.profile b/etc/profile-a-l/default.profile
index 377c4e2e3..c071da4b7 100644
--- a/etc/profile-a-l/default.profile
+++ b/etc/profile-a-l/default.profile
@@ -9,54 +9,54 @@ include globals.local
9# depending on your usage, you can enable some of the commands below: 9# depending on your usage, you can enable some of the commands below:
10 10
11include disable-common.inc 11include disable-common.inc
12# include disable-devel.inc 12#include disable-devel.inc
13# include disable-exec.inc 13#include disable-exec.inc
14# include disable-interpreters.inc 14#include disable-interpreters.inc
15include disable-programs.inc 15include disable-programs.inc
16# include disable-shell.inc 16#include disable-shell.inc
17# include disable-write-mnt.inc 17#include disable-write-mnt.inc
18# include disable-xdg.inc 18#include disable-xdg.inc
19 19
20# include whitelist-common.inc 20#include whitelist-common.inc
21# include whitelist-runuser-common.inc 21#include whitelist-runuser-common.inc
22# include whitelist-usr-share-common.inc 22#include whitelist-usr-share-common.inc
23# include whitelist-var-common.inc 23#include whitelist-var-common.inc
24 24
25# apparmor 25#apparmor
26caps.drop all 26caps.drop all
27# ipc-namespace 27#ipc-namespace
28# machine-id 28#machine-id
29# net none 29#net none
30netfilter 30netfilter
31# no3d 31#no3d
32# nodvd 32#nodvd
33# nogroups 33#nogroups
34noinput 34noinput
35nonewprivs 35nonewprivs
36noroot 36noroot
37# nosound 37#nosound
38notv 38notv
39# nou2f 39#nou2f
40novideo 40novideo
41protocol unix,inet,inet6 41protocol unix,inet,inet6
42seccomp 42seccomp
43# tracelog 43#tracelog
44 44
45# disable-mnt 45#disable-mnt
46# private 46#private
47# private-bin program 47#private-bin program
48# private-cache 48#private-cache
49private-dev 49private-dev
50# see /usr/share/doc/firejail/profile.template for more common private-etc paths. 50# see /usr/share/doc/firejail/profile.template for more common private-etc paths.
51# private-etc alternatives,fonts,machine-id 51#private-etc alternatives,fonts,machine-id
52# private-lib 52#private-lib
53# private-opt none 53#private-opt none
54private-tmp 54private-tmp
55 55
56# dbus-user none 56#dbus-user none
57# dbus-system none 57#dbus-system none
58 58
59# deterministic-shutdown 59#deterministic-shutdown
60# memory-deny-write-execute 60#memory-deny-write-execute
61# read-only ${HOME} 61#read-only ${HOME}
62restrict-namespaces 62restrict-namespaces
diff --git a/etc/profile-a-l/deluge.profile b/etc/profile-a-l/deluge.profile
index ebc751e1a..b257f9a4c 100644
--- a/etc/profile-a-l/deluge.profile
+++ b/etc/profile-a-l/deluge.profile
@@ -13,7 +13,7 @@ include allow-python2.inc
13include allow-python3.inc 13include allow-python3.inc
14 14
15include disable-common.inc 15include disable-common.inc
16# include disable-devel.inc 16#include disable-devel.inc
17include disable-exec.inc 17include disable-exec.inc
18include disable-interpreters.inc 18include disable-interpreters.inc
19include disable-programs.inc 19include disable-programs.inc
diff --git a/etc/profile-a-l/devhelp.profile b/etc/profile-a-l/devhelp.profile
index 066cdc8b0..7b5e692a0 100644
--- a/etc/profile-a-l/devhelp.profile
+++ b/etc/profile-a-l/devhelp.profile
@@ -23,7 +23,7 @@ include whitelist-usr-share-common.inc
23 23
24apparmor 24apparmor
25caps.drop all 25caps.drop all
26# net none - makes settings immutable 26#net none # makes settings immutable
27nodvd 27nodvd
28nogroups 28nogroups
29noinput 29noinput
@@ -45,9 +45,9 @@ private-etc @tls-ca,@x11
45private-tmp 45private-tmp
46 46
47# makes settings immutable 47# makes settings immutable
48# dbus-user none 48#dbus-user none
49# dbus-system none 49#dbus-system none
50 50
51#memory-deny-write-execute - breaks on Arch (see issue #1803) 51#memory-deny-write-execute # breaks on Arch (see issue #1803)
52read-only ${HOME} 52read-only ${HOME}
53restrict-namespaces 53restrict-namespaces
diff --git a/etc/profile-a-l/dig.profile b/etc/profile-a-l/dig.profile
index 7c0fee9c3..781dfdcbc 100644
--- a/etc/profile-a-l/dig.profile
+++ b/etc/profile-a-l/dig.profile
@@ -14,13 +14,13 @@ blacklist /tmp/.X11-unix
14blacklist ${RUNUSER} 14blacklist ${RUNUSER}
15 15
16include disable-common.inc 16include disable-common.inc
17# include disable-devel.inc 17#include disable-devel.inc
18include disable-exec.inc 18include disable-exec.inc
19# include disable-interpreters.inc 19#include disable-interpreters.inc
20include disable-programs.inc 20include disable-programs.inc
21include disable-xdg.inc 21include disable-xdg.inc
22 22
23#mkfile ${HOME}/.digrc - see #903 23#mkfile ${HOME}/.digrc # see #903
24whitelist ${HOME}/.digrc 24whitelist ${HOME}/.digrc
25include whitelist-common.inc 25include whitelist-common.inc
26include whitelist-usr-share-common.inc 26include whitelist-usr-share-common.inc
diff --git a/etc/profile-a-l/digikam.profile b/etc/profile-a-l/digikam.profile
index 05f0dfba8..34d4081d4 100644
--- a/etc/profile-a-l/digikam.profile
+++ b/etc/profile-a-l/digikam.profile
@@ -37,11 +37,13 @@ protocol unix,inet,inet6,netlink
37# QtWebengine needs chroot to set up its own sandbox 37# QtWebengine needs chroot to set up its own sandbox
38seccomp !chroot 38seccomp !chroot
39 39
40# private-dev - prevents libdc1394 loading; this lib is used to connect to a camera device 40# private-dev prevents libdc1394 from loading; this lib is used to connect to a
41# private-etc alternatives,ca-certificates,crypto-policies,pki,ssl 41# camera device
42#private-dev
43#private-etc alternatives,ca-certificates,crypto-policies,pki,ssl
42private-tmp 44private-tmp
43 45
44# dbus-user none 46#dbus-user none
45# dbus-system none 47#dbus-system none
46 48
47# restrict-namespaces 49#restrict-namespaces
diff --git a/etc/profile-a-l/dino.profile b/etc/profile-a-l/dino.profile
index fe2b59a1e..44a3f0846 100644
--- a/etc/profile-a-l/dino.profile
+++ b/etc/profile-a-l/dino.profile
@@ -40,7 +40,8 @@ tracelog
40disable-mnt 40disable-mnt
41private-bin dino 41private-bin dino
42private-dev 42private-dev
43# private-etc alternatives,ca-certificates,crypto-policies,fonts,pki,ssl -- breaks server connection 43# breaks server connection
44#private-etc alternatives,ca-certificates,crypto-policies,fonts,pki,ssl
44private-tmp 45private-tmp
45 46
46dbus-user filter 47dbus-user filter
diff --git a/etc/profile-a-l/display.profile b/etc/profile-a-l/display.profile
index bf77828be..40e19dfc3 100644
--- a/etc/profile-a-l/display.profile
+++ b/etc/profile-a-l/display.profile
@@ -34,7 +34,7 @@ notv
34nou2f 34nou2f
35protocol unix 35protocol unix
36seccomp 36seccomp
37# x11 xorg - problems on kubuntu 17.04 37#x11 xorg # problems on kubuntu 17.04
38 38
39private-bin display,python* 39private-bin display,python*
40private-dev 40private-dev
diff --git a/etc/profile-a-l/dolphin-emu.profile b/etc/profile-a-l/dolphin-emu.profile
index 9743ebfbd..0ae09ce7e 100644
--- a/etc/profile-a-l/dolphin-emu.profile
+++ b/etc/profile-a-l/dolphin-emu.profile
@@ -36,7 +36,7 @@ apparmor
36caps.drop all 36caps.drop all
37ipc-namespace 37ipc-namespace
38# Add the next line to your dolphin-emu.local if you do not need NetPlay support. 38# Add the next line to your dolphin-emu.local if you do not need NetPlay support.
39# net none 39#net none
40netfilter 40netfilter
41# Add the next line to your dolphin-emu.local if you do not need disc support. 41# Add the next line to your dolphin-emu.local if you do not need disc support.
42#nodvd 42#nodvd
diff --git a/etc/profile-a-l/drawio.profile b/etc/profile-a-l/drawio.profile
index 79366b8ee..c9daa939a 100644
--- a/etc/profile-a-l/drawio.profile
+++ b/etc/profile-a-l/drawio.profile
@@ -39,7 +39,7 @@ nou2f
39novideo 39novideo
40protocol unix 40protocol unix
41seccomp !chroot 41seccomp !chroot
42# tracelog - breaks on Arch 42#tracelog # breaks on Arch
43 43
44private-bin drawio 44private-bin drawio
45private-cache 45private-cache
@@ -50,5 +50,5 @@ private-tmp
50dbus-user none 50dbus-user none
51dbus-system none 51dbus-system none
52 52
53# memory-deny-write-execute - breaks on Arch 53#memory-deny-write-execute # breaks on Arch
54# restrict-namespaces 54#restrict-namespaces
diff --git a/etc/profile-a-l/drill.profile b/etc/profile-a-l/drill.profile
index bea114dd6..63dfd6c0d 100644
--- a/etc/profile-a-l/drill.profile
+++ b/etc/profile-a-l/drill.profile
@@ -13,9 +13,9 @@ blacklist /tmp/.X11-unix
13blacklist ${RUNUSER} 13blacklist ${RUNUSER}
14 14
15include disable-common.inc 15include disable-common.inc
16# include disable-devel.inc 16#include disable-devel.inc
17include disable-exec.inc 17include disable-exec.inc
18# include disable-interpreters.inc 18#include disable-interpreters.inc
19include disable-programs.inc 19include disable-programs.inc
20include disable-xdg.inc 20include disable-xdg.inc
21 21
diff --git a/etc/profile-a-l/easystroke.profile b/etc/profile-a-l/easystroke.profile
index 40fd8be7c..3fd5578e6 100644
--- a/etc/profile-a-l/easystroke.profile
+++ b/etc/profile-a-l/easystroke.profile
@@ -49,8 +49,8 @@ private-etc
49#private-lib gdk-pixbuf-2.*,gio,gvfs/libgvfscommon.so,libgconf-2.so.*,librsvg-2.so.* 49#private-lib gdk-pixbuf-2.*,gio,gvfs/libgvfscommon.so,libgconf-2.so.*,librsvg-2.so.*
50private-tmp 50private-tmp
51 51
52# dbus-user none 52#dbus-user none
53# dbus-system none 53#dbus-system none
54 54
55memory-deny-write-execute 55memory-deny-write-execute
56restrict-namespaces 56restrict-namespaces
diff --git a/etc/profile-a-l/electrum.profile b/etc/profile-a-l/electrum.profile
index 48ce0aa22..d73ed9092 100644
--- a/etc/profile-a-l/electrum.profile
+++ b/etc/profile-a-l/electrum.profile
@@ -49,7 +49,7 @@ private-dev
49private-etc @tls-ca,@x11 49private-etc @tls-ca,@x11
50private-tmp 50private-tmp
51 51
52# dbus-user none 52#dbus-user none
53# dbus-system none 53#dbus-system none
54 54
55restrict-namespaces 55restrict-namespaces
diff --git a/etc/profile-a-l/email-common.profile b/etc/profile-a-l/email-common.profile
index 8eee662ad..cffa85fd5 100644
--- a/etc/profile-a-l/email-common.profile
+++ b/etc/profile-a-l/email-common.profile
@@ -75,7 +75,7 @@ seccomp
75seccomp.block-secondary 75seccomp.block-secondary
76tracelog 76tracelog
77 77
78# disable-mnt 78#disable-mnt
79private-cache 79private-cache
80private-dev 80private-dev
81private-etc @tls-ca,@x11,bogofilter,bogofilter.cf,gnupg,hosts.conf,mailname,timezone 81private-etc @tls-ca,@x11,bogofilter,bogofilter.cf,gnupg,hosts.conf,mailname,timezone
diff --git a/etc/profile-a-l/engrampa.profile b/etc/profile-a-l/engrampa.profile
index e1d107dc7..24e4f8a0e 100644
--- a/etc/profile-a-l/engrampa.profile
+++ b/etc/profile-a-l/engrampa.profile
@@ -35,9 +35,9 @@ seccomp
35seccomp.block-secondary 35seccomp.block-secondary
36tracelog 36tracelog
37 37
38# private-bin engrampa 38#private-bin engrampa
39private-dev 39private-dev
40# private-tmp 40#private-tmp
41 41
42dbus-user filter 42dbus-user filter
43dbus-user.talk ca.desrt.dconf 43dbus-user.talk ca.desrt.dconf
diff --git a/etc/profile-a-l/enpass.profile b/etc/profile-a-l/enpass.profile
index 45a1125b4..93929c6ea 100644
--- a/etc/profile-a-l/enpass.profile
+++ b/etc/profile-a-l/enpass.profile
@@ -58,5 +58,5 @@ private-dev
58private-opt Enpass 58private-opt Enpass
59private-tmp 59private-tmp
60 60
61#memory-deny-write-execute - breaks on Arch (see issue #1803) 61#memory-deny-write-execute # breaks on Arch (see issue #1803)
62restrict-namespaces 62restrict-namespaces
diff --git a/etc/profile-a-l/ephemeral.profile b/etc/profile-a-l/ephemeral.profile
index 8b32d08b1..795128418 100644
--- a/etc/profile-a-l/ephemeral.profile
+++ b/etc/profile-a-l/ephemeral.profile
@@ -59,7 +59,7 @@ private-cache
59private-tmp 59private-tmp
60 60
61# breaks preferences 61# breaks preferences
62# dbus-user none 62#dbus-user none
63# dbus-system none 63#dbus-system none
64 64
65restrict-namespaces 65restrict-namespaces
diff --git a/etc/profile-a-l/etr.profile b/etc/profile-a-l/etr.profile
index 5b9892af3..4789afee6 100644
--- a/etc/profile-a-l/etr.profile
+++ b/etc/profile-a-l/etr.profile
@@ -48,7 +48,7 @@ disable-mnt
48private-bin etr 48private-bin etr
49private-cache 49private-cache
50private-dev 50private-dev
51# private-etc alternatives,drirc,machine-id,openal,passwd 51#private-etc alternatives,drirc,machine-id,openal,passwd
52private-etc @games,@x11 52private-etc @games,@x11
53private-tmp 53private-tmp
54 54
diff --git a/etc/profile-a-l/evince.profile b/etc/profile-a-l/evince.profile
index 75a3958ad..06a4a64b1 100644
--- a/etc/profile-a-l/evince.profile
+++ b/etc/profile-a-l/evince.profile
@@ -34,7 +34,7 @@ include whitelist-var-common.inc
34 34
35caps.drop all 35caps.drop all
36machine-id 36machine-id
37# net none - breaks AppArmor on Ubuntu systems 37#net none # breaks AppArmor on Ubuntu systems
38netfilter 38netfilter
39no3d 39no3d
40nodvd 40nodvd
diff --git a/etc/profile-a-l/falkon.profile b/etc/profile-a-l/falkon.profile
index d805766eb..2a30d2e23 100644
--- a/etc/profile-a-l/falkon.profile
+++ b/etc/profile-a-l/falkon.profile
@@ -41,17 +41,17 @@ nou2f
41protocol unix,inet,inet6,netlink 41protocol unix,inet,inet6,netlink
42# blacklisting of chroot system calls breaks falkon 42# blacklisting of chroot system calls breaks falkon
43seccomp !chroot 43seccomp !chroot
44# tracelog 44#tracelog
45 45
46disable-mnt 46disable-mnt
47# private-bin falkon 47#private-bin falkon
48private-cache 48private-cache
49private-dev 49private-dev
50private-etc @tls-ca,@x11,adobe,mailcap,mime.types 50private-etc @tls-ca,@x11,adobe,mailcap,mime.types
51private-tmp 51private-tmp
52 52
53# dbus-user filter 53#dbus-user filter
54# dbus-user.own org.kde.Falkon 54#dbus-user.own org.kde.Falkon
55dbus-system none 55dbus-system none
56 56
57# restrict-namespaces 57#restrict-namespaces
diff --git a/etc/profile-a-l/fdns.profile b/etc/profile-a-l/fdns.profile
index fe7f88a75..e9d5709ec 100644
--- a/etc/profile-a-l/fdns.profile
+++ b/etc/profile-a-l/fdns.profile
@@ -24,7 +24,7 @@ include disable-xdg.inc
24apparmor /usr/bin/fdns 24apparmor /usr/bin/fdns
25caps.keep kill,net_bind_service,setgid,setuid,sys_admin,sys_chroot 25caps.keep kill,net_bind_service,setgid,setuid,sys_admin,sys_chroot
26ipc-namespace 26ipc-namespace
27# netfilter /etc/firejail/webserver.net 27#netfilter /etc/firejail/webserver.net
28no3d 28no3d
29nodvd 29nodvd
30nogroups 30nogroups
@@ -43,7 +43,7 @@ private-bin bash,fdns,sh
43private-cache 43private-cache
44#private-dev 44#private-dev
45private-etc @tls-ca,fdns 45private-etc @tls-ca,fdns
46# private-lib 46#private-lib
47private-tmp 47private-tmp
48 48
49memory-deny-write-execute 49memory-deny-write-execute
diff --git a/etc/profile-a-l/feedreader.profile b/etc/profile-a-l/feedreader.profile
index 6aa24cc86..7b205a917 100644
--- a/etc/profile-a-l/feedreader.profile
+++ b/etc/profile-a-l/feedreader.profile
@@ -29,13 +29,13 @@ include whitelist-var-common.inc
29 29
30caps.drop all 30caps.drop all
31netfilter 31netfilter
32# no3d 32#no3d
33nodvd 33nodvd
34nogroups 34nogroups
35noinput 35noinput
36nonewprivs 36nonewprivs
37noroot 37noroot
38# nosound 38#nosound
39notv 39notv
40nou2f 40nou2f
41novideo 41novideo
diff --git a/etc/profile-a-l/ferdi.profile b/etc/profile-a-l/ferdi.profile
index 3a044542f..27920620a 100644
--- a/etc/profile-a-l/ferdi.profile
+++ b/etc/profile-a-l/ferdi.profile
@@ -45,4 +45,4 @@ disable-mnt
45private-dev 45private-dev
46private-tmp 46private-tmp
47 47
48# restrict-namespaces 48#restrict-namespaces
diff --git a/etc/profile-a-l/ffmpeg.profile b/etc/profile-a-l/ffmpeg.profile
index b7d54f05d..af9d556db 100644
--- a/etc/profile-a-l/ffmpeg.profile
+++ b/etc/profile-a-l/ffmpeg.profile
@@ -53,5 +53,5 @@ private-tmp
53dbus-user none 53dbus-user none
54dbus-system none 54dbus-system none
55 55
56# memory-deny-write-execute - it breaks old versions of ffmpeg 56#memory-deny-write-execute # it breaks old versions of ffmpeg
57restrict-namespaces 57restrict-namespaces
diff --git a/etc/profile-a-l/file-roller.profile b/etc/profile-a-l/file-roller.profile
index 78e2751b3..b32f7595c 100644
--- a/etc/profile-a-l/file-roller.profile
+++ b/etc/profile-a-l/file-roller.profile
@@ -22,7 +22,7 @@ include whitelist-var-common.inc
22apparmor 22apparmor
23caps.drop all 23caps.drop all
24machine-id 24machine-id
25# net none - breaks on older Ubuntu versions 25#net none # breaks on older Ubuntu versions
26netfilter 26netfilter
27no3d 27no3d
28nodvd 28nodvd
@@ -44,7 +44,7 @@ private-bin 7z,7za,7zr,ar,arj,atool,bash,brotli,bsdtar,bzip2,compress,cp,cpio,dp
44private-cache 44private-cache
45private-dev 45private-dev
46private-etc @x11 46private-etc @x11
47# private-tmp 47#private-tmp
48 48
49dbus-user filter 49dbus-user filter
50dbus-user.own org.gnome.ArchiveManager1 50dbus-user.own org.gnome.ArchiveManager1
diff --git a/etc/profile-a-l/font-manager.profile b/etc/profile-a-l/font-manager.profile
index 88ae56c82..5b9603243 100644
--- a/etc/profile-a-l/font-manager.profile
+++ b/etc/profile-a-l/font-manager.profile
@@ -33,7 +33,7 @@ include whitelist-var-common.inc
33apparmor 33apparmor
34caps.drop all 34caps.drop all
35machine-id 35machine-id
36# net none - issues on older versions 36#net none # issues on older versions
37no3d 37no3d
38nodvd 38nodvd
39nogroups 39nogroups
@@ -53,5 +53,5 @@ private-bin font-manager,python*,yelp
53private-dev 53private-dev
54private-tmp 54private-tmp
55 55
56#memory-deny-write-execute - breaks on Arch (see issue #1803) 56#memory-deny-write-execute # breaks on Arch (see issue #1803)
57restrict-namespaces 57restrict-namespaces
diff --git a/etc/profile-a-l/franz.profile b/etc/profile-a-l/franz.profile
index e21789d73..664773b77 100644
--- a/etc/profile-a-l/franz.profile
+++ b/etc/profile-a-l/franz.profile
@@ -45,4 +45,4 @@ disable-mnt
45private-dev 45private-dev
46private-tmp 46private-tmp
47 47
48# restrict-namespaces 48#restrict-namespaces
diff --git a/etc/profile-a-l/frozen-bubble.profile b/etc/profile-a-l/frozen-bubble.profile
index f162a4a31..98f473654 100644
--- a/etc/profile-a-l/frozen-bubble.profile
+++ b/etc/profile-a-l/frozen-bubble.profile
@@ -41,7 +41,7 @@ seccomp
41tracelog 41tracelog
42 42
43disable-mnt 43disable-mnt
44# private-bin frozen-bubble 44#private-bin frozen-bubble
45private-dev 45private-dev
46private-etc @games,@x11 46private-etc @games,@x11
47private-tmp 47private-tmp
diff --git a/etc/profile-a-l/funnyboat.profile b/etc/profile-a-l/funnyboat.profile
index 8ca349d1c..bd790cab4 100644
--- a/etc/profile-a-l/funnyboat.profile
+++ b/etc/profile-a-l/funnyboat.profile
@@ -16,7 +16,7 @@ include disable-devel.inc
16include disable-exec.inc 16include disable-exec.inc
17include disable-interpreters.inc 17include disable-interpreters.inc
18include disable-programs.inc 18include disable-programs.inc
19# include disable-shell.inc 19#include disable-shell.inc
20include disable-xdg.inc 20include disable-xdg.inc
21 21
22mkdir ${HOME}/.funnyboat 22mkdir ${HOME}/.funnyboat
@@ -41,7 +41,7 @@ notv
41novideo 41novideo
42protocol unix,inet,inet6 42protocol unix,inet,inet6
43seccomp 43seccomp
44# tracelog 44#tracelog
45 45
46disable-mnt 46disable-mnt
47private-cache 47private-cache
diff --git a/etc/profile-a-l/galculator.profile b/etc/profile-a-l/galculator.profile
index 44d62cc86..aa1b96c41 100644
--- a/etc/profile-a-l/galculator.profile
+++ b/etc/profile-a-l/galculator.profile
@@ -48,5 +48,5 @@ private-tmp
48dbus-user none 48dbus-user none
49dbus-system none 49dbus-system none
50 50
51#memory-deny-write-execute - breaks on Arch (see issue #1803) 51#memory-deny-write-execute # breaks on Arch (see issue #1803)
52restrict-namespaces 52restrict-namespaces
diff --git a/etc/profile-a-l/geary.profile b/etc/profile-a-l/geary.profile
index ba0837780..da240c36a 100644
--- a/etc/profile-a-l/geary.profile
+++ b/etc/profile-a-l/geary.profile
@@ -53,7 +53,7 @@ include whitelist-var-common.inc
53 53
54apparmor 54apparmor
55caps.drop all 55caps.drop all
56#ipc-namespace - may cause issues with X11 56#ipc-namespace # may cause issues with X11
57#machine-id 57#machine-id
58netfilter 58netfilter
59no3d 59no3d
@@ -71,7 +71,7 @@ seccomp
71seccomp.block-secondary 71seccomp.block-secondary
72tracelog 72tracelog
73 73
74# disable-mnt 74#disable-mnt
75#private-bin geary,sh 75#private-bin geary,sh
76private-cache 76private-cache
77private-dev 77private-dev
diff --git a/etc/profile-a-l/gedit.profile b/etc/profile-a-l/gedit.profile
index dbb3ab971..bc265a509 100644
--- a/etc/profile-a-l/gedit.profile
+++ b/etc/profile-a-l/gedit.profile
@@ -13,18 +13,18 @@ noblacklist ${HOME}/.config/gedit
13include allow-common-devel.inc 13include allow-common-devel.inc
14 14
15include disable-common.inc 15include disable-common.inc
16# include disable-devel.inc 16#include disable-devel.inc
17include disable-exec.inc 17include disable-exec.inc
18# include disable-interpreters.inc 18#include disable-interpreters.inc
19include disable-programs.inc 19include disable-programs.inc
20 20
21include whitelist-runuser-common.inc 21include whitelist-runuser-common.inc
22include whitelist-var-common.inc 22include whitelist-var-common.inc
23 23
24# apparmor - makes settings immutable 24#apparmor # makes settings immutable
25caps.drop all 25caps.drop all
26machine-id 26machine-id
27# net none - makes settings immutable 27#net none # makes settings immutable
28no3d 28no3d
29nodvd 29nodvd
30nogroups 30nogroups
@@ -40,14 +40,14 @@ seccomp
40seccomp.block-secondary 40seccomp.block-secondary
41tracelog 41tracelog
42 42
43# private-bin gedit 43#private-bin gedit
44private-dev 44private-dev
45# private-lib breaks python plugins - add the next line to your gedit.local if you don't use them. 45# private-lib breaks python plugins - add the next line to your gedit.local if you don't use them.
46#private-lib aspell,gconv,gedit,libgspell-1.so.*,libgtksourceview-*,libpeas-gtk-1.0.so.*,libreadline.so.*,libtinfo.so.* 46#private-lib aspell,gconv,gedit,libgspell-1.so.*,libgtksourceview-*,libpeas-gtk-1.0.so.*,libreadline.so.*,libtinfo.so.*
47private-tmp 47private-tmp
48 48
49# makes settings immutable 49# makes settings immutable
50# dbus-user none 50#dbus-user none
51# dbus-system none 51#dbus-system none
52 52
53restrict-namespaces 53restrict-namespaces
diff --git a/etc/profile-a-l/geekbench.profile b/etc/profile-a-l/geekbench.profile
index e8d4c013f..387ec615f 100644
--- a/etc/profile-a-l/geekbench.profile
+++ b/etc/profile-a-l/geekbench.profile
@@ -43,7 +43,7 @@ seccomp
43tracelog 43tracelog
44 44
45disable-mnt 45disable-mnt
46#private-bin bash,geekbench*,sh -- #4576 46#private-bin bash,geekbench*,sh # #4576
47private-cache 47private-cache
48private-dev 48private-dev
49private-etc lsb-release 49private-etc lsb-release
diff --git a/etc/profile-a-l/geeqie.profile b/etc/profile-a-l/geeqie.profile
index f81a49e4f..6cd28f25d 100644
--- a/etc/profile-a-l/geeqie.profile
+++ b/etc/profile-a-l/geeqie.profile
@@ -32,7 +32,7 @@ novideo
32protocol unix,inet,inet6 32protocol unix,inet,inet6
33seccomp 33seccomp
34 34
35# private-bin geeqie 35#private-bin geeqie
36private-dev 36private-dev
37 37
38restrict-namespaces 38restrict-namespaces
diff --git a/etc/profile-a-l/gfeeds.profile b/etc/profile-a-l/gfeeds.profile
index 1c97ad21c..007658138 100644
--- a/etc/profile-a-l/gfeeds.profile
+++ b/etc/profile-a-l/gfeeds.profile
@@ -58,7 +58,7 @@ tracelog
58 58
59disable-mnt 59disable-mnt
60private-bin gfeeds,python3* 60private-bin gfeeds,python3*
61# private-cache -- feeds are stored in ~/.cache 61#private-cache # feeds are stored in ~/.cache
62private-dev 62private-dev
63private-etc @tls-ca,@x11,dbus-1,gconf,host.conf,mime.types,rpc,services 63private-etc @tls-ca,@x11,dbus-1,gconf,host.conf,mime.types,rpc,services
64private-tmp 64private-tmp
diff --git a/etc/profile-a-l/ghostwriter.profile b/etc/profile-a-l/ghostwriter.profile
index dabf0dd7f..2023ca9f0 100644
--- a/etc/profile-a-l/ghostwriter.profile
+++ b/etc/profile-a-l/ghostwriter.profile
@@ -45,7 +45,7 @@ novideo
45protocol unix,inet,inet6,netlink 45protocol unix,inet,inet6,netlink
46seccomp !chroot 46seccomp !chroot
47seccomp.block-secondary 47seccomp.block-secondary
48#tracelog -- breaks 48#tracelog # breaks
49 49
50private-bin context,gettext,ghostwriter,latex,mktexfmt,pandoc,pdflatex,pdfroff,prince,weasyprint,wkhtmltopdf 50private-bin context,gettext,ghostwriter,latex,mktexfmt,pandoc,pdflatex,pdfroff,prince,weasyprint,wkhtmltopdf
51private-cache 51private-cache
diff --git a/etc/profile-a-l/github-desktop.profile b/etc/profile-a-l/github-desktop.profile
index ced1aa190..88134b363 100644
--- a/etc/profile-a-l/github-desktop.profile
+++ b/etc/profile-a-l/github-desktop.profile
@@ -29,14 +29,14 @@ noblacklist ${HOME}/.config/git
29noblacklist ${HOME}/.gitconfig 29noblacklist ${HOME}/.gitconfig
30noblacklist ${HOME}/.git-credentials 30noblacklist ${HOME}/.git-credentials
31 31
32# no3d 32#no3d
33nosound 33nosound
34 34
35# private-bin github-desktop 35#private-bin github-desktop
36?HAS_APPIMAGE: ignore private-dev 36?HAS_APPIMAGE: ignore private-dev
37# private-lib 37#private-lib
38 38
39# memory-deny-write-execute 39#memory-deny-write-execute
40 40
41# Redirect 41# Redirect
42include electron-common.profile 42include electron-common.profile
diff --git a/etc/profile-a-l/gjs.profile b/etc/profile-a-l/gjs.profile
index bd332a6d5..cad261365 100644
--- a/etc/profile-a-l/gjs.profile
+++ b/etc/profile-a-l/gjs.profile
@@ -38,9 +38,9 @@ protocol unix,inet,inet6
38seccomp 38seccomp
39tracelog 39tracelog
40 40
41# private-bin gjs,gnome-books,gnome-documents,gnome-maps,gnome-photos,gnome-weather 41#private-bin gjs,gnome-books,gnome-documents,gnome-maps,gnome-photos,gnome-weather
42private-dev 42private-dev
43# private-etc alternatives,ca-certificates,crypto-policies,fonts,pki,ssl 43#private-etc alternatives,ca-certificates,crypto-policies,fonts,pki,ssl
44private-tmp 44private-tmp
45 45
46restrict-namespaces 46restrict-namespaces
diff --git a/etc/profile-a-l/gmpc.profile b/etc/profile-a-l/gmpc.profile
index 8c20f7398..4d4a0d50e 100644
--- a/etc/profile-a-l/gmpc.profile
+++ b/etc/profile-a-l/gmpc.profile
@@ -51,5 +51,5 @@ dbus-user filter
51dbus-user.talk org.mpris.MediaPlayer2.mpd 51dbus-user.talk org.mpris.MediaPlayer2.mpd
52dbus-system none 52dbus-system none
53 53
54# memory-deny-write-execute - breaks on Arch 54#memory-deny-write-execute # breaks on Arch
55restrict-namespaces 55restrict-namespaces
diff --git a/etc/profile-a-l/gnome-books.profile b/etc/profile-a-l/gnome-books.profile
index 812923b2d..962b8b30f 100644
--- a/etc/profile-a-l/gnome-books.profile
+++ b/etc/profile-a-l/gnome-books.profile
@@ -39,7 +39,7 @@ protocol unix
39seccomp 39seccomp
40tracelog 40tracelog
41 41
42# private-bin gjs,gnome-books 42#private-bin gjs,gnome-books
43private-dev 43private-dev
44private-tmp 44private-tmp
45 45
diff --git a/etc/profile-a-l/gnome-calculator.profile b/etc/profile-a-l/gnome-calculator.profile
index e5c6022e8..40f799693 100644
--- a/etc/profile-a-l/gnome-calculator.profile
+++ b/etc/profile-a-l/gnome-calculator.profile
@@ -24,7 +24,7 @@ apparmor
24caps.drop all 24caps.drop all
25ipc-namespace 25ipc-namespace
26machine-id 26machine-id
27#net none -- breaks currency conversion 27#net none # breaks currency conversion
28netfilter 28netfilter
29no3d 29no3d
30nodvd 30nodvd
diff --git a/etc/profile-a-l/gnome-characters.profile b/etc/profile-a-l/gnome-characters.profile
index 9e9730e53..9f592722c 100644
--- a/etc/profile-a-l/gnome-characters.profile
+++ b/etc/profile-a-l/gnome-characters.profile
@@ -52,8 +52,8 @@ private-etc @x11,gconf,mime.types
52private-tmp 52private-tmp
53 53
54# Add the next lines to your gnome-characters.local if you don't need access to recently used chars. 54# Add the next lines to your gnome-characters.local if you don't need access to recently used chars.
55# dbus-user none 55#dbus-user none
56# dbus-system none 56#dbus-system none
57 57
58read-only ${HOME} 58read-only ${HOME}
59restrict-namespaces 59restrict-namespaces
diff --git a/etc/profile-a-l/gnome-contacts.profile b/etc/profile-a-l/gnome-contacts.profile
index 2326115c3..25a906c69 100644
--- a/etc/profile-a-l/gnome-contacts.profile
+++ b/etc/profile-a-l/gnome-contacts.profile
@@ -21,7 +21,7 @@ include whitelist-var-common.inc
21 21
22caps.drop all 22caps.drop all
23netfilter 23netfilter
24#no3d - breaks on Arch 24#no3d # breaks on Arch
25nodvd 25nodvd
26noinput 26noinput
27nonewprivs 27nonewprivs
diff --git a/etc/profile-a-l/gnome-keyring.profile b/etc/profile-a-l/gnome-keyring.profile
index 45b6fd880..aa0a7f4cc 100644
--- a/etc/profile-a-l/gnome-keyring.profile
+++ b/etc/profile-a-l/gnome-keyring.profile
@@ -55,7 +55,7 @@ private-dev
55#private-lib alternatives,gnome-keyring,libsecret-1.so.*,pkcs11,security 55#private-lib alternatives,gnome-keyring,libsecret-1.so.*,pkcs11,security
56private-tmp 56private-tmp
57 57
58# dbus-user none 58#dbus-user none
59dbus-system none 59dbus-system none
60 60
61memory-deny-write-execute 61memory-deny-write-execute
diff --git a/etc/profile-a-l/gnome-maps.profile b/etc/profile-a-l/gnome-maps.profile
index 17f52e588..40c264c86 100644
--- a/etc/profile-a-l/gnome-maps.profile
+++ b/etc/profile-a-l/gnome-maps.profile
@@ -61,7 +61,7 @@ tracelog
61 61
62disable-mnt 62disable-mnt
63private-bin gjs,gnome-maps 63private-bin gjs,gnome-maps
64# private-cache -- gnome-maps cache all maps/satelite-images 64#private-cache # gnome-maps cache all maps/satelite-images
65private-dev 65private-dev
66private-etc @tls-ca,@x11,clutter-1.0,gconf,host.conf,mime.types,pkcs11,rpc,services 66private-etc @tls-ca,@x11,clutter-1.0,gconf,host.conf,mime.types,pkcs11,rpc,services
67private-tmp 67private-tmp
diff --git a/etc/profile-a-l/gnome-mplayer.profile b/etc/profile-a-l/gnome-mplayer.profile
index 052e9ba9c..5315cbec6 100644
--- a/etc/profile-a-l/gnome-mplayer.profile
+++ b/etc/profile-a-l/gnome-mplayer.profile
@@ -26,7 +26,7 @@ nou2f
26protocol unix,inet,inet6 26protocol unix,inet,inet6
27seccomp 27seccomp
28 28
29# private-bin gnome-mplayer,mplayer 29#private-bin gnome-mplayer,mplayer
30private-cache 30private-cache
31private-dev 31private-dev
32private-tmp 32private-tmp
diff --git a/etc/profile-a-l/gnome-nettool.profile b/etc/profile-a-l/gnome-nettool.profile
index 7a9a0e336..7a8338cd7 100644
--- a/etc/profile-a-l/gnome-nettool.profile
+++ b/etc/profile-a-l/gnome-nettool.profile
@@ -14,7 +14,7 @@ include disable-programs.inc
14include disable-xdg.inc 14include disable-xdg.inc
15 15
16whitelist /usr/share/gnome-nettool 16whitelist /usr/share/gnome-nettool
17#include whitelist-common.inc -- see #903 17#include whitelist-common.inc # see #903
18include whitelist-runuser-common.inc 18include whitelist-runuser-common.inc
19include whitelist-usr-share-common.inc 19include whitelist-usr-share-common.inc
20include whitelist-var-common.inc 20include whitelist-var-common.inc
diff --git a/etc/profile-a-l/gnome-photos.profile b/etc/profile-a-l/gnome-photos.profile
index 1d0291aa2..4d2a3913f 100644
--- a/etc/profile-a-l/gnome-photos.profile
+++ b/etc/profile-a-l/gnome-photos.profile
@@ -36,7 +36,7 @@ seccomp
36seccomp.block-secondary 36seccomp.block-secondary
37tracelog 37tracelog
38 38
39# private-bin gjs,gnome-photos 39#private-bin gjs,gnome-photos
40private-dev 40private-dev
41private-tmp 41private-tmp
42 42
diff --git a/etc/profile-a-l/gnome-pie.profile b/etc/profile-a-l/gnome-pie.profile
index ac0fb555d..dff6032d1 100644
--- a/etc/profile-a-l/gnome-pie.profile
+++ b/etc/profile-a-l/gnome-pie.profile
@@ -16,7 +16,7 @@ include disable-exec.inc
16 16
17caps.drop all 17caps.drop all
18ipc-namespace 18ipc-namespace
19# net none - breaks dbus 19#net none # breaks dbus
20no3d 20no3d
21nodvd 21nodvd
22nogroups 22nogroups
diff --git a/etc/profile-a-l/gnome-ring.profile b/etc/profile-a-l/gnome-ring.profile
index 8f2ab7fd6..898cdf1f8 100644
--- a/etc/profile-a-l/gnome-ring.profile
+++ b/etc/profile-a-l/gnome-ring.profile
@@ -27,7 +27,7 @@ protocol unix,inet,inet6,netlink
27seccomp 27seccomp
28 28
29disable-mnt 29disable-mnt
30# private-dev 30#private-dev
31private-tmp 31private-tmp
32 32
33restrict-namespaces 33restrict-namespaces
diff --git a/etc/profile-a-l/gnome-schedule.profile b/etc/profile-a-l/gnome-schedule.profile
index b71d77621..33f22136e 100644
--- a/etc/profile-a-l/gnome-schedule.profile
+++ b/etc/profile-a-l/gnome-schedule.profile
@@ -46,7 +46,7 @@ apparmor
46caps.keep chown,dac_override,setgid,setuid 46caps.keep chown,dac_override,setgid,setuid
47ipc-namespace 47ipc-namespace
48machine-id 48machine-id
49#net none - breaks on Ubuntu 49#net none # breaks on Ubuntu
50no3d 50no3d
51nodvd 51nodvd
52nogroups 52nogroups
diff --git a/etc/profile-a-l/gnome-system-log.profile b/etc/profile-a-l/gnome-system-log.profile
index f4e985342..b3bc7499c 100644
--- a/etc/profile-a-l/gnome-system-log.profile
+++ b/etc/profile-a-l/gnome-system-log.profile
@@ -22,7 +22,7 @@ include whitelist-var-common.inc
22apparmor 22apparmor
23caps.drop all 23caps.drop all
24ipc-namespace 24ipc-namespace
25# net none - breaks dbus 25#net none # breaks dbus
26no3d 26no3d
27nodvd 27nodvd
28# When using 'volatile' storage (https://www.freedesktop.org/software/systemd/man/journald.conf.html), 28# When using 'volatile' storage (https://www.freedesktop.org/software/systemd/man/journald.conf.html),
@@ -47,8 +47,8 @@ private-lib
47private-tmp 47private-tmp
48writable-var-log 48writable-var-log
49 49
50# dbus-user none 50#dbus-user none
51# dbus-system none 51#dbus-system none
52 52
53memory-deny-write-execute 53memory-deny-write-execute
54# Add 'ignore read-only ${HOME}' to your gnome-system-log.local if you export logs to a file under your ${HOME}. 54# Add 'ignore read-only ${HOME}' to your gnome-system-log.local if you export logs to a file under your ${HOME}.
diff --git a/etc/profile-a-l/gnome-weather.profile b/etc/profile-a-l/gnome-weather.profile
index 147b84a19..8637f5019 100644
--- a/etc/profile-a-l/gnome-weather.profile
+++ b/etc/profile-a-l/gnome-weather.profile
@@ -41,9 +41,9 @@ seccomp.block-secondary
41tracelog 41tracelog
42 42
43disable-mnt 43disable-mnt
44# private-bin gjs,gnome-weather 44#private-bin gjs,gnome-weather
45private-dev 45private-dev
46# private-etc alternatives,ca-certificates,crypto-policies,fonts,pki,ssl 46#private-etc alternatives,ca-certificates,crypto-policies,fonts,pki,ssl
47private-tmp 47private-tmp
48 48
49restrict-namespaces 49restrict-namespaces
diff --git a/etc/profile-a-l/godot.profile b/etc/profile-a-l/godot.profile
index 5e41384ab..96bbffc41 100644
--- a/etc/profile-a-l/godot.profile
+++ b/etc/profile-a-l/godot.profile
@@ -34,7 +34,7 @@ seccomp
34tracelog 34tracelog
35 35
36 36
37# private-bin godot 37#private-bin godot
38private-cache 38private-cache
39private-dev 39private-dev
40private-etc @games,@tls-ca,@x11,mono 40private-etc @games,@tls-ca,@x11,mono
diff --git a/etc/profile-a-l/goobox.profile b/etc/profile-a-l/goobox.profile
index 8807a239d..96b72230d 100644
--- a/etc/profile-a-l/goobox.profile
+++ b/etc/profile-a-l/goobox.profile
@@ -28,9 +28,9 @@ protocol unix,inet,inet6
28seccomp 28seccomp
29tracelog 29tracelog
30 30
31# private-bin goobox 31#private-bin goobox
32private-dev 32private-dev
33# private-etc alternatives,asound.conf,ca-certificates,crypto-policies,fonts,machine-id,pki,pulse,ssl 33#private-etc alternatives,asound.conf,ca-certificates,crypto-policies,fonts,machine-id,pki,pulse,ssl
34# private-tmp 34#private-tmp
35 35
36restrict-namespaces 36restrict-namespaces
diff --git a/etc/profile-a-l/google-play-music-desktop-player.profile b/etc/profile-a-l/google-play-music-desktop-player.profile
index c2a7d89fd..1218631d8 100644
--- a/etc/profile-a-l/google-play-music-desktop-player.profile
+++ b/etc/profile-a-l/google-play-music-desktop-player.profile
@@ -17,8 +17,8 @@ include disable-interpreters.inc
17include disable-programs.inc 17include disable-programs.inc
18 18
19mkdir ${HOME}/.config/Google Play Music Desktop Player 19mkdir ${HOME}/.config/Google Play Music Desktop Player
20# whitelist ${HOME}/.config/pulse 20#whitelist ${HOME}/.config/pulse
21# whitelist ${HOME}/.pulse 21#whitelist ${HOME}/.pulse
22whitelist ${HOME}/.config/Google Play Music Desktop Player 22whitelist ${HOME}/.config/Google Play Music Desktop Player
23include whitelist-common.inc 23include whitelist-common.inc
24 24
diff --git a/etc/profile-a-l/gpa.profile b/etc/profile-a-l/gpa.profile
index e05cdf424..25498d89e 100644
--- a/etc/profile-a-l/gpa.profile
+++ b/etc/profile-a-l/gpa.profile
@@ -28,7 +28,7 @@ protocol unix,inet,inet6
28seccomp 28seccomp
29tracelog 29tracelog
30 30
31# private-bin gpa,gpg 31#private-bin gpa,gpg
32private-dev 32private-dev
33 33
34restrict-namespaces 34restrict-namespaces
diff --git a/etc/profile-a-l/gpg-agent.profile b/etc/profile-a-l/gpg-agent.profile
index f4cd85e3a..3b623a338 100644
--- a/etc/profile-a-l/gpg-agent.profile
+++ b/etc/profile-a-l/gpg-agent.profile
@@ -46,7 +46,7 @@ protocol unix,inet,inet6
46seccomp 46seccomp
47tracelog 47tracelog
48 48
49# private-bin gpg-agent 49#private-bin gpg-agent
50private-cache 50private-cache
51private-dev 51private-dev
52 52
diff --git a/etc/profile-a-l/gpg.profile b/etc/profile-a-l/gpg.profile
index 60690852a..bf4a1c60b 100644
--- a/etc/profile-a-l/gpg.profile
+++ b/etc/profile-a-l/gpg.profile
@@ -42,7 +42,7 @@ protocol unix,inet,inet6
42seccomp 42seccomp
43tracelog 43tracelog
44 44
45# private-bin gpg 45#private-bin gpg
46private-cache 46private-cache
47private-dev 47private-dev
48 48
diff --git a/etc/profile-a-l/gpg2.profile b/etc/profile-a-l/gpg2.profile
index b831b0f62..a9d928f17 100644
--- a/etc/profile-a-l/gpg2.profile
+++ b/etc/profile-a-l/gpg2.profile
@@ -7,7 +7,7 @@ include gpg2.local
7# added by included profile 7# added by included profile
8#include globals.local 8#include globals.local
9 9
10# private-bin gpg2 10#private-bin gpg2
11 11
12# Redirect 12# Redirect
13include gpg.profile 13include gpg.profile
diff --git a/etc/profile-a-l/gucharmap.profile b/etc/profile-a-l/gucharmap.profile
index ef4aad4da..93db304da 100644
--- a/etc/profile-a-l/gucharmap.profile
+++ b/etc/profile-a-l/gucharmap.profile
@@ -22,7 +22,7 @@ include whitelist-var-common.inc
22apparmor 22apparmor
23caps.drop all 23caps.drop all
24machine-id 24machine-id
25#net none - breaks dbus 25#net none # breaks dbus
26no3d 26no3d
27nodvd 27nodvd
28nogroups 28nogroups
@@ -47,8 +47,8 @@ private-lib
47private-tmp 47private-tmp
48 48
49# breaks state saving 49# breaks state saving
50# dbus-user none 50#dbus-user none
51# dbus-system none 51#dbus-system none
52 52
53read-only ${HOME} 53read-only ${HOME}
54restrict-namespaces 54restrict-namespaces
diff --git a/etc/profile-a-l/gwenview.profile b/etc/profile-a-l/gwenview.profile
index 4be71f6d3..889eac07a 100644
--- a/etc/profile-a-l/gwenview.profile
+++ b/etc/profile-a-l/gwenview.profile
@@ -30,7 +30,7 @@ include whitelist-var-common.inc
30 30
31apparmor 31apparmor
32caps.drop all 32caps.drop all
33# net none 33#net none
34netfilter 34netfilter
35nodvd 35nodvd
36nogroups 36nogroups
@@ -42,14 +42,14 @@ nou2f
42novideo 42novideo
43protocol unix 43protocol unix
44seccomp 44seccomp
45# tracelog 45#tracelog
46 46
47private-bin gimp*,gwenview,kbuildsycoca4,kdeinit4 47private-bin gimp*,gwenview,kbuildsycoca4,kdeinit4
48private-dev 48private-dev
49private-etc @x11,gimp 49private-etc @x11,gimp
50 50
51# dbus-user none 51#dbus-user none
52# dbus-system none 52#dbus-system none
53 53
54# memory-deny-write-execute 54#memory-deny-write-execute
55restrict-namespaces 55restrict-namespaces
diff --git a/etc/profile-a-l/hexchat.profile b/etc/profile-a-l/hexchat.profile
index df7f8f3a3..def7bf25f 100644
--- a/etc/profile-a-l/hexchat.profile
+++ b/etc/profile-a-l/hexchat.profile
@@ -32,7 +32,7 @@ include whitelist-common.inc
32include whitelist-var-common.inc 32include whitelist-var-common.inc
33 33
34caps.drop all 34caps.drop all
35#machine-id -- breaks sound 35#machine-id # breaks sound
36netfilter 36netfilter
37no3d 37no3d
38nodvd 38nodvd
@@ -51,8 +51,8 @@ disable-mnt
51# debug note: private-bin requires perl, python, etc on some systems 51# debug note: private-bin requires perl, python, etc on some systems
52private-bin hexchat,python*,sh 52private-bin hexchat,python*,sh
53private-dev 53private-dev
54#private-lib - python problems 54#private-lib # python problems
55private-tmp 55private-tmp
56 56
57# memory-deny-write-execute - breaks python 57#memory-deny-write-execute # breaks python
58restrict-namespaces 58restrict-namespaces
diff --git a/etc/profile-a-l/homebank.profile b/etc/profile-a-l/homebank.profile
index ccbb66333..d36cf0f46 100644
--- a/etc/profile-a-l/homebank.profile
+++ b/etc/profile-a-l/homebank.profile
@@ -28,7 +28,7 @@ include whitelist-var-common.inc
28apparmor 28apparmor
29caps.drop all 29caps.drop all
30machine-id 30machine-id
31# net none 31#net none
32netfilter 32netfilter
33nodvd 33nodvd
34no3d 34no3d
@@ -55,5 +55,5 @@ private-tmp
55dbus-user none 55dbus-user none
56dbus-system none 56dbus-system none
57 57
58# memory-deny-write-execute 58#memory-deny-write-execute
59restrict-namespaces 59restrict-namespaces
diff --git a/etc/profile-a-l/iagno.profile b/etc/profile-a-l/iagno.profile
index 82cba7887..47c341333 100644
--- a/etc/profile-a-l/iagno.profile
+++ b/etc/profile-a-l/iagno.profile
@@ -43,7 +43,7 @@ private-dev
43private-etc @x11,gconf 43private-etc @x11,gconf
44private-tmp 44private-tmp
45 45
46# dbus-user none 46#dbus-user none
47# dbus-system none 47#dbus-system none
48 48
49restrict-namespaces 49restrict-namespaces
diff --git a/etc/profile-a-l/idea.sh.profile b/etc/profile-a-l/idea.sh.profile
index 31f65962f..2b4c68a4d 100644
--- a/etc/profile-a-l/idea.sh.profile
+++ b/etc/profile-a-l/idea.sh.profile
@@ -36,7 +36,7 @@ seccomp
36 36
37private-cache 37private-cache
38private-dev 38private-dev
39# private-tmp 39#private-tmp
40 40
41noexec /tmp 41noexec /tmp
42restrict-namespaces 42restrict-namespaces
diff --git a/etc/profile-a-l/img2txt.profile b/etc/profile-a-l/img2txt.profile
index ee341423a..8091a4c9e 100644
--- a/etc/profile-a-l/img2txt.profile
+++ b/etc/profile-a-l/img2txt.profile
@@ -41,7 +41,7 @@ seccomp
41tracelog 41tracelog
42x11 none 42x11 none
43 43
44# private-bin img2txt 44#private-bin img2txt
45private-cache 45private-cache
46private-dev 46private-dev
47private-tmp 47private-tmp
diff --git a/etc/profile-a-l/inkscape.profile b/etc/profile-a-l/inkscape.profile
index c4fc16c87..ced7a285f 100644
--- a/etc/profile-a-l/inkscape.profile
+++ b/etc/profile-a-l/inkscape.profile
@@ -61,7 +61,7 @@ protocol unix
61seccomp 61seccomp
62tracelog 62tracelog
63 63
64# private-bin inkscape,potrace,python* - problems on Debian stretch 64#private-bin inkscape,potrace,python* # problems on Debian stretch
65private-cache 65private-cache
66private-dev 66private-dev
67private-etc @x11,ImageMagick*,python* 67private-etc @x11,ImageMagick*,python*
diff --git a/etc/profile-a-l/ipcalc.profile b/etc/profile-a-l/ipcalc.profile
index e73ca44a8..369519947 100644
--- a/etc/profile-a-l/ipcalc.profile
+++ b/etc/profile-a-l/ipcalc.profile
@@ -14,7 +14,7 @@ include disable-devel.inc
14include disable-exec.inc 14include disable-exec.inc
15include disable-interpreters.inc 15include disable-interpreters.inc
16include disable-programs.inc 16include disable-programs.inc
17# include disable-shell.inc 17#include disable-shell.inc
18include disable-write-mnt.inc 18include disable-write-mnt.inc
19include disable-xdg.inc 19include disable-xdg.inc
20 20
@@ -26,7 +26,7 @@ include whitelist-var-common.inc
26apparmor 26apparmor
27caps.drop all 27caps.drop all
28ipc-namespace 28ipc-namespace
29# machine-id 29#machine-id
30net none 30net none
31netfilter 31netfilter
32no3d 32no3d
@@ -39,14 +39,14 @@ nosound
39notv 39notv
40nou2f 40nou2f
41novideo 41novideo
42# protocol unix 42#protocol unix
43seccomp 43seccomp
44# tracelog 44#tracelog
45 45
46disable-mnt 46disable-mnt
47private 47private
48private-bin bash,ipcalc,ipcalc-ng,perl,sh 48private-bin bash,ipcalc,ipcalc-ng,perl,sh
49# private-cache 49#private-cache
50private-dev 50private-dev
51# empty etc directory 51# empty etc directory
52private-etc 52private-etc
@@ -57,6 +57,6 @@ private-tmp
57dbus-user none 57dbus-user none
58dbus-system none 58dbus-system none
59 59
60# memory-deny-write-execute 60#memory-deny-write-execute
61# read-only ${HOME} 61#read-only ${HOME}
62restrict-namespaces 62restrict-namespaces
diff --git a/etc/profile-a-l/k3b.profile b/etc/profile-a-l/k3b.profile
index 81d4f3458..9fb609151 100644
--- a/etc/profile-a-l/k3b.profile
+++ b/etc/profile-a-l/k3b.profile
@@ -21,19 +21,19 @@ include disable-xdg.inc
21include whitelist-var-common.inc 21include whitelist-var-common.inc
22 22
23caps.keep chown,dac_override,ipc_lock,net_bind_service,sys_admin,sys_nice,sys_rawio,sys_resource 23caps.keep chown,dac_override,ipc_lock,net_bind_service,sys_admin,sys_nice,sys_rawio,sys_resource
24# net none 24#net none
25netfilter 25netfilter
26no3d 26no3d
27# nonewprivs - breaks privileged helpers 27#nonewprivs # breaks privileged helpers
28noinput 28noinput
29# noroot - breaks privileged helpers 29#noroot # breaks privileged helpers
30nosound 30nosound
31notv 31notv
32novideo 32novideo
33# protocol unix - breaks privileged helpers 33#protocol unix # breaks privileged helpers
34# seccomp - breaks privileged helpers 34#seccomp # breaks privileged helpers
35 35
36private-dev 36private-dev
37# private-tmp 37#private-tmp
38 38
39# restrict-namespaces - breaks privileged helpers 39#restrict-namespaces # breaks privileged helpers
diff --git a/etc/profile-a-l/kaffeine.profile b/etc/profile-a-l/kaffeine.profile
index 73417bf11..b84d144bd 100644
--- a/etc/profile-a-l/kaffeine.profile
+++ b/etc/profile-a-l/kaffeine.profile
@@ -36,7 +36,7 @@ novideo
36protocol unix,inet,inet6 36protocol unix,inet,inet6
37seccomp 37seccomp
38 38
39# private-bin kaffeine 39#private-bin kaffeine
40private-dev 40private-dev
41private-tmp 41private-tmp
42 42
diff --git a/etc/profile-a-l/kalgebra.profile b/etc/profile-a-l/kalgebra.profile
index a4e67cf6b..359c02b38 100644
--- a/etc/profile-a-l/kalgebra.profile
+++ b/etc/profile-a-l/kalgebra.profile
@@ -35,7 +35,7 @@ nou2f
35novideo 35novideo
36protocol unix,netlink 36protocol unix,netlink
37seccomp !chroot 37seccomp !chroot
38# tracelog 38#tracelog
39 39
40disable-mnt 40disable-mnt
41private-bin kalgebra,kalgebramobile 41private-bin kalgebra,kalgebramobile
@@ -47,4 +47,4 @@ private-tmp
47dbus-user none 47dbus-user none
48dbus-system none 48dbus-system none
49 49
50# restrict-namespaces 50#restrict-namespaces
diff --git a/etc/profile-a-l/kate.profile b/etc/profile-a-l/kate.profile
index 152f73d5d..f141a25e1 100644
--- a/etc/profile-a-l/kate.profile
+++ b/etc/profile-a-l/kate.profile
@@ -28,17 +28,17 @@ noblacklist ${HOME}/.local/share/kxmlgui5/katesearch
28include allow-common-devel.inc 28include allow-common-devel.inc
29 29
30include disable-common.inc 30include disable-common.inc
31# include disable-devel.inc 31#include disable-devel.inc
32include disable-exec.inc 32include disable-exec.inc
33# include disable-interpreters.inc 33#include disable-interpreters.inc
34include disable-programs.inc 34include disable-programs.inc
35 35
36include whitelist-run-common.inc 36include whitelist-run-common.inc
37include whitelist-var-common.inc 37include whitelist-var-common.inc
38 38
39# apparmor 39#apparmor
40caps.drop all 40caps.drop all
41# net none 41#net none
42netfilter 42netfilter
43nodvd 43nodvd
44nogroups 44nogroups
@@ -52,13 +52,13 @@ novideo
52protocol unix 52protocol unix
53seccomp 53seccomp
54 54
55# private-bin kate,kbuildsycoca4,kdeinit4 55#private-bin kate,kbuildsycoca4,kdeinit4
56private-dev 56private-dev
57# private-etc alternatives,fonts,kde4rc,kde5rc,ld.so.cache,machine-id,xdg 57#private-etc alternatives,fonts,kde4rc,kde5rc,ld.so.cache,machine-id,xdg
58private-tmp 58private-tmp
59 59
60# dbus-user none 60#dbus-user none
61# dbus-system none 61#dbus-system none
62 62
63restrict-namespaces 63restrict-namespaces
64join-or-start kate 64join-or-start kate
diff --git a/etc/profile-a-l/kazam.profile b/etc/profile-a-l/kazam.profile
index 70414eeea..5a19d2f50 100644
--- a/etc/profile-a-l/kazam.profile
+++ b/etc/profile-a-l/kazam.profile
@@ -45,7 +45,7 @@ seccomp
45tracelog 45tracelog
46 46
47disable-mnt 47disable-mnt
48# private-bin kazam,python* 48#private-bin kazam,python*
49private-cache 49private-cache
50private-dev 50private-dev
51private-etc @x11 51private-etc @x11
diff --git a/etc/profile-a-l/kcalc.profile b/etc/profile-a-l/kcalc.profile
index cfb756c43..9f10039df 100644
--- a/etc/profile-a-l/kcalc.profile
+++ b/etc/profile-a-l/kcalc.profile
@@ -60,7 +60,7 @@ private-bin kcalc
60private-cache 60private-cache
61private-dev 61private-dev
62private-etc 62private-etc
63# private-lib - problems on Arch 63#private-lib # problems on Arch
64private-tmp 64private-tmp
65 65
66dbus-user none 66dbus-user none
diff --git a/etc/profile-a-l/kdeinit4.profile b/etc/profile-a-l/kdeinit4.profile
index 2f426e191..dce189c59 100644
--- a/etc/profile-a-l/kdeinit4.profile
+++ b/etc/profile-a-l/kdeinit4.profile
@@ -22,7 +22,7 @@ no3d
22nogroups 22nogroups
23noinput 23noinput
24nonewprivs 24nonewprivs
25# nosound - disabled for knotify 25#nosound # disabled for knotify
26noroot 26noroot
27nou2f 27nou2f
28novideo 28novideo
diff --git a/etc/profile-a-l/kdenlive.profile b/etc/profile-a-l/kdenlive.profile
index d4933d816..717bfa8d6 100644
--- a/etc/profile-a-l/kdenlive.profile
+++ b/etc/profile-a-l/kdenlive.profile
@@ -21,7 +21,7 @@ include disable-programs.inc
21 21
22apparmor 22apparmor
23caps.drop all 23caps.drop all
24# net none 24#net none
25nodvd 25nodvd
26nogroups 26nogroups
27noinput 27noinput
@@ -34,9 +34,9 @@ seccomp
34 34
35private-bin dbus-launch,dvdauthor,ffmpeg,ffplay,ffprobe,genisoimage,kdeinit4,kdeinit4_shutdown,kdeinit4_wrapper,kdeinit5,kdeinit5_shutdown,kdeinit5_wrapper,kdenlive,kdenlive_render,kshell4,kshell5,melt,mlt-melt,vlc,xine 35private-bin dbus-launch,dvdauthor,ffmpeg,ffplay,ffprobe,genisoimage,kdeinit4,kdeinit4_shutdown,kdeinit4_wrapper,kdeinit5,kdeinit5_shutdown,kdeinit5_wrapper,kdenlive,kdenlive_render,kshell4,kshell5,melt,mlt-melt,vlc,xine
36private-dev 36private-dev
37# private-etc alternatives,fonts,kde4rc,kde5rc,ld.so.cache,machine-id,passwd,pulse,X11,xdg 37#private-etc alternatives,fonts,kde4rc,kde5rc,ld.so.cache,machine-id,passwd,pulse,X11,xdg
38 38
39# dbus-user none 39#dbus-user none
40# dbus-system none 40#dbus-system none
41 41
42restrict-namespaces 42restrict-namespaces
diff --git a/etc/profile-a-l/kfind.profile b/etc/profile-a-l/kfind.profile
index c70030a38..115f785eb 100644
--- a/etc/profile-a-l/kfind.profile
+++ b/etc/profile-a-l/kfind.profile
@@ -9,21 +9,21 @@ include globals.local
9# searching in blacklisted or masked paths fails silently 9# searching in blacklisted or masked paths fails silently
10# adjust filesystem restrictions as necessary 10# adjust filesystem restrictions as necessary
11 11
12# noblacklist ${HOME}/.cache/kfind - disable-programs.inc is disabled, see below 12#noblacklist ${HOME}/.cache/kfind # disable-programs.inc is disabled, see below
13# noblacklist ${HOME}/.config/kfindrc 13#noblacklist ${HOME}/.config/kfindrc
14# noblacklist ${HOME}/.kde/share/config/kfindrc 14#noblacklist ${HOME}/.kde/share/config/kfindrc
15# noblacklist ${HOME}/.kde4/share/config/kfindrc 15#noblacklist ${HOME}/.kde4/share/config/kfindrc
16 16
17include disable-common.inc 17include disable-common.inc
18include disable-devel.inc 18include disable-devel.inc
19include disable-exec.inc 19include disable-exec.inc
20include disable-interpreters.inc 20include disable-interpreters.inc
21# include disable-programs.inc 21#include disable-programs.inc
22 22
23apparmor 23apparmor
24caps.drop all 24caps.drop all
25machine-id 25machine-id
26# net none 26#net none
27netfilter 27netfilter
28no3d 28no3d
29nodvd 29nodvd
@@ -38,11 +38,11 @@ novideo
38protocol unix 38protocol unix
39seccomp 39seccomp
40 40
41# private-bin kbuildsycoca4,kdeinit4,kfind 41#private-bin kbuildsycoca4,kdeinit4,kfind
42private-dev 42private-dev
43private-tmp 43private-tmp
44 44
45# dbus-user none 45#dbus-user none
46# dbus-system none 46#dbus-system none
47 47
48restrict-namespaces 48restrict-namespaces
diff --git a/etc/profile-a-l/kget.profile b/etc/profile-a-l/kget.profile
index dd45c1889..892577117 100644
--- a/etc/profile-a-l/kget.profile
+++ b/etc/profile-a-l/kget.profile
@@ -40,5 +40,5 @@ seccomp
40private-dev 40private-dev
41private-tmp 41private-tmp
42 42
43# memory-deny-write-execute 43#memory-deny-write-execute
44restrict-namespaces 44restrict-namespaces
diff --git a/etc/profile-a-l/kiwix-desktop.profile b/etc/profile-a-l/kiwix-desktop.profile
index 2e369b945..9f41f41db 100644
--- a/etc/profile-a-l/kiwix-desktop.profile
+++ b/etc/profile-a-l/kiwix-desktop.profile
@@ -27,13 +27,13 @@ apparmor
27caps.drop all 27caps.drop all
28ipc-namespace 28ipc-namespace
29netfilter 29netfilter
30# no3d 30#no3d
31nodvd 31nodvd
32nogroups 32nogroups
33noinput 33noinput
34nonewprivs 34nonewprivs
35noroot 35noroot
36# nosound 36#nosound
37notv 37notv
38nou2f 38nou2f
39novideo 39novideo
@@ -49,4 +49,4 @@ private-tmp
49dbus-user none 49dbus-user none
50dbus-system none 50dbus-system none
51 51
52# restrict-namespaces 52#restrict-namespaces
diff --git a/etc/profile-a-l/kmail.profile b/etc/profile-a-l/kmail.profile
index 9724f4963..20d2c01d6 100644
--- a/etc/profile-a-l/kmail.profile
+++ b/etc/profile-a-l/kmail.profile
@@ -41,7 +41,7 @@ include disable-programs.inc
41include whitelist-run-common.inc 41include whitelist-run-common.inc
42include whitelist-var-common.inc 42include whitelist-var-common.inc
43 43
44# apparmor 44#apparmor
45caps.drop all 45caps.drop all
46netfilter 46netfilter
47nodvd 47nodvd
@@ -56,11 +56,11 @@ novideo
56protocol unix,inet,inet6,netlink 56protocol unix,inet,inet6,netlink
57# we need to allow chroot, io_getevents, ioprio_set, io_setup, io_submit system calls 57# we need to allow chroot, io_getevents, ioprio_set, io_setup, io_submit system calls
58seccomp !chroot,!io_getevents,!io_setup,!io_submit,!ioprio_set 58seccomp !chroot,!io_getevents,!io_setup,!io_submit,!ioprio_set
59# tracelog 59#tracelog
60 60
61private-dev 61private-dev
62# private-tmp - interrupts connection to akonadi, breaks opening of email attachments 62#private-tmp # interrupts connection to akonadi, breaks opening of email attachments
63# writable-run-user is needed for signing and encrypting emails 63# writable-run-user is needed for signing and encrypting emails
64writable-run-user 64writable-run-user
65 65
66# restrict-namespaces 66#restrict-namespaces
diff --git a/etc/profile-a-l/kmplayer.profile b/etc/profile-a-l/kmplayer.profile
index 992b312ee..7615f00c4 100644
--- a/etc/profile-a-l/kmplayer.profile
+++ b/etc/profile-a-l/kmplayer.profile
@@ -33,7 +33,7 @@ nou2f
33protocol unix,inet,inet6,netlink 33protocol unix,inet,inet6,netlink
34seccomp 34seccomp
35 35
36# private-bin kmplayer,mplayer 36#private-bin kmplayer,mplayer
37private-cache 37private-cache
38private-dev 38private-dev
39private-tmp 39private-tmp
diff --git a/etc/profile-a-l/konversation.profile b/etc/profile-a-l/konversation.profile
index e4781fea3..10a823c89 100644
--- a/etc/profile-a-l/konversation.profile
+++ b/etc/profile-a-l/konversation.profile
@@ -42,5 +42,5 @@ private-cache
42private-dev 42private-dev
43private-tmp 43private-tmp
44 44
45# memory-deny-write-execute 45#memory-deny-write-execute
46restrict-namespaces 46restrict-namespaces
diff --git a/etc/profile-a-l/krita.profile b/etc/profile-a-l/krita.profile
index a04376430..f61bf36a8 100644
--- a/etc/profile-a-l/krita.profile
+++ b/etc/profile-a-l/krita.profile
@@ -28,7 +28,7 @@ include disable-xdg.inc
28apparmor 28apparmor
29caps.drop all 29caps.drop all
30ipc-namespace 30ipc-namespace
31# net none 31#net none
32netfilter 32netfilter
33nodvd 33nodvd
34nogroups 34nogroups
@@ -46,7 +46,7 @@ private-cache
46private-dev 46private-dev
47private-tmp 47private-tmp
48 48
49# dbus-user none 49#dbus-user none
50# dbus-system none 50#dbus-system none
51 51
52restrict-namespaces 52restrict-namespaces
diff --git a/etc/profile-a-l/krunner.profile b/etc/profile-a-l/krunner.profile
index a0244ef47..8af3657d1 100644
--- a/etc/profile-a-l/krunner.profile
+++ b/etc/profile-a-l/krunner.profile
@@ -10,19 +10,19 @@ include globals.local
10# When a file is opened in krunner, the file viewer runs in its own sandbox 10# When a file is opened in krunner, the file viewer runs in its own sandbox
11# with its own profile, if it is sandboxed automatically. 11# with its own profile, if it is sandboxed automatically.
12 12
13# noblacklist ${HOME}/.cache/krunner 13#noblacklist ${HOME}/.cache/krunner
14# noblacklist ${HOME}/.cache/krunnerbookmarkrunnerfirefoxdbfile.sqlite* 14#noblacklist ${HOME}/.cache/krunnerbookmarkrunnerfirefoxdbfile.sqlite*
15# noblacklist ${HOME}/.config/chromium 15#noblacklist ${HOME}/.config/chromium
16noblacklist ${HOME}/.config/krunnerrc 16noblacklist ${HOME}/.config/krunnerrc
17noblacklist ${HOME}/.kde/share/config/krunnerrc 17noblacklist ${HOME}/.kde/share/config/krunnerrc
18noblacklist ${HOME}/.kde4/share/config/krunnerrc 18noblacklist ${HOME}/.kde4/share/config/krunnerrc
19# noblacklist ${HOME}/.local/share/baloo 19#noblacklist ${HOME}/.local/share/baloo
20# noblacklist ${HOME}/.mozilla 20#noblacklist ${HOME}/.mozilla
21 21
22include disable-common.inc 22include disable-common.inc
23# include disable-devel.inc 23#include disable-devel.inc
24# include disable-interpreters.inc 24#include disable-interpreters.inc
25# include disable-programs.inc 25#include disable-programs.inc
26 26
27include whitelist-var-common.inc 27include whitelist-var-common.inc
28 28
@@ -34,6 +34,6 @@ noroot
34protocol unix,inet,inet6 34protocol unix,inet,inet6
35seccomp 35seccomp
36 36
37# private-cache 37#private-cache
38 38
39restrict-namespaces 39restrict-namespaces
diff --git a/etc/profile-a-l/ktorrent.profile b/etc/profile-a-l/ktorrent.profile
index da267b962..63bdc0b83 100644
--- a/etc/profile-a-l/ktorrent.profile
+++ b/etc/profile-a-l/ktorrent.profile
@@ -62,9 +62,9 @@ seccomp
62 62
63private-bin kbuildsycoca4,kdeinit4,ktmagnetdownloader,ktorrent,ktupnptest 63private-bin kbuildsycoca4,kdeinit4,ktmagnetdownloader,ktorrent,ktupnptest
64private-dev 64private-dev
65# private-lib - problems on Arch 65#private-lib # problems on Arch
66private-tmp 66private-tmp
67 67
68deterministic-shutdown 68deterministic-shutdown
69# memory-deny-write-execute 69#memory-deny-write-execute
70restrict-namespaces 70restrict-namespaces
diff --git a/etc/profile-a-l/kube.profile b/etc/profile-a-l/kube.profile
index 82336969d..1f8757edb 100644
--- a/etc/profile-a-l/kube.profile
+++ b/etc/profile-a-l/kube.profile
@@ -65,7 +65,7 @@ protocol unix,inet,inet6
65seccomp 65seccomp
66tracelog 66tracelog
67 67
68# disable-mnt 68#disable-mnt
69# Add "gpg,gpg2,gpg-agent,pinentry-curses,pinentry-emacs,pinentry-fltk,pinentry-gnome3,pinentry-gtk,pinentry-gtk2,pinentry-gtk-2,pinentry-qt,pinentry-qt4,pinentry-tty,pinentry-x2go,pinentry-kwallet" for gpg 69# Add "gpg,gpg2,gpg-agent,pinentry-curses,pinentry-emacs,pinentry-fltk,pinentry-gnome3,pinentry-gtk,pinentry-gtk2,pinentry-gtk-2,pinentry-qt,pinentry-qt4,pinentry-tty,pinentry-x2go,pinentry-kwallet" for gpg
70private-bin kube,sink_synchronizer 70private-bin kube,sink_synchronizer
71private-cache 71private-cache
diff --git a/etc/profile-a-l/kwrite.profile b/etc/profile-a-l/kwrite.profile
index 34fe2ace6..efc6b7c56 100644
--- a/etc/profile-a-l/kwrite.profile
+++ b/etc/profile-a-l/kwrite.profile
@@ -29,14 +29,14 @@ include whitelist-var-common.inc
29 29
30apparmor 30apparmor
31caps.drop all 31caps.drop all
32# net none 32#net none
33netfilter 33netfilter
34nodvd 34nodvd
35nogroups 35nogroups
36noinput 36noinput
37nonewprivs 37nonewprivs
38noroot 38noroot
39# nosound - KWrite is using ALSA! 39#nosound # KWrite is using ALSA!
40notv 40notv
41nou2f 41nou2f
42novideo 42novideo
@@ -49,8 +49,8 @@ private-dev
49private-etc @x11 49private-etc @x11
50private-tmp 50private-tmp
51 51
52# dbus-user none 52#dbus-user none
53# dbus-system none 53#dbus-system none
54 54
55restrict-namespaces 55restrict-namespaces
56join-or-start kwrite 56join-or-start kwrite
diff --git a/etc/profile-a-l/less.profile b/etc/profile-a-l/less.profile
index 6efe23ade..661c0594a 100644
--- a/etc/profile-a-l/less.profile
+++ b/etc/profile-a-l/less.profile
@@ -36,8 +36,8 @@ x11 none
36 36
37# The user can have a custom coloring script configured in ${HOME}/.lessfilter. 37# The user can have a custom coloring script configured in ${HOME}/.lessfilter.
38# Enable private-bin and private-lib if you are not using any filter. 38# Enable private-bin and private-lib if you are not using any filter.
39# private-bin less 39#private-bin less
40# private-lib 40#private-lib
41private-cache 41private-cache
42private-dev 42private-dev
43writable-var-log 43writable-var-log
diff --git a/etc/profile-a-l/liferea.profile b/etc/profile-a-l/liferea.profile
index b0e9015ee..739d2cc1e 100644
--- a/etc/profile-a-l/liferea.profile
+++ b/etc/profile-a-l/liferea.profile
@@ -33,13 +33,13 @@ include whitelist-var-common.inc
33 33
34caps.drop all 34caps.drop all
35netfilter 35netfilter
36# no3d 36#no3d
37nodvd 37nodvd
38nogroups 38nogroups
39noinput 39noinput
40nonewprivs 40nonewprivs
41noroot 41noroot
42# nosound 42#nosound
43notv 43notv
44nou2f 44nou2f
45novideo 45novideo
diff --git a/etc/profile-a-l/links-common.profile b/etc/profile-a-l/links-common.profile
index 838d619b7..636560789 100644
--- a/etc/profile-a-l/links-common.profile
+++ b/etc/profile-a-l/links-common.profile
@@ -52,7 +52,7 @@ private-cache
52private-dev 52private-dev
53private-etc @tls-ca 53private-etc @tls-ca
54# Add the next line to your links-common.local to allow external media players. 54# Add the next line to your links-common.local to allow external media players.
55# private-etc alsa,asound.conf,machine-id,openal,pulse 55#private-etc alsa,asound.conf,machine-id,openal,pulse
56private-tmp 56private-tmp
57 57
58dbus-user none 58dbus-user none
diff --git a/etc/profile-a-l/lutris.profile b/etc/profile-a-l/lutris.profile
index 2658c5373..c3497c3bd 100644
--- a/etc/profile-a-l/lutris.profile
+++ b/etc/profile-a-l/lutris.profile
@@ -13,7 +13,7 @@ noblacklist ${HOME}/.cache/wine
13noblacklist ${HOME}/.cache/winetricks 13noblacklist ${HOME}/.cache/winetricks
14noblacklist ${HOME}/.config/lutris 14noblacklist ${HOME}/.config/lutris
15noblacklist ${HOME}/.local/share/lutris 15noblacklist ${HOME}/.local/share/lutris
16# noblacklist ${HOME}/.wine 16#noblacklist ${HOME}/.wine
17noblacklist /tmp/.wine-* 17noblacklist /tmp/.wine-*
18# Don't block access to /sbin and /usr/sbin to allow using ldconfig. Otherwise 18# Don't block access to /sbin and /usr/sbin to allow using ldconfig. Otherwise
19# Lutris won't even start. 19# Lutris won't even start.
@@ -39,7 +39,7 @@ mkdir ${HOME}/.cache/wine
39mkdir ${HOME}/.cache/winetricks 39mkdir ${HOME}/.cache/winetricks
40mkdir ${HOME}/.config/lutris 40mkdir ${HOME}/.config/lutris
41mkdir ${HOME}/.local/share/lutris 41mkdir ${HOME}/.local/share/lutris
42# mkdir ${HOME}/.wine 42#mkdir ${HOME}/.wine
43whitelist ${DOWNLOADS} 43whitelist ${DOWNLOADS}
44whitelist ${HOME}/Games 44whitelist ${HOME}/Games
45whitelist ${HOME}/.cache/lutris 45whitelist ${HOME}/.cache/lutris
@@ -47,7 +47,7 @@ whitelist ${HOME}/.cache/wine
47whitelist ${HOME}/.cache/winetricks 47whitelist ${HOME}/.cache/winetricks
48whitelist ${HOME}/.config/lutris 48whitelist ${HOME}/.config/lutris
49whitelist ${HOME}/.local/share/lutris 49whitelist ${HOME}/.local/share/lutris
50# whitelist ${HOME}/.wine 50#whitelist ${HOME}/.wine
51whitelist /usr/share/lutris 51whitelist /usr/share/lutris
52whitelist /usr/share/wine 52whitelist /usr/share/wine
53include whitelist-common.inc 53include whitelist-common.inc
@@ -55,11 +55,11 @@ include whitelist-usr-share-common.inc
55include whitelist-runuser-common.inc 55include whitelist-runuser-common.inc
56include whitelist-var-common.inc 56include whitelist-var-common.inc
57 57
58# allow-debuggers 58#allow-debuggers
59# apparmor 59#apparmor
60caps.drop all 60caps.drop all
61ipc-namespace 61ipc-namespace
62# net none 62#net none
63netfilter 63netfilter
64nodvd 64nodvd
65nogroups 65nogroups
diff --git a/etc/profile-a-l/lynx.profile b/etc/profile-a-l/lynx.profile
index caf8de104..248061b3f 100644
--- a/etc/profile-a-l/lynx.profile
+++ b/etc/profile-a-l/lynx.profile
@@ -34,10 +34,10 @@ protocol unix,inet,inet6
34seccomp 34seccomp
35tracelog 35tracelog
36 36
37# private-bin lynx 37#private-bin lynx
38private-cache 38private-cache
39private-dev 39private-dev
40# private-etc alternatives,ca-certificates,crypto-policies,pki,ssl 40#private-etc alternatives,ca-certificates,crypto-policies,pki,ssl
41private-tmp 41private-tmp
42 42
43restrict-namespaces 43restrict-namespaces
diff --git a/etc/profile-a-l/lyx.profile b/etc/profile-a-l/lyx.profile
index c3366acef..d210333c3 100644
--- a/etc/profile-a-l/lyx.profile
+++ b/etc/profile-a-l/lyx.profile
@@ -31,7 +31,7 @@ include whitelist-usr-share-common.inc
31apparmor 31apparmor
32machine-id 32machine-id
33 33
34# private-bin atril,dvilualatex,env,latex,lua*,luatex,lyx,lyxclient,okular,pdf2latex,pdflatex,pdftex,perl*,python*,qpdf,qpdfview,sh,tex2lyx,texmf,xelatex 34#private-bin atril,dvilualatex,env,latex,lua*,luatex,lyx,lyxclient,okular,pdf2latex,pdflatex,pdftex,perl*,python*,qpdf,qpdfview,sh,tex2lyx,texmf,xelatex
35private-etc @x11,lyx,mime.types,texmf 35private-etc @x11,lyx,mime.types,texmf
36 36
37# Redirect 37# Redirect
diff --git a/etc/profile-m-z/PCSX2.profile b/etc/profile-m-z/PCSX2.profile
index e75de80ac..a6a9ba6bc 100644
--- a/etc/profile-m-z/PCSX2.profile
+++ b/etc/profile-m-z/PCSX2.profile
@@ -40,8 +40,8 @@ notv
40nou2f 40nou2f
41novideo 41novideo
42protocol unix,netlink 42protocol unix,netlink
43#seccomp - breaks loading with no logs 43#seccomp # breaks loading with no logs
44#tracelog - 32/64 bit incompatibility 44#tracelog # 32/64 bit incompatibility
45 45
46private-bin PCSX2 46private-bin PCSX2
47private-cache 47private-cache
diff --git a/etc/profile-m-z/QMediathekView.profile b/etc/profile-m-z/QMediathekView.profile
index 0e18b3cdf..dd5639268 100644
--- a/etc/profile-m-z/QMediathekView.profile
+++ b/etc/profile-m-z/QMediathekView.profile
@@ -57,7 +57,7 @@ include whitelist-var-common.inc
57apparmor 57apparmor
58caps.drop all 58caps.drop all
59netfilter 59netfilter
60# no3d 60#no3d
61nodvd 61nodvd
62nogroups 62nogroups
63noinput 63noinput
@@ -81,5 +81,5 @@ private-tmp
81dbus-user none 81dbus-user none
82dbus-system none 82dbus-system none
83 83
84#memory-deny-write-execute - breaks on Arch (see issue #1803) 84#memory-deny-write-execute # breaks on Arch (see issue #1803)
85restrict-namespaces 85restrict-namespaces
diff --git a/etc/profile-m-z/Viber.profile b/etc/profile-m-z/Viber.profile
index 34d500bb1..fe1f9b877 100644
--- a/etc/profile-m-z/Viber.profile
+++ b/etc/profile-m-z/Viber.profile
@@ -35,4 +35,4 @@ private-bin awk,bash,dig,sh,Viber
35private-etc @tls-ca,@x11,mailcap,proxychains.conf 35private-etc @tls-ca,@x11,mailcap,proxychains.conf
36private-tmp 36private-tmp
37 37
38# restrict-namespaces 38#restrict-namespaces
diff --git a/etc/profile-m-z/Xephyr.profile b/etc/profile-m-z/Xephyr.profile
index 0c3d4c1da..aae1808dd 100644
--- a/etc/profile-m-z/Xephyr.profile
+++ b/etc/profile-m-z/Xephyr.profile
@@ -25,7 +25,7 @@ nogroups
25noinput 25noinput
26nonewprivs 26nonewprivs
27# In noroot mode, Xephyr cannot create a socket in the real /tmp/.X11-unix. 27# In noroot mode, Xephyr cannot create a socket in the real /tmp/.X11-unix.
28# noroot 28#noroot
29nosound 29nosound
30notv 30notv
31nou2f 31nou2f
@@ -35,10 +35,10 @@ seccomp
35disable-mnt 35disable-mnt
36# using a private home directory 36# using a private home directory
37private 37private
38# private-bin sh,Xephyr,xkbcomp 38#private-bin sh,Xephyr,xkbcomp
39# private-bin bash,cat,ls,sh,strace,Xephyr,xkbcomp 39#private-bin bash,cat,ls,sh,strace,Xephyr,xkbcomp
40private-dev 40private-dev
41# private-etc alternatives,gai.conf,host.conf,hostname,hosts,ld.so.cache,ld.so.conf,nsswitch.conf,resolv.conf 41#private-etc alternatives,gai.conf,host.conf,hostname,hosts,ld.so.cache,ld.so.conf,nsswitch.conf,resolv.conf
42#private-tmp 42#private-tmp
43 43
44restrict-namespaces 44restrict-namespaces
diff --git a/etc/profile-m-z/Xvfb.profile b/etc/profile-m-z/Xvfb.profile
index 2bb9f171a..052ea520d 100644
--- a/etc/profile-m-z/Xvfb.profile
+++ b/etc/profile-m-z/Xvfb.profile
@@ -39,8 +39,8 @@ seccomp
39disable-mnt 39disable-mnt
40# using a private home directory 40# using a private home directory
41private 41private
42# private-bin sh,xkbcomp,Xvfb 42#private-bin sh,xkbcomp,Xvfb
43# private-bin bash,cat,ls,sh,strace,xkbcomp,Xvfb 43#private-bin bash,cat,ls,sh,strace,xkbcomp,Xvfb
44private-dev 44private-dev
45private-etc gai.conf,host.conf 45private-etc gai.conf,host.conf
46private-tmp 46private-tmp
diff --git a/etc/profile-m-z/makepkg.profile b/etc/profile-m-z/makepkg.profile
index 266d00395..b6afbad59 100644
--- a/etc/profile-m-z/makepkg.profile
+++ b/etc/profile-m-z/makepkg.profile
@@ -14,8 +14,8 @@ blacklist ${RUNUSER}/wayland-*
14# for potential issues and their solutions when Firejailing makepkg 14# for potential issues and their solutions when Firejailing makepkg
15 15
16# This profile could be significantly strengthened by adding the following to makepkg.local 16# This profile could be significantly strengthened by adding the following to makepkg.local
17# whitelist ${HOME}/<Your Build Folder> 17#whitelist ${HOME}/<Your Build Folder>
18# whitelist ${HOME}/.gnupg 18#whitelist ${HOME}/.gnupg
19 19
20# Enable severely restricted access to ${HOME}/.gnupg 20# Enable severely restricted access to ${HOME}/.gnupg
21noblacklist ${HOME}/.gnupg 21noblacklist ${HOME}/.gnupg
diff --git a/etc/profile-m-z/midori.profile b/etc/profile-m-z/midori.profile
index d1655fabb..fcc4845df 100644
--- a/etc/profile-m-z/midori.profile
+++ b/etc/profile-m-z/midori.profile
@@ -13,8 +13,8 @@ noblacklist ${HOME}/.cache/midori
13noblacklist ${HOME}/.config/midori 13noblacklist ${HOME}/.config/midori
14noblacklist ${HOME}/.local/share/midori 14noblacklist ${HOME}/.local/share/midori
15noblacklist ${HOME}/.local/share/pki 15noblacklist ${HOME}/.local/share/pki
16# noblacklist ${HOME}/.local/share/webkit 16#noblacklist ${HOME}/.local/share/webkit
17# noblacklist ${HOME}/.local/share/webkitgtk 17#noblacklist ${HOME}/.local/share/webkitgtk
18noblacklist ${HOME}/.pki 18noblacklist ${HOME}/.pki
19 19
20noblacklist ${HOME}/.cache/gnome-mplayer 20noblacklist ${HOME}/.cache/gnome-mplayer
@@ -54,7 +54,7 @@ caps.drop all
54netfilter 54netfilter
55nodvd 55nodvd
56nonewprivs 56nonewprivs
57# noroot - problems on Ubuntu 14.04 57#noroot # problems on Ubuntu 14.04
58notv 58notv
59protocol unix,inet,inet6,netlink 59protocol unix,inet,inet6,netlink
60seccomp 60seccomp
diff --git a/etc/profile-m-z/mpDris2.profile b/etc/profile-m-z/mpDris2.profile
index 86359426b..ab1c93eaf 100644
--- a/etc/profile-m-z/mpDris2.profile
+++ b/etc/profile-m-z/mpDris2.profile
@@ -56,7 +56,7 @@ dbus-user filter
56dbus-user.own org.mpris.MediaPlayer2.mpd 56dbus-user.own org.mpris.MediaPlayer2.mpd
57dbus-system none 57dbus-system none
58 58
59#memory-deny-write-execute - breaks on Arch (see issue #1803) 59#memory-deny-write-execute # breaks on Arch (see issue #1803)
60 60
61read-only ${HOME} 61read-only ${HOME}
62restrict-namespaces 62restrict-namespaces
diff --git a/etc/profile-m-z/mplayer.profile b/etc/profile-m-z/mplayer.profile
index 7d9ff39ad..bdb9fa51d 100644
--- a/etc/profile-m-z/mplayer.profile
+++ b/etc/profile-m-z/mplayer.profile
@@ -24,9 +24,9 @@ include whitelist-var-common.inc
24 24
25apparmor 25apparmor
26caps.drop all 26caps.drop all
27# net none - mplayer can be used for streaming. 27#net none # mplayer can be used for streaming.
28netfilter 28netfilter
29# nogroups 29#nogroups
30noinput 30noinput
31nonewprivs 31nonewprivs
32noroot 32noroot
diff --git a/etc/profile-m-z/mullvad-browser.profile b/etc/profile-m-z/mullvad-browser.profile
index b9eb57743..cdbb0ae9c 100644
--- a/etc/profile-m-z/mullvad-browser.profile
+++ b/etc/profile-m-z/mullvad-browser.profile
@@ -73,13 +73,13 @@ novideo
73protocol unix,inet,inet6 73protocol unix,inet,inet6
74seccomp !chroot 74seccomp !chroot
75seccomp.block-secondary 75seccomp.block-secondary
76#tracelog - may cause issues, see #1930 76#tracelog # may cause issues, see #1930
77 77
78disable-mnt 78disable-mnt
79private-bin bash,cat,cp,cut,dirname,env,expr,file,gpg,grep,gxmessage,id,kdialog,ln,mkdir,mullvad-browser,mv,python*,rm,sed,sh,tail,tar,tclsh,test,update-desktop-database,xmessage,xz,zenity 79private-bin bash,cat,cp,cut,dirname,env,expr,file,gpg,grep,gxmessage,id,kdialog,ln,mkdir,mullvad-browser,mv,python*,rm,sed,sh,tail,tar,tclsh,test,update-desktop-database,xmessage,xz,zenity
80private-dev 80private-dev
81private-etc @tls-ca 81private-etc @tls-ca
82#private-opt mullvad-browser - can cause slow startup 82#private-opt mullvad-browser # can cause slow startup
83private-tmp 83private-tmp
84 84
85blacklist ${PATH}/curl 85blacklist ${PATH}/curl
diff --git a/etc/profile-m-z/multimc5.profile b/etc/profile-m-z/multimc5.profile
index 73107680c..41f82bd07 100644
--- a/etc/profile-m-z/multimc5.profile
+++ b/etc/profile-m-z/multimc5.profile
@@ -41,12 +41,12 @@ notv
41nou2f 41nou2f
42novideo 42novideo
43protocol unix,inet,inet6 43protocol unix,inet,inet6
44# seccomp 44#seccomp
45 45
46disable-mnt 46disable-mnt
47# private-bin works, but causes weirdness 47# private-bin works, but causes weirdness
48# private-bin apt-file,awk,bash,chmod,dirname,dnf,grep,java,kdialog,ldd,mkdir,multimc5,pfl,pkgfile,readlink,sort,valgrind,which,yum,zenity,zypper 48#private-bin apt-file,awk,bash,chmod,dirname,dnf,grep,java,kdialog,ldd,mkdir,multimc5,pfl,pkgfile,readlink,sort,valgrind,which,yum,zenity,zypper
49private-dev 49private-dev
50private-tmp 50private-tmp
51 51
52# restrict-namespaces 52#restrict-namespaces
diff --git a/etc/profile-m-z/mumble.profile b/etc/profile-m-z/mumble.profile
index ef09e6fca..52dc46800 100644
--- a/etc/profile-m-z/mumble.profile
+++ b/etc/profile-m-z/mumble.profile
@@ -41,5 +41,5 @@ disable-mnt
41private-bin mumble 41private-bin mumble
42private-tmp 42private-tmp
43 43
44#memory-deny-write-execute - breaks on Arch (see issue #1803) 44#memory-deny-write-execute # breaks on Arch (see issue #1803)
45restrict-namespaces 45restrict-namespaces
diff --git a/etc/profile-m-z/musescore.profile b/etc/profile-m-z/musescore.profile
index ca951f70c..b62674ad6 100644
--- a/etc/profile-m-z/musescore.profile
+++ b/etc/profile-m-z/musescore.profile
@@ -37,7 +37,7 @@ protocol unix,inet,inet6
37seccomp !chroot 37seccomp !chroot
38tracelog 38tracelog
39 39
40# private-bin musescore,mscore 40#private-bin musescore,mscore
41private-tmp 41private-tmp
42 42
43# restrict-namespaces 43#restrict-namespaces
diff --git a/etc/profile-m-z/musixmatch.profile b/etc/profile-m-z/musixmatch.profile
index 7ce7fbd19..d67cd24bd 100644
--- a/etc/profile-m-z/musixmatch.profile
+++ b/etc/profile-m-z/musixmatch.profile
@@ -35,4 +35,4 @@ disable-mnt
35private-dev 35private-dev
36private-etc @tls-ca 36private-etc @tls-ca
37 37
38# restrict-namespaces 38#restrict-namespaces
diff --git a/etc/profile-m-z/mutt.profile b/etc/profile-m-z/mutt.profile
index 288ffedf1..f56c2b1e5 100644
--- a/etc/profile-m-z/mutt.profile
+++ b/etc/profile-m-z/mutt.profile
@@ -121,7 +121,7 @@ seccomp
121seccomp.block-secondary 121seccomp.block-secondary
122tracelog 122tracelog
123 123
124# disable-mnt 124#disable-mnt
125private-cache 125private-cache
126private-dev 126private-dev
127private-etc @tls-ca,@x11,Mutt,Muttrc,Muttrc.d,gai.conf,gnupg,gnutls,hosts.conf,mail,mailname,nntpserver,terminfo 127private-etc @tls-ca,@x11,Mutt,Muttrc,Muttrc.d,gai.conf,gnupg,gnutls,hosts.conf,mail,mailname,nntpserver,terminfo
diff --git a/etc/profile-m-z/nano.profile b/etc/profile-m-z/nano.profile
index 6b4074dfb..ba63b2067 100644
--- a/etc/profile-m-z/nano.profile
+++ b/etc/profile-m-z/nano.profile
@@ -41,7 +41,7 @@ seccomp
41tracelog 41tracelog
42x11 none 42x11 none
43 43
44# disable-mnt 44#disable-mnt
45private-bin nano,rnano 45private-bin nano,rnano
46private-cache 46private-cache
47private-dev 47private-dev
diff --git a/etc/profile-m-z/ncdu.profile b/etc/profile-m-z/ncdu.profile
index 09687199b..5cfd8290a 100644
--- a/etc/profile-m-z/ncdu.profile
+++ b/etc/profile-m-z/ncdu.profile
@@ -29,7 +29,7 @@ seccomp
29x11 none 29x11 none
30 30
31private-dev 31private-dev
32# private-tmp 32#private-tmp
33 33
34dbus-user none 34dbus-user none
35dbus-system none 35dbus-system none
diff --git a/etc/profile-m-z/neomutt.profile b/etc/profile-m-z/neomutt.profile
index 5bd1e7cba..e028d8d42 100644
--- a/etc/profile-m-z/neomutt.profile
+++ b/etc/profile-m-z/neomutt.profile
@@ -113,7 +113,7 @@ seccomp
113seccomp.block-secondary 113seccomp.block-secondary
114tracelog 114tracelog
115 115
116# disable-mnt 116#disable-mnt
117private-cache 117private-cache
118private-dev 118private-dev
119private-etc @tls-ca,@x11,Mutt,Muttrc,Muttrc.d,gnupg,hosts.conf,mail,mailname,neomuttrc,neomuttrc.d,nntpserver 119private-etc @tls-ca,@x11,Mutt,Muttrc,Muttrc.d,gnupg,hosts.conf,mail,mailname,neomuttrc,neomuttrc.d,nntpserver
diff --git a/etc/profile-m-z/nitroshare.profile b/etc/profile-m-z/nitroshare.profile
index 7a97ca825..254eb789a 100644
--- a/etc/profile-m-z/nitroshare.profile
+++ b/etc/profile-m-z/nitroshare.profile
@@ -42,11 +42,11 @@ private-bin awk,grep,nitroshare,nitroshare-cli,nitroshare-nmh,nitroshare-send,ni
42private-cache 42private-cache
43private-dev 43private-dev
44private-etc @tls-ca,@x11 44private-etc @tls-ca,@x11
45# private-lib libnitroshare.so.*,libqhttpengine.so.*,libqmdnsengine.so.*,nitroshare 45#private-lib libnitroshare.so.*,libqhttpengine.so.*,libqmdnsengine.so.*,nitroshare
46private-tmp 46private-tmp
47 47
48# dbus-user none 48#dbus-user none
49# dbus-system none 49#dbus-system none
50 50
51# memory-deny-write-execute 51#memory-deny-write-execute
52restrict-namespaces 52restrict-namespaces
diff --git a/etc/profile-m-z/nuclear.profile b/etc/profile-m-z/nuclear.profile
index dec48c827..57fba2693 100644
--- a/etc/profile-m-z/nuclear.profile
+++ b/etc/profile-m-z/nuclear.profile
@@ -17,7 +17,7 @@ whitelist ${HOME}/.config/nuclear
17 17
18no3d 18no3d
19 19
20# private-bin nuclear 20#private-bin nuclear
21private-etc @tls-ca,@x11,host.conf,mime.types 21private-etc @tls-ca,@x11,host.conf,mime.types
22private-opt nuclear 22private-opt nuclear
23 23
diff --git a/etc/profile-m-z/okular.profile b/etc/profile-m-z/okular.profile
index 8e0758c37..ac573dc47 100644
--- a/etc/profile-m-z/okular.profile
+++ b/etc/profile-m-z/okular.profile
@@ -44,7 +44,7 @@ include whitelist-var-common.inc
44apparmor 44apparmor
45caps.drop all 45caps.drop all
46machine-id 46machine-id
47# net none 47#net none
48netfilter 48netfilter
49nodvd 49nodvd
50nogroups 50nogroups
@@ -62,12 +62,13 @@ tracelog
62private-bin kbuildsycoca4,kdeinit4,lpr,okular,unar,unrar 62private-bin kbuildsycoca4,kdeinit4,lpr,okular,unar,unrar
63private-dev 63private-dev
64private-etc @x11,cups 64private-etc @x11,cups
65# private-tmp - on KDE we need access to the real /tmp for data exchange with email clients 65# on KDE we need access to the real /tmp for data exchange with email clients
66#private-tmp
66 67
67# dbus-user none 68#dbus-user none
68# dbus-system none 69#dbus-system none
69 70
70# memory-deny-write-execute 71#memory-deny-write-execute
71 72
72restrict-namespaces 73restrict-namespaces
73join-or-start okular 74join-or-start okular
diff --git a/etc/profile-m-z/onionshare-gui.profile b/etc/profile-m-z/onionshare-gui.profile
index 47ac9fc05..3338cadf5 100644
--- a/etc/profile-m-z/onionshare-gui.profile
+++ b/etc/profile-m-z/onionshare-gui.profile
@@ -50,7 +50,7 @@ novideo
50protocol unix,inet,inet6 50protocol unix,inet,inet6
51seccomp 51seccomp
52seccomp.block-secondary 52seccomp.block-secondary
53#tracelog - may cause issues, see #1930 53#tracelog # may cause issues, see #1930
54 54
55disable-mnt 55disable-mnt
56private-bin onionshare,onionshare-cli,onionshare-gui,python*,tor* 56private-bin onionshare,onionshare-cli,onionshare-gui,python*,tor*
diff --git a/etc/profile-m-z/openclonk.profile b/etc/profile-m-z/openclonk.profile
index 3449ac686..e10f6011b 100644
--- a/etc/profile-m-z/openclonk.profile
+++ b/etc/profile-m-z/openclonk.profile
@@ -24,7 +24,7 @@ include whitelist-var-common.inc
24apparmor 24apparmor
25caps.drop all 25caps.drop all
26ipc-namespace 26ipc-namespace
27# net none - networked game 27#net none # networked game
28netfilter 28netfilter
29nodvd 29nodvd
30nogroups 30nogroups
diff --git a/etc/profile-m-z/orage.profile b/etc/profile-m-z/orage.profile
index fa16c05e2..c4849b958 100644
--- a/etc/profile-m-z/orage.profile
+++ b/etc/profile-m-z/orage.profile
@@ -24,7 +24,7 @@ nogroups
24noinput 24noinput
25nonewprivs 25nonewprivs
26noroot 26noroot
27# nosound - calendar application, It must be able to play sound to wake you up. 27#nosound # calendar application, It must be able to play sound to wake you up.
28notv 28notv
29nou2f 29nou2f
30novideo 30novideo
diff --git a/etc/profile-m-z/otter-browser.profile b/etc/profile-m-z/otter-browser.profile
index a1c0462ba..76d4a2c52 100644
--- a/etc/profile-m-z/otter-browser.profile
+++ b/etc/profile-m-z/otter-browser.profile
@@ -57,4 +57,4 @@ private-tmp
57 57
58dbus-system none 58dbus-system none
59 59
60# restrict-namespaces 60#restrict-namespaces
diff --git a/etc/profile-m-z/pidgin.profile b/etc/profile-m-z/pidgin.profile
index a852a2a18..5bc0bd700 100644
--- a/etc/profile-m-z/pidgin.profile
+++ b/etc/profile-m-z/pidgin.profile
@@ -40,7 +40,7 @@ protocol unix,inet,inet6,netlink
40seccomp 40seccomp
41tracelog 41tracelog
42 42
43# private-bin pidgin 43#private-bin pidgin
44private-cache 44private-cache
45private-dev 45private-dev
46private-tmp 46private-tmp
diff --git a/etc/profile-m-z/ping.profile b/etc/profile-m-z/ping.profile
index d563064e1..c3aa0a501 100644
--- a/etc/profile-m-z/ping.profile
+++ b/etc/profile-m-z/ping.profile
@@ -55,7 +55,7 @@ tracelog
55 55
56disable-mnt 56disable-mnt
57private 57private
58#private-bin ping - has mammoth problems with execvp: "No such file or directory" 58#private-bin ping # has mammoth problems with execvp: "No such file or directory"
59private-cache 59private-cache
60private-dev 60private-dev
61private-etc @tls-ca 61private-etc @tls-ca
diff --git a/etc/profile-m-z/pluma.profile b/etc/profile-m-z/pluma.profile
index efcdaa661..6e56208d5 100644
--- a/etc/profile-m-z/pluma.profile
+++ b/etc/profile-m-z/pluma.profile
@@ -21,10 +21,10 @@ include disable-shell.inc
21 21
22include whitelist-var-common.inc 22include whitelist-var-common.inc
23 23
24# apparmor - makes settings immutable 24#apparmor # makes settings immutable
25caps.drop all 25caps.drop all
26machine-id 26machine-id
27# net none - makes settings immutable 27#net none # makes settings immutable
28no3d 28no3d
29nodvd 29nodvd
30nogroups 30nogroups
@@ -45,8 +45,8 @@ private-lib aspell,gconv,libgspell-1.so.*,libreadline.so.*,libtinfo.so.*,pluma
45private-tmp 45private-tmp
46 46
47# makes settings immutable 47# makes settings immutable
48# dbus-user none 48#dbus-user none
49# dbus-system none 49#dbus-system none
50 50
51restrict-namespaces 51restrict-namespaces
52join-or-start pluma 52join-or-start pluma
diff --git a/etc/profile-m-z/plv.profile b/etc/profile-m-z/plv.profile
index 34e18cbd7..38fa01553 100644
--- a/etc/profile-m-z/plv.profile
+++ b/etc/profile-m-z/plv.profile
@@ -53,7 +53,7 @@ writable-var-log
53dbus-user none 53dbus-user none
54dbus-system none 54dbus-system none
55 55
56#memory-deny-write-execute - breaks opening file-chooser 56#memory-deny-write-execute # breaks opening file-chooser
57read-only ${HOME} 57read-only ${HOME}
58read-write ${HOME}/.config/PacmanLogViewer 58read-write ${HOME}/.config/PacmanLogViewer
59read-only /var/log/pacman.log 59read-only /var/log/pacman.log
diff --git a/etc/profile-m-z/psi-plus.profile b/etc/profile-m-z/psi-plus.profile
index af117c3b5..7a735bba7 100644
--- a/etc/profile-m-z/psi-plus.profile
+++ b/etc/profile-m-z/psi-plus.profile
@@ -43,4 +43,4 @@ disable-mnt
43private-dev 43private-dev
44private-tmp 44private-tmp
45 45
46# restrict-namespaces 46#restrict-namespaces
diff --git a/etc/profile-m-z/psi.profile b/etc/profile-m-z/psi.profile
index a1a0606b9..1417a87c9 100644
--- a/etc/profile-m-z/psi.profile
+++ b/etc/profile-m-z/psi.profile
@@ -62,7 +62,7 @@ novideo
62nou2f 62nou2f
63protocol unix,inet,inet6,netlink 63protocol unix,inet,inet6,netlink
64seccomp !chroot 64seccomp !chroot
65#tracelog - breaks on Arch 65#tracelog # breaks on Arch
66 66
67disable-mnt 67disable-mnt
68# Add the next line to your psi.local to enable GPG support. 68# Add the next line to your psi.local to enable GPG support.
diff --git a/etc/profile-m-z/pycharm-community.profile b/etc/profile-m-z/pycharm-community.profile
index 875b83e8e..fa307fc88 100644
--- a/etc/profile-m-z/pycharm-community.profile
+++ b/etc/profile-m-z/pycharm-community.profile
@@ -34,8 +34,8 @@ nou2f
34novideo 34novideo
35tracelog 35tracelog
36 36
37# private-etc alternatives,fonts,passwd - minimal required to run but will probably break 37# minimum required to run but will probably break the program!
38# program! 38#private-etc alternatives,fonts,passwd
39private-dev 39private-dev
40private-tmp 40private-tmp
41 41
diff --git a/etc/profile-m-z/qbittorrent.profile b/etc/profile-m-z/qbittorrent.profile
index 9605da3ac..ae0a2cdf1 100644
--- a/etc/profile-m-z/qbittorrent.profile
+++ b/etc/profile-m-z/qbittorrent.profile
@@ -55,12 +55,12 @@ seccomp
55 55
56private-bin python*,qbittorrent 56private-bin python*,qbittorrent
57private-dev 57private-dev
58# private-etc alternatives,ca-certificates,crypto-policies,fonts,pki,resolv.conf,ssl,X11,xdg 58#private-etc alternatives,ca-certificates,crypto-policies,fonts,pki,resolv.conf,ssl,X11,xdg
59private-tmp 59private-tmp
60 60
61# See https://github.com/netblue30/firejail/issues/3707 for tray-icon 61# See https://github.com/netblue30/firejail/issues/3707 for tray-icon
62dbus-user none 62dbus-user none
63dbus-system none 63dbus-system none
64 64
65# memory-deny-write-execute - problems on Arch, see #1690 on GitHub repo 65#memory-deny-write-execute # problems on Arch, see #1690 on GitHub repo
66restrict-namespaces 66restrict-namespaces
diff --git a/etc/profile-m-z/qmmp.profile b/etc/profile-m-z/qmmp.profile
index ecd62a7d1..66c8f3238 100644
--- a/etc/profile-m-z/qmmp.profile
+++ b/etc/profile-m-z/qmmp.profile
@@ -18,7 +18,7 @@ include disable-xdg.inc
18 18
19caps.drop all 19caps.drop all
20netfilter 20netfilter
21# no3d 21#no3d
22nogroups 22nogroups
23noinput 23noinput
24nonewprivs 24nonewprivs
diff --git a/etc/profile-m-z/qpdfview.profile b/etc/profile-m-z/qpdfview.profile
index 4caa0917f..784d2fafd 100644
--- a/etc/profile-m-z/qpdfview.profile
+++ b/etc/profile-m-z/qpdfview.profile
@@ -41,7 +41,7 @@ private-dev
41private-tmp 41private-tmp
42 42
43# needs D-Bus when started from a file manager 43# needs D-Bus when started from a file manager
44# dbus-user none 44#dbus-user none
45# dbus-system none 45#dbus-system none
46 46
47restrict-namespaces 47restrict-namespaces
diff --git a/etc/profile-m-z/qtox.profile b/etc/profile-m-z/qtox.profile
index ab0f9425a..20c84c5a8 100644
--- a/etc/profile-m-z/qtox.profile
+++ b/etc/profile-m-z/qtox.profile
@@ -48,5 +48,5 @@ private-tmp
48dbus-user none 48dbus-user none
49dbus-system none 49dbus-system none
50 50
51#memory-deny-write-execute - breaks on Arch (see issue #1803) 51#memory-deny-write-execute # breaks on Arch (see issue #1803)
52restrict-namespaces 52restrict-namespaces
diff --git a/etc/profile-m-z/quassel.profile b/etc/profile-m-z/quassel.profile
index 4589c9e4a..4ec990e95 100644
--- a/etc/profile-m-z/quassel.profile
+++ b/etc/profile-m-z/quassel.profile
@@ -25,4 +25,4 @@ seccomp !chroot
25private-cache 25private-cache
26private-tmp 26private-tmp
27 27
28# restrict-namespaces 28#restrict-namespaces
diff --git a/etc/profile-m-z/quiterss.profile b/etc/profile-m-z/quiterss.profile
index a59f01f85..4102b1ea0 100644
--- a/etc/profile-m-z/quiterss.profile
+++ b/etc/profile-m-z/quiterss.profile
@@ -50,6 +50,6 @@ tracelog
50disable-mnt 50disable-mnt
51private-bin quiterss 51private-bin quiterss
52private-dev 52private-dev
53# private-etc alternatives,ca-certificates,crypto-policies,pki,ssl,X11 53#private-etc alternatives,ca-certificates,crypto-policies,pki,ssl,X11
54 54
55restrict-namespaces 55restrict-namespaces
diff --git a/etc/profile-m-z/rpcs3.profile b/etc/profile-m-z/rpcs3.profile
index 405ab818d..603ec8ff4 100644
--- a/etc/profile-m-z/rpcs3.profile
+++ b/etc/profile-m-z/rpcs3.profile
@@ -54,7 +54,8 @@ tracelog
54 54
55disable-mnt 55disable-mnt
56#private-cache 56#private-cache
57#private-etc alternatives,ca-certificates,crypto-policies,machine-id,pki,resolv.conf,ssl # seems to need awk 57# seems to need awk
58#private-etc alternatives,ca-certificates,crypto-policies,machine-id,pki,resolv.conf,ssl
58private-tmp 59private-tmp
59 60
60dbus-user none 61dbus-user none
diff --git a/etc/profile-m-z/rssguard.profile b/etc/profile-m-z/rssguard.profile
index 81381c205..ce455baba 100644
--- a/etc/profile-m-z/rssguard.profile
+++ b/etc/profile-m-z/rssguard.profile
@@ -31,13 +31,13 @@ include whitelist-var-common.inc
31apparmor 31apparmor
32caps.drop all 32caps.drop all
33netfilter 33netfilter
34# no3d 34#no3d
35nodvd 35nodvd
36nogroups 36nogroups
37noinput 37noinput
38nonewprivs 38nonewprivs
39noroot 39noroot
40# nosound 40#nosound
41notv 41notv
42nou2f 42nou2f
43novideo 43novideo
diff --git a/etc/profile-m-z/scribus.profile b/etc/profile-m-z/scribus.profile
index 34cf783fe..8e25375b0 100644
--- a/etc/profile-m-z/scribus.profile
+++ b/etc/profile-m-z/scribus.profile
@@ -55,7 +55,7 @@ protocol unix
55seccomp 55seccomp
56tracelog 56tracelog
57 57
58# private-bin gimp*,gs,scribus 58#private-bin gimp*,gs,scribus
59private-dev 59private-dev
60private-tmp 60private-tmp
61 61
diff --git a/etc/profile-m-z/seamonkey.profile b/etc/profile-m-z/seamonkey.profile
index c2dbbc2c6..1171a52f0 100644
--- a/etc/profile-m-z/seamonkey.profile
+++ b/etc/profile-m-z/seamonkey.profile
@@ -55,7 +55,7 @@ seccomp
55tracelog 55tracelog
56 56
57disable-mnt 57disable-mnt
58# private-etc adobe,alternatives,asound.conf,ca-certificates,crypto-policies,firefox,fonts,group,gtk-2.0,hostname,hosts,iceweasel,localtime,machine-id,mailcap,mime.types,nsswitch.conf,pango,passwd,pki,pulse,resolv.conf,ssl 58#private-etc adobe,alternatives,asound.conf,ca-certificates,crypto-policies,firefox,fonts,group,gtk-2.0,hostname,hosts,iceweasel,localtime,machine-id,mailcap,mime.types,nsswitch.conf,pango,passwd,pki,pulse,resolv.conf,ssl
59writable-run-user 59writable-run-user
60 60
61restrict-namespaces 61restrict-namespaces
diff --git a/etc/profile-m-z/server.profile b/etc/profile-m-z/server.profile
index 667f9c557..74587c992 100644
--- a/etc/profile-m-z/server.profile
+++ b/etc/profile-m-z/server.profile
@@ -34,36 +34,36 @@ include globals.local
34noblacklist /sbin 34noblacklist /sbin
35noblacklist /usr/sbin 35noblacklist /usr/sbin
36noblacklist /etc/init.d 36noblacklist /etc/init.d
37# noblacklist /var/opt 37#noblacklist /var/opt
38 38
39blacklist /tmp/.X11-unix 39blacklist /tmp/.X11-unix
40blacklist ${RUNUSER}/wayland-* 40blacklist ${RUNUSER}/wayland-*
41 41
42include disable-common.inc 42include disable-common.inc
43# include disable-devel.inc 43#include disable-devel.inc
44# include disable-exec.inc 44#include disable-exec.inc
45# include disable-interpreters.inc 45#include disable-interpreters.inc
46include disable-programs.inc 46include disable-programs.inc
47include disable-write-mnt.inc 47include disable-write-mnt.inc
48include disable-xdg.inc 48include disable-xdg.inc
49 49
50# include whitelist-runuser-common.inc 50#include whitelist-runuser-common.inc
51# include whitelist-usr-share-common.inc 51#include whitelist-usr-share-common.inc
52# include whitelist-var-common.inc 52#include whitelist-var-common.inc
53 53
54# people use to install servers all over the place! 54# people use to install servers all over the place!
55# apparmor runs executable only from default system locations 55# apparmor runs executable only from default system locations
56# apparmor 56#apparmor
57caps 57caps
58# ipc-namespace 58#ipc-namespace
59machine-id 59machine-id
60# netfilter /etc/firejail/webserver.net 60#netfilter /etc/firejail/webserver.net
61no3d 61no3d
62nodvd 62nodvd
63# nogroups 63#nogroups
64noinput 64noinput
65nonewprivs 65nonewprivs
66# noroot 66#noroot
67nosound 67nosound
68notv 68notv
69nou2f 69nou2f
@@ -74,22 +74,22 @@ tab # allow tab completion
74 74
75disable-mnt 75disable-mnt
76private 76private
77# private-bin program 77#private-bin program
78# private-cache 78#private-cache
79private-dev 79private-dev
80# see /usr/share/doc/firejail/profile.template for more common private-etc paths. 80# see /usr/share/doc/firejail/profile.template for more common private-etc paths.
81# private-etc alternatives 81#private-etc alternatives
82# private-lib 82#private-lib
83# private-opt none 83#private-opt none
84private-tmp 84private-tmp
85# writable-run-user 85#writable-run-user
86# writable-var 86#writable-var
87# writable-var-log 87#writable-var-log
88 88
89dbus-user none 89dbus-user none
90# dbus-system none 90#dbus-system none
91 91
92# deterministic-shutdown 92#deterministic-shutdown
93# memory-deny-write-execute 93#memory-deny-write-execute
94# read-only ${HOME} 94#read-only ${HOME}
95# restrict-namespaces 95#restrict-namespaces
diff --git a/etc/profile-m-z/silentarmy.profile b/etc/profile-m-z/silentarmy.profile
index 96e4cf283..154e29ccf 100644
--- a/etc/profile-m-z/silentarmy.profile
+++ b/etc/profile-m-z/silentarmy.profile
@@ -7,7 +7,7 @@ include globals.local
7 7
8 8
9include disable-common.inc 9include disable-common.inc
10# include disable-devel.inc 10#include disable-devel.inc
11include disable-exec.inc 11include disable-exec.inc
12include disable-interpreters.inc 12include disable-interpreters.inc
13include disable-programs.inc 13include disable-programs.inc
diff --git a/etc/profile-m-z/simple-scan.profile b/etc/profile-m-z/simple-scan.profile
index 14846cf58..f8bcd3c6e 100644
--- a/etc/profile-m-z/simple-scan.profile
+++ b/etc/profile-m-z/simple-scan.profile
@@ -28,15 +28,15 @@ nonewprivs
28noroot 28noroot
29nosound 29nosound
30notv 30notv
31# novideo 31#novideo
32protocol unix,inet,inet6,netlink 32protocol unix,inet,inet6,netlink
33# blacklisting of ioperm system calls breaks simple-scan 33# blacklisting of ioperm system calls breaks simple-scan
34seccomp !ioperm 34seccomp !ioperm
35tracelog 35tracelog
36 36
37# private-bin simple-scan 37#private-bin simple-scan
38# private-dev 38#private-dev
39# private-etc alternatives,ca-certificates,crypto-policies,fonts,pki,ssl 39#private-etc alternatives,ca-certificates,crypto-policies,fonts,pki,ssl
40# private-tmp 40#private-tmp
41 41
42restrict-namespaces 42restrict-namespaces
diff --git a/etc/profile-m-z/simutrans.profile b/etc/profile-m-z/simutrans.profile
index f88ae65c8..995b59538 100644
--- a/etc/profile-m-z/simutrans.profile
+++ b/etc/profile-m-z/simutrans.profile
@@ -33,7 +33,7 @@ novideo
33protocol unix 33protocol unix
34seccomp 34seccomp
35 35
36# private-bin simutrans 36#private-bin simutrans
37private-dev 37private-dev
38private-etc @games,@x11 38private-etc @games,@x11
39private-tmp 39private-tmp
diff --git a/etc/profile-m-z/skanlite.profile b/etc/profile-m-z/skanlite.profile
index 6b73b2289..3b78f7fd2 100644
--- a/etc/profile-m-z/skanlite.profile
+++ b/etc/profile-m-z/skanlite.profile
@@ -22,16 +22,16 @@ nonewprivs
22noroot 22noroot
23nosound 23nosound
24notv 24notv
25# novideo 25#novideo
26protocol unix,inet,inet6,netlink 26protocol unix,inet,inet6,netlink
27# blacklisting of ioperm system calls breaks skanlite 27# blacklisting of ioperm system calls breaks skanlite
28seccomp !ioperm 28seccomp !ioperm
29 29
30# private-bin kbuildsycoca4,kdeinit4,skanlite 30#private-bin kbuildsycoca4,kdeinit4,skanlite
31# private-dev 31#private-dev
32# private-tmp 32#private-tmp
33 33
34# dbus-user none 34#dbus-user none
35# dbus-system none 35#dbus-system none
36 36
37restrict-namespaces 37restrict-namespaces
diff --git a/etc/profile-m-z/smplayer.profile b/etc/profile-m-z/smplayer.profile
index 9dd41fd27..ece191b73 100644
--- a/etc/profile-m-z/smplayer.profile
+++ b/etc/profile-m-z/smplayer.profile
@@ -36,7 +36,7 @@ include whitelist-var-common.inc
36apparmor 36apparmor
37caps.drop all 37caps.drop all
38netfilter 38netfilter
39# nogroups 39#nogroups
40noinput 40noinput
41nonewprivs 41nonewprivs
42noroot 42noroot
@@ -49,7 +49,7 @@ private-dev
49private-tmp 49private-tmp
50 50
51# problems with KDE 51# problems with KDE
52# dbus-user none 52#dbus-user none
53# dbus-system none 53#dbus-system none
54 54
55restrict-namespaces 55restrict-namespaces
diff --git a/etc/profile-m-z/sniffnet.profile b/etc/profile-m-z/sniffnet.profile
index eb18c1f01..940c35b2e 100644
--- a/etc/profile-m-z/sniffnet.profile
+++ b/etc/profile-m-z/sniffnet.profile
@@ -29,8 +29,8 @@ netfilter
29nodvd 29nodvd
30nogroups 30nogroups
31noinput 31noinput
32# nonewprivs - breaks network traffic capture for unprivileged users 32#nonewprivs # breaks network traffic capture for unprivileged users
33# noroot 33#noroot
34notv 34notv
35nou2f 35nou2f
36novideo 36novideo
diff --git a/etc/profile-m-z/sol.profile b/etc/profile-m-z/sol.profile
index e2be4e9e0..07f9b0094 100644
--- a/etc/profile-m-z/sol.profile
+++ b/etc/profile-m-z/sol.profile
@@ -21,13 +21,13 @@ apparmor
21caps.drop all 21caps.drop all
22ipc-namespace 22ipc-namespace
23net none 23net none
24# no3d 24#no3d
25nodvd 25nodvd
26nogroups 26nogroups
27noinput 27noinput
28nonewprivs 28nonewprivs
29noroot 29noroot
30# nosound 30#nosound
31notv 31notv
32nou2f 32nou2f
33novideo 33novideo
@@ -43,5 +43,5 @@ private-tmp
43dbus-user none 43dbus-user none
44dbus-system none 44dbus-system none
45 45
46# memory-deny-write-execute 46#memory-deny-write-execute
47restrict-namespaces 47restrict-namespaces
diff --git a/etc/profile-m-z/sound-juicer.profile b/etc/profile-m-z/sound-juicer.profile
index f5ac6c739..5c5763538 100644
--- a/etc/profile-m-z/sound-juicer.profile
+++ b/etc/profile-m-z/sound-juicer.profile
@@ -38,7 +38,7 @@ private-cache
38private-dev 38private-dev
39private-tmp 39private-tmp
40 40
41# dbus-user none 41#dbus-user none
42# dbus-system none 42#dbus-system none
43 43
44restrict-namespaces 44restrict-namespaces
diff --git a/etc/profile-m-z/sqlitebrowser.profile b/etc/profile-m-z/sqlitebrowser.profile
index ce356367f..013c7ac13 100644
--- a/etc/profile-m-z/sqlitebrowser.profile
+++ b/etc/profile-m-z/sqlitebrowser.profile
@@ -46,8 +46,8 @@ private-etc @tls-ca
46private-tmp 46private-tmp
47 47
48# breaks proxy creation 48# breaks proxy creation
49# dbus-user none 49#dbus-user none
50# dbus-system none 50#dbus-system none
51 51
52#memory-deny-write-execute - breaks on Arch (see issue #1803) 52#memory-deny-write-execute # breaks on Arch (see issue #1803)
53restrict-namespaces 53restrict-namespaces
diff --git a/etc/profile-m-z/ssh.profile b/etc/profile-m-z/ssh.profile
index a7956a76e..fde85be64 100644
--- a/etc/profile-m-z/ssh.profile
+++ b/etc/profile-m-z/ssh.profile
@@ -32,10 +32,10 @@ nodvd
32nogroups 32nogroups
33noinput 33noinput
34nonewprivs 34nonewprivs
35# noroot - see issue #1543 35#noroot # see issue #1543
36nosound 36nosound
37notv 37notv
38# nou2f - OpenSSH >= 8.2 supports U2F 38#nou2f # OpenSSH >= 8.2 supports U2F
39novideo 39novideo
40protocol unix,inet,inet6 40protocol unix,inet,inet6
41seccomp 41seccomp
@@ -43,7 +43,7 @@ tracelog
43 43
44private-cache 44private-cache
45private-dev 45private-dev
46# private-tmp # Breaks when exiting 46#private-tmp # Breaks when exiting
47writable-run-user 47writable-run-user
48 48
49dbus-user none 49dbus-user none
diff --git a/etc/profile-m-z/standardnotes-desktop.profile b/etc/profile-m-z/standardnotes-desktop.profile
index 3fe0963a9..fe4e4b6d7 100644
--- a/etc/profile-m-z/standardnotes-desktop.profile
+++ b/etc/profile-m-z/standardnotes-desktop.profile
@@ -47,4 +47,4 @@ private-etc @tls-ca,@x11,host.conf
47dbus-user none 47dbus-user none
48dbus-system none 48dbus-system none
49 49
50# restrict-namespaces 50#restrict-namespaces
diff --git a/etc/profile-m-z/subdownloader.profile b/etc/profile-m-z/subdownloader.profile
index 6de288c46..8b5d7e253 100644
--- a/etc/profile-m-z/subdownloader.profile
+++ b/etc/profile-m-z/subdownloader.profile
@@ -49,5 +49,5 @@ private-tmp
49dbus-user none 49dbus-user none
50dbus-system none 50dbus-system none
51 51
52#memory-deny-write-execute - breaks on Arch (see issue #1803) 52#memory-deny-write-execute # breaks on Arch (see issue #1803)
53restrict-namespaces 53restrict-namespaces
diff --git a/etc/profile-m-z/supertux2.profile b/etc/profile-m-z/supertux2.profile
index 2ad107f1a..65aea6667 100644
--- a/etc/profile-m-z/supertux2.profile
+++ b/etc/profile-m-z/supertux2.profile
@@ -41,7 +41,7 @@ seccomp.block-secondary
41tracelog 41tracelog
42 42
43disable-mnt 43disable-mnt
44# private-bin supertux2 44#private-bin supertux2
45private-cache 45private-cache
46private-etc 46private-etc
47private-dev 47private-dev
diff --git a/etc/profile-m-z/sushi.profile b/etc/profile-m-z/sushi.profile
index 7b6a87b31..728db012e 100644
--- a/etc/profile-m-z/sushi.profile
+++ b/etc/profile-m-z/sushi.profile
@@ -13,7 +13,7 @@ include disable-common.inc
13include disable-devel.inc 13include disable-devel.inc
14include disable-exec.inc 14include disable-exec.inc
15include disable-interpreters.inc 15include disable-interpreters.inc
16# include disable-programs.inc 16#include disable-programs.inc
17include disable-shell.inc 17include disable-shell.inc
18 18
19include whitelist-runuser-common.inc 19include whitelist-runuser-common.inc
diff --git a/etc/profile-m-z/sylpheed.profile b/etc/profile-m-z/sylpheed.profile
index 5fb35aa04..7cef394c2 100644
--- a/etc/profile-m-z/sylpheed.profile
+++ b/etc/profile-m-z/sylpheed.profile
@@ -13,7 +13,7 @@ whitelist ${HOME}/.sylpheed-2.0
13 13
14whitelist /usr/share/sylpheed 14whitelist /usr/share/sylpheed
15 15
16# private-bin curl,gpg,gpg2,gpg-agent,gpgsm,pinentry,pinentry-gtk-2,sylpheed 16#private-bin curl,gpg,gpg2,gpg-agent,gpgsm,pinentry,pinentry-gtk-2,sylpheed
17 17
18# Redirect 18# Redirect
19include email-common.profile 19include email-common.profile
diff --git a/etc/profile-m-z/sysprof.profile b/etc/profile-m-z/sysprof.profile
index 726baf336..b0a80fc27 100644
--- a/etc/profile-m-z/sysprof.profile
+++ b/etc/profile-m-z/sysprof.profile
@@ -59,11 +59,11 @@ seccomp
59tracelog 59tracelog
60 60
61disable-mnt 61disable-mnt
62#private-bin sysprof - breaks help menu 62#private-bin sysprof # breaks help menu
63private-cache 63private-cache
64private-dev 64private-dev
65private-etc @tls-ca 65private-etc @tls-ca
66# private-lib - breaks help menu 66#private-lib # breaks help menu
67#private-lib gdk-pixbuf-2.*,gio,gtk3,gvfs/libgvfscommon.so,libgconf-2.so.*,librsvg-2.so.*,libsysprof-2.so,libsysprof-ui-2.so 67#private-lib gdk-pixbuf-2.*,gio,gtk3,gvfs/libgvfscommon.so,libgconf-2.so.*,librsvg-2.so.*,libsysprof-2.so,libsysprof-ui-2.so
68private-tmp 68private-tmp
69 69
@@ -73,5 +73,5 @@ dbus-user.own org.gnome.Yelp
73dbus-user.own org.gnome.Sysprof3 73dbus-user.own org.gnome.Sysprof3
74dbus-user.talk ca.desrt.dconf 74dbus-user.talk ca.desrt.dconf
75 75
76# memory-deny-write-execute - breaks on Arch 76#memory-deny-write-execute # breaks on Arch
77restrict-namespaces 77restrict-namespaces
diff --git a/etc/profile-m-z/teamspeak3.profile b/etc/profile-m-z/teamspeak3.profile
index 41da4ee13..06b547b3d 100644
--- a/etc/profile-m-z/teamspeak3.profile
+++ b/etc/profile-m-z/teamspeak3.profile
@@ -39,4 +39,4 @@ disable-mnt
39private-dev 39private-dev
40private-tmp 40private-tmp
41 41
42# restrict-namespaces 42#restrict-namespaces
diff --git a/etc/profile-m-z/thunderbird.profile b/etc/profile-m-z/thunderbird.profile
index 17e2f0856..979971ac2 100644
--- a/etc/profile-m-z/thunderbird.profile
+++ b/etc/profile-m-z/thunderbird.profile
@@ -35,7 +35,7 @@ whitelist ${HOME}/.mozilla/firefox/profiles.ini
35 35
36noblacklist ${HOME}/.cache/thunderbird 36noblacklist ${HOME}/.cache/thunderbird
37noblacklist ${HOME}/.gnupg 37noblacklist ${HOME}/.gnupg
38# noblacklist ${HOME}/.icedove 38#noblacklist ${HOME}/.icedove
39noblacklist ${HOME}/.thunderbird 39noblacklist ${HOME}/.thunderbird
40 40
41include disable-xdg.inc 41include disable-xdg.inc
@@ -46,11 +46,11 @@ include disable-xdg.inc
46# See https://github.com/netblue30/firejail/issues/2357 46# See https://github.com/netblue30/firejail/issues/2357
47mkdir ${HOME}/.cache/thunderbird 47mkdir ${HOME}/.cache/thunderbird
48mkdir ${HOME}/.gnupg 48mkdir ${HOME}/.gnupg
49# mkdir ${HOME}/.icedove 49#mkdir ${HOME}/.icedove
50mkdir ${HOME}/.thunderbird 50mkdir ${HOME}/.thunderbird
51whitelist ${HOME}/.cache/thunderbird 51whitelist ${HOME}/.cache/thunderbird
52whitelist ${HOME}/.gnupg 52whitelist ${HOME}/.gnupg
53# whitelist ${HOME}/.icedove 53#whitelist ${HOME}/.icedove
54whitelist ${HOME}/.thunderbird 54whitelist ${HOME}/.thunderbird
55 55
56whitelist /usr/share/gnupg 56whitelist /usr/share/gnupg
diff --git a/etc/profile-m-z/tmux.profile b/etc/profile-m-z/tmux.profile
index a855ff839..ddd2aa85f 100644
--- a/etc/profile-m-z/tmux.profile
+++ b/etc/profile-m-z/tmux.profile
@@ -12,10 +12,10 @@ blacklist ${RUNUSER}
12 12
13noblacklist /tmp/tmux-* 13noblacklist /tmp/tmux-*
14 14
15# include disable-common.inc 15#include disable-common.inc
16# include disable-devel.inc 16#include disable-devel.inc
17# include disable-exec.inc 17#include disable-exec.inc
18# include disable-programs.inc 18#include disable-programs.inc
19 19
20caps.drop all 20caps.drop all
21ipc-namespace 21ipc-namespace
@@ -36,9 +36,9 @@ seccomp
36seccomp.block-secondary 36seccomp.block-secondary
37tracelog 37tracelog
38 38
39# private-cache 39#private-cache
40private-dev 40private-dev
41# private-tmp 41#private-tmp
42 42
43dbus-user none 43dbus-user none
44dbus-system none 44dbus-system none
diff --git a/etc/profile-m-z/torbrowser-launcher.profile b/etc/profile-m-z/torbrowser-launcher.profile
index 86746c7f1..20ebddb69 100644
--- a/etc/profile-m-z/torbrowser-launcher.profile
+++ b/etc/profile-m-z/torbrowser-launcher.profile
@@ -56,13 +56,13 @@ novideo
56protocol unix,inet,inet6 56protocol unix,inet,inet6
57seccomp !chroot 57seccomp !chroot
58seccomp.block-secondary 58seccomp.block-secondary
59#tracelog - may cause issues, see #1930 59#tracelog # may cause issues, see #1930
60 60
61disable-mnt 61disable-mnt
62private-bin bash,cat,cp,cut,dirname,env,expr,file,gpg,grep,gxmessage,id,kdialog,ln,mkdir,mv,python*,rm,sed,sh,tail,tar,tclsh,test,tor-browser,tor-browser-en,torbrowser-launcher,update-desktop-database,xmessage,xz,zenity 62private-bin bash,cat,cp,cut,dirname,env,expr,file,gpg,grep,gxmessage,id,kdialog,ln,mkdir,mv,python*,rm,sed,sh,tail,tar,tclsh,test,tor-browser,tor-browser-en,torbrowser-launcher,update-desktop-database,xmessage,xz,zenity
63private-dev 63private-dev
64private-etc @tls-ca 64private-etc @tls-ca
65#private-opt tor-browser - can cause slow startup 65#private-opt tor-browser # can cause slow startup
66private-tmp 66private-tmp
67 67
68dbus-user none 68dbus-user none
diff --git a/etc/profile-m-z/totem.profile b/etc/profile-m-z/totem.profile
index a4cb49171..73d3b0b6f 100644
--- a/etc/profile-m-z/totem.profile
+++ b/etc/profile-m-z/totem.profile
@@ -35,7 +35,7 @@ include whitelist-runuser-common.inc
35include whitelist-usr-share-common.inc 35include whitelist-usr-share-common.inc
36include whitelist-var-common.inc 36include whitelist-var-common.inc
37 37
38# apparmor - makes settings immutable 38#apparmor # makes settings immutable
39caps.drop all 39caps.drop all
40netfilter 40netfilter
41nogroups 41nogroups
@@ -55,7 +55,7 @@ private-etc @tls-ca,@x11,python*
55private-tmp 55private-tmp
56 56
57# makes settings immutable 57# makes settings immutable
58# dbus-user none 58#dbus-user none
59dbus-system none 59dbus-system none
60 60
61restrict-namespaces 61restrict-namespaces
diff --git a/etc/profile-m-z/tracker.profile b/etc/profile-m-z/tracker.profile
index f30b0aef6..c46b00fc9 100644
--- a/etc/profile-m-z/tracker.profile
+++ b/etc/profile-m-z/tracker.profile
@@ -33,8 +33,8 @@ protocol unix
33seccomp 33seccomp
34tracelog 34tracelog
35 35
36# private-bin tracker 36#private-bin tracker
37# private-dev 37#private-dev
38# private-tmp 38#private-tmp
39 39
40restrict-namespaces 40restrict-namespaces
diff --git a/etc/profile-m-z/trojita.profile b/etc/profile-m-z/trojita.profile
index 2578eb0be..5e9e7f127 100644
--- a/etc/profile-m-z/trojita.profile
+++ b/etc/profile-m-z/trojita.profile
@@ -52,7 +52,7 @@ protocol unix,inet,inet6,netlink
52seccomp 52seccomp
53tracelog 53tracelog
54 54
55# disable-mnt 55#disable-mnt
56private-bin trojita 56private-bin trojita
57private-cache 57private-cache
58private-dev 58private-dev
diff --git a/etc/profile-m-z/udiskie.profile b/etc/profile-m-z/udiskie.profile
index c182326bb..175ae4591 100644
--- a/etc/profile-m-z/udiskie.profile
+++ b/etc/profile-m-z/udiskie.profile
@@ -36,8 +36,8 @@ tracelog
36 36
37private-bin awk,cut,dbus-send,egrep,file,grep,head,python*,readlink,sed,sh,udiskie,uname,which,xdg-mime,xdg-open,xprop 37private-bin awk,cut,dbus-send,egrep,file,grep,head,python*,readlink,sed,sh,udiskie,uname,which,xdg-mime,xdg-open,xprop
38# add your configured file browser in udiskie.local, e. g. 38# add your configured file browser in udiskie.local, e. g.
39# private-bin nautilus 39#private-bin nautilus
40# private-bin thunar 40#private-bin thunar
41private-cache 41private-cache
42private-dev 42private-dev
43private-etc @x11,mime.types 43private-etc @x11,mime.types
diff --git a/etc/profile-m-z/unknown-horizons.profile b/etc/profile-m-z/unknown-horizons.profile
index 3e2b28dec..4e7dc3705 100644
--- a/etc/profile-m-z/unknown-horizons.profile
+++ b/etc/profile-m-z/unknown-horizons.profile
@@ -34,11 +34,11 @@ protocol unix,inet,inet6,netlink
34seccomp 34seccomp
35 35
36disable-mnt 36disable-mnt
37# private-bin unknown-horizons 37#private-bin unknown-horizons
38private-dev 38private-dev
39# private-etc alternatives,ca-certificates,crypto-policies,pki,ssl 39#private-etc alternatives,ca-certificates,crypto-policies,pki,ssl
40private-tmp 40private-tmp
41 41
42# doesn't work - maybe all Tcl/Tk programs have this problem 42# doesn't work - maybe all Tcl/Tk programs have this problem
43# memory-deny-write-execute 43#memory-deny-write-execute
44restrict-namespaces 44restrict-namespaces
diff --git a/etc/profile-m-z/viewnior.profile b/etc/profile-m-z/viewnior.profile
index aa8199442..8c6efaa1c 100644
--- a/etc/profile-m-z/viewnior.profile
+++ b/etc/profile-m-z/viewnior.profile
@@ -49,5 +49,5 @@ private-tmp
49dbus-user none 49dbus-user none
50dbus-system none 50dbus-system none
51 51
52#memory-deny-write-execute - breaks on Arch (see issues #1803 and #1808) 52#memory-deny-write-execute # breaks on Arch (see issues #1803 and #1808)
53restrict-namespaces 53restrict-namespaces
diff --git a/etc/profile-m-z/virtualbox.profile b/etc/profile-m-z/virtualbox.profile
index ae8afbbf1..b768a635a 100644
--- a/etc/profile-m-z/virtualbox.profile
+++ b/etc/profile-m-z/virtualbox.profile
@@ -9,7 +9,7 @@ include globals.local
9noblacklist ${HOME}/.VirtualBox 9noblacklist ${HOME}/.VirtualBox
10noblacklist ${HOME}/.config/VirtualBox 10noblacklist ${HOME}/.config/VirtualBox
11noblacklist ${HOME}/VirtualBox VMs 11noblacklist ${HOME}/VirtualBox VMs
12# noblacklist /usr/bin/virtualbox 12#noblacklist /usr/bin/virtualbox
13noblacklist /usr/lib/virtualbox 13noblacklist /usr/lib/virtualbox
14noblacklist /usr/lib64/virtualbox 14noblacklist /usr/lib64/virtualbox
15 15
diff --git a/etc/profile-m-z/warzone2100.profile b/etc/profile-m-z/warzone2100.profile
index 79ba41d44..a7b0f5f1d 100644
--- a/etc/profile-m-z/warzone2100.profile
+++ b/etc/profile-m-z/warzone2100.profile
@@ -15,7 +15,7 @@ include disable-devel.inc
15include disable-exec.inc 15include disable-exec.inc
16include disable-interpreters.inc 16include disable-interpreters.inc
17include disable-programs.inc 17include disable-programs.inc
18#include disable-shell.inc - problems on Debian 11 18#include disable-shell.inc # problems on Debian 11
19 19
20mkdir ${HOME}/.local/share/warzone2100 20mkdir ${HOME}/.local/share/warzone2100
21mkdir ${HOME}/.local/share/warzone2100-3.3.0 21mkdir ${HOME}/.local/share/warzone2100-3.3.0
diff --git a/etc/profile-m-z/wine.profile b/etc/profile-m-z/wine.profile
index 1e2b164b9..33f404464 100644
--- a/etc/profile-m-z/wine.profile
+++ b/etc/profile-m-z/wine.profile
@@ -20,23 +20,23 @@ include disable-devel.inc
20include disable-interpreters.inc 20include disable-interpreters.inc
21include disable-programs.inc 21include disable-programs.inc
22 22
23# whitelist /usr/share/wine 23#whitelist /usr/share/wine
24# include whitelist-usr-share-common.inc 24#include whitelist-usr-share-common.inc
25include whitelist-var-common.inc 25include whitelist-var-common.inc
26 26
27# Some applications don't need allow-debuggers. Add 'ignore allow-debuggers' to your wine.local if you want to override this. 27# Some applications don't need allow-debuggers. Add 'ignore allow-debuggers' to your wine.local if you want to override this.
28allow-debuggers 28allow-debuggers
29caps.drop all 29caps.drop all
30# net none 30#net none
31netfilter 31netfilter
32nodvd 32nodvd
33nogroups 33nogroups
34noinput 34noinput
35nonewprivs 35nonewprivs
36noroot 36noroot
37# nosound 37#nosound
38notv 38notv
39# novideo 39#novideo
40seccomp 40seccomp
41 41
42private-dev 42private-dev
diff --git a/etc/profile-m-z/wireshark.profile b/etc/profile-m-z/wireshark.profile
index d1b757a25..7caac217f 100644
--- a/etc/profile-m-z/wireshark.profile
+++ b/etc/profile-m-z/wireshark.profile
@@ -25,29 +25,30 @@ include whitelist-usr-share-common.inc
25include whitelist-var-common.inc 25include whitelist-var-common.inc
26 26
27apparmor 27apparmor
28# caps.drop all 28#caps.drop all
29caps.keep dac_override,dac_read_search,net_admin,net_raw 29caps.keep dac_override,dac_read_search,net_admin,net_raw
30netfilter 30netfilter
31no3d 31no3d
32# nogroups - breaks network traffic capture for unprivileged users 32#nogroups # breaks network traffic capture for unprivileged users
33noinput 33noinput
34# nonewprivs - breaks network traffic capture for unprivileged users 34#nonewprivs # breaks network traffic capture for unprivileged users
35# noroot 35#noroot
36nodvd 36nodvd
37nosound 37nosound
38notv 38notv
39nou2f 39nou2f
40novideo 40novideo
41# protocol unix,inet,inet6,netlink,packet,bluetooth - commented out in case they bring in new protocols 41# commented out in case they bring in new protocols
42#protocol unix,inet,inet6,netlink,packet,bluetooth
42#seccomp 43#seccomp
43tracelog 44tracelog
44 45
45# private-bin wireshark 46#private-bin wireshark
46private-cache 47private-cache
47# private-dev prevents (some) interfaces from being shown. 48# private-dev prevents (some) interfaces from being shown.
48# Add the below line to your wirehsark.local if you only want to inspect pcap files. 49# Add the below line to your wirehsark.local if you only want to inspect pcap files.
49#private-dev 50#private-dev
50# private-etc alternatives,ca-certificates,crypto-policies,fonts,group,hosts,machine-id,passwd,pki,resolv.conf,ssl 51#private-etc alternatives,ca-certificates,crypto-policies,fonts,group,hosts,machine-id,passwd,pki,resolv.conf,ssl
51private-tmp 52private-tmp
52 53
53dbus-user none 54dbus-user none
diff --git a/etc/profile-m-z/xed.profile b/etc/profile-m-z/xed.profile
index dda803bd5..b47437e2d 100644
--- a/etc/profile-m-z/xed.profile
+++ b/etc/profile-m-z/xed.profile
@@ -23,10 +23,10 @@ include disable-shell.inc
23 23
24include whitelist-var-common.inc 24include whitelist-var-common.inc
25 25
26# apparmor - makes settings immutable 26#apparmor # makes settings immutable
27caps.drop all 27caps.drop all
28machine-id 28machine-id
29# net none - makes settings immutable 29#net none # makes settings immutable
30no3d 30no3d
31nodvd 31nodvd
32nogroups 32nogroups
@@ -46,9 +46,9 @@ private-dev
46private-tmp 46private-tmp
47 47
48# makes settings immutable 48# makes settings immutable
49# dbus-user none 49#dbus-user none
50# dbus-system none 50#dbus-system none
51 51
52# xed uses python plugins, memory-deny-write-execute breaks python 52# xed uses python plugins, memory-deny-write-execute breaks python
53# memory-deny-write-execute 53#memory-deny-write-execute
54restrict-namespaces 54restrict-namespaces
diff --git a/etc/profile-m-z/xfburn.profile b/etc/profile-m-z/xfburn.profile
index 141fda909..96edc15ab 100644
--- a/etc/profile-m-z/xfburn.profile
+++ b/etc/profile-m-z/xfburn.profile
@@ -25,8 +25,8 @@ protocol unix
25seccomp 25seccomp
26tracelog 26tracelog
27 27
28# private-bin xfburn 28#private-bin xfburn
29# private-dev 29#private-dev
30# private-tmp 30#private-tmp
31 31
32restrict-namespaces 32restrict-namespaces
diff --git a/etc/profile-m-z/xfce4-mixer.profile b/etc/profile-m-z/xfce4-mixer.profile
index 9c4fa8293..6c3a5812b 100644
--- a/etc/profile-m-z/xfce4-mixer.profile
+++ b/etc/profile-m-z/xfce4-mixer.profile
@@ -53,5 +53,5 @@ dbus-user.own org.xfce.xfce4-mixer
53dbus-user.talk org.xfce.Xfconf 53dbus-user.talk org.xfce.Xfconf
54dbus-system none 54dbus-system none
55 55
56# memory-deny-write-execute - breaks on Arch 56#memory-deny-write-execute # breaks on Arch
57restrict-namespaces 57restrict-namespaces
diff --git a/etc/profile-m-z/xfce4-screenshooter.profile b/etc/profile-m-z/xfce4-screenshooter.profile
index 4d841b35c..9094a7872 100644
--- a/etc/profile-m-z/xfce4-screenshooter.profile
+++ b/etc/profile-m-z/xfce4-screenshooter.profile
@@ -47,5 +47,5 @@ private-tmp
47dbus-user none 47dbus-user none
48dbus-system none 48dbus-system none
49 49
50# memory-deny-write-execute -- see #3790 50#memory-deny-write-execute # see #3790
51restrict-namespaces 51restrict-namespaces
diff --git a/etc/profile-m-z/xplayer.profile b/etc/profile-m-z/xplayer.profile
index a673d6aa3..9741888f0 100644
--- a/etc/profile-m-z/xplayer.profile
+++ b/etc/profile-m-z/xplayer.profile
@@ -27,7 +27,7 @@ include whitelist-common.inc
27include whitelist-player-common.inc 27include whitelist-player-common.inc
28include whitelist-var-common.inc 28include whitelist-var-common.inc
29 29
30# apparmor - makes settings immutable 30#apparmor # makes settings immutable
31caps.drop all 31caps.drop all
32netfilter 32netfilter
33nogroups 33nogroups
@@ -41,11 +41,11 @@ tracelog
41 41
42private-bin xplayer,xplayer-audio-preview,xplayer-video-thumbnailer 42private-bin xplayer,xplayer-audio-preview,xplayer-video-thumbnailer
43private-dev 43private-dev
44# private-etc alternatives,asound.conf,ca-certificates,crypto-policies,fonts,machine-id,pki,pulse,ssl 44#private-etc alternatives,asound.conf,ca-certificates,crypto-policies,fonts,machine-id,pki,pulse,ssl
45private-tmp 45private-tmp
46 46
47# makes settings immutable 47# makes settings immutable
48# dbus-user none 48#dbus-user none
49# dbus-system none 49#dbus-system none
50 50
51restrict-namespaces 51restrict-namespaces
diff --git a/etc/profile-m-z/xpra.profile b/etc/profile-m-z/xpra.profile
index 05c12b9a2..b00307394 100644
--- a/etc/profile-m-z/xpra.profile
+++ b/etc/profile-m-z/xpra.profile
@@ -45,11 +45,11 @@ seccomp
45 45
46disable-mnt 46disable-mnt
47# private home directory doesn't work on some distros, so we go for a regular home 47# private home directory doesn't work on some distros, so we go for a regular home
48# private 48#private
49# older Xpra versions also use Xvfb 49# older Xpra versions also use Xvfb
50# private-bin bash,cat,dbus-launch,ldconfig,ls,pactl,python*,sh,strace,which,xauth,xkbcomp,Xorg,xpra,Xvfb 50#private-bin bash,cat,dbus-launch,ldconfig,ls,pactl,python*,sh,strace,which,xauth,xkbcomp,Xorg,xpra,Xvfb
51private-dev 51private-dev
52# private-etc alternatives,gai.conf,host.conf,hostname,hosts,ld.so.cache,ld.so.conf,machine-id,nsswitch.conf,resolv.conf,X11,xpra 52#private-etc alternatives,gai.conf,host.conf,hostname,hosts,ld.so.cache,ld.so.conf,machine-id,nsswitch.conf,resolv.conf,X11,xpra
53private-tmp 53private-tmp
54 54
55restrict-namespaces 55restrict-namespaces
diff --git a/etc/profile-m-z/xreader.profile b/etc/profile-m-z/xreader.profile
index 6edbf9357..cad836fdc 100644
--- a/etc/profile-m-z/xreader.profile
+++ b/etc/profile-m-z/xreader.profile
@@ -18,9 +18,9 @@ include disable-programs.inc
18include disable-xdg.inc 18include disable-xdg.inc
19 19
20# Breaks xreader on Mint 18.3 20# Breaks xreader on Mint 18.3
21# include whitelist-var-common.inc 21#include whitelist-var-common.inc
22 22
23# apparmor 23#apparmor
24caps.drop all 24caps.drop all
25no3d 25no3d
26nodvd 26nodvd
diff --git a/etc/profile-m-z/xviewer.profile b/etc/profile-m-z/xviewer.profile
index 6c31df4a9..575c1bf68 100644
--- a/etc/profile-m-z/xviewer.profile
+++ b/etc/profile-m-z/xviewer.profile
@@ -19,9 +19,9 @@ include disable-shell.inc
19 19
20include whitelist-var-common.inc 20include whitelist-var-common.inc
21 21
22# apparmor - makes settings immutable 22#apparmor # makes settings immutable
23caps.drop all 23caps.drop all
24# net none - makes settings immutable 24#net none # makes settings immutable
25no3d 25no3d
26nodvd 26nodvd
27nogroups 27nogroups
@@ -42,8 +42,8 @@ private-lib
42private-tmp 42private-tmp
43 43
44# makes settings immutable 44# makes settings immutable
45# dbus-user none 45#dbus-user none
46# dbus-system none 46#dbus-system none
47 47
48memory-deny-write-execute 48memory-deny-write-execute
49restrict-namespaces 49restrict-namespaces
diff --git a/etc/profile-m-z/yelp.profile b/etc/profile-m-z/yelp.profile
index f5dd0c309..f957954dd 100644
--- a/etc/profile-m-z/yelp.profile
+++ b/etc/profile-m-z/yelp.profile
@@ -33,16 +33,14 @@ include whitelist-var-common.inc
33 33
34apparmor 34apparmor
35caps.drop all 35caps.drop all
36# machine-id breaks sound - add the next line to your yelp.local if you don't need sound support. 36#machine-id # add this to your yelp.local if you don't need sound support.
37#machine-id
38net none 37net none
39nodvd 38nodvd
40nogroups 39nogroups
41noinput 40noinput
42nonewprivs 41nonewprivs
43noroot 42noroot
44# nosound - add the next line to your yelp.local if you don't need sound support. 43#nosound # add this to your yelp.local if you don't need sound support.
45#nosound
46notv 44notv
47nou2f 45nou2f
48novideo 46novideo
diff --git a/etc/profile-m-z/ytmdesktop.profile b/etc/profile-m-z/ytmdesktop.profile
index de07e3ddf..ccf5f1e63 100644
--- a/etc/profile-m-z/ytmdesktop.profile
+++ b/etc/profile-m-z/ytmdesktop.profile
@@ -13,9 +13,9 @@ noblacklist ${HOME}/.config/youtube-music-desktop-app
13mkdir ${HOME}/.config/youtube-music-desktop-app 13mkdir ${HOME}/.config/youtube-music-desktop-app
14whitelist ${HOME}/.config/youtube-music-desktop-app 14whitelist ${HOME}/.config/youtube-music-desktop-app
15 15
16# private-bin env,ytmdesktop 16#private-bin env,ytmdesktop
17private-etc @tls-ca,@x11,bumblebee,host.conf,mime.types 17private-etc @tls-ca,@x11,bumblebee,host.conf,mime.types
18# private-opt 18#private-opt
19 19
20# Redirect 20# Redirect
21include electron-common.profile 21include electron-common.profile
diff --git a/etc/profile-m-z/zeal.profile b/etc/profile-m-z/zeal.profile
index 09a1d37a3..d576dbefd 100644
--- a/etc/profile-m-z/zeal.profile
+++ b/etc/profile-m-z/zeal.profile
@@ -67,5 +67,5 @@ dbus-user.talk org.mozilla.*
67?ALLOW_TRAY: dbus-user.talk org.kde.StatusNotifierWatcher 67?ALLOW_TRAY: dbus-user.talk org.kde.StatusNotifierWatcher
68dbus-system none 68dbus-system none
69 69
70# memory-deny-write-execute - breaks on Arch 70#memory-deny-write-execute # breaks on Arch
71restrict-namespaces 71restrict-namespaces