summaryrefslogtreecommitdiffstats
path: root/etc
diff options
context:
space:
mode:
Diffstat (limited to 'etc')
-rw-r--r--etc/Xephyr.profile2
-rw-r--r--etc/bitlbee.profile2
-rw-r--r--etc/cantata.profile40
-rw-r--r--etc/disable-programs.inc11
-rw-r--r--etc/eo-common.profile47
-rw-r--r--etc/eog.profile38
-rw-r--r--etc/eom.profile34
-rw-r--r--etc/exiftool.profile2
-rw-r--r--etc/firefox-common.profile2
-rw-r--r--etc/firejail.config2
-rw-r--r--etc/gnome-chess.profile6
-rw-r--r--etc/gpg.profile3
-rw-r--r--etc/inkview.profile8
-rw-r--r--etc/keepassxc.profile2
-rw-r--r--etc/ktouch.profile50
-rw-r--r--etc/libreoffice.profile3
-rw-r--r--etc/masterpdfeditor.profile3
-rw-r--r--etc/meteo-qt.profile53
-rw-r--r--etc/mp3splt-gtk.profile41
-rw-r--r--etc/ocenaudio.profile4
-rw-r--r--etc/orage.profile2
-rw-r--r--etc/pidgin.profile5
-rw-r--r--etc/qgis.profile60
-rw-r--r--etc/seahorse.profile2
-rw-r--r--etc/spotify.profile4
-rw-r--r--etc/sysprof.profile2
-rw-r--r--etc/templates/Notes7
-rw-r--r--etc/templates/profile.template82
-rw-r--r--etc/templates/redirect_alias-profile.template36
-rw-r--r--etc/templates/syscalls.txt43
-rw-r--r--etc/transgui.profile2
-rw-r--r--etc/xiphos.profile8
-rw-r--r--etc/yelp.profile51
33 files changed, 561 insertions, 96 deletions
diff --git a/etc/Xephyr.profile b/etc/Xephyr.profile
index a9960ebea..b4325cd74 100644
--- a/etc/Xephyr.profile
+++ b/etc/Xephyr.profile
@@ -40,4 +40,4 @@ private
40# private-bin Xephyr,sh,xkbcomp,strace,bash,cat,ls 40# private-bin Xephyr,sh,xkbcomp,strace,bash,cat,ls
41private-dev 41private-dev
42# private-etc alternatives,ld.so.conf,ld.so.cache,resolv.conf,host.conf,nsswitch.conf,gai.conf,hosts,hostname 42# private-etc alternatives,ld.so.conf,ld.so.cache,resolv.conf,host.conf,nsswitch.conf,gai.conf,hosts,hostname
43private-tmp 43#private-tmp
diff --git a/etc/bitlbee.profile b/etc/bitlbee.profile
index 2c2f88ed5..287e5f52e 100644
--- a/etc/bitlbee.profile
+++ b/etc/bitlbee.profile
@@ -33,6 +33,6 @@ private
33private-cache 33private-cache
34private-dev 34private-dev
35private-tmp 35private-tmp
36read-write /var/lib/bitlbee
37 36
38noexec /tmp 37noexec /tmp
38read-write /var/lib/bitlbee
diff --git a/etc/cantata.profile b/etc/cantata.profile
new file mode 100644
index 000000000..e4a4de9c1
--- /dev/null
+++ b/etc/cantata.profile
@@ -0,0 +1,40 @@
1# Firejail profile for Cantata
2# Description: Multimedia player - Qt5 client for the music Player daemon (MPD)
3# This file is overwritten during software install.
4# Persistent local customizations
5include cantata.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.cache/cantata
10noblacklist ${HOME}/.config/cantata
11noblacklist ${HOME}/.local/share/cantata
12noblacklist ${MUSIC}
13
14noblacklist ${PATH}/perl
15noblacklist /usr/lib/perl*
16noblacklist /usr/share/perl*
17
18include disable-common.inc
19include disable-devel.inc
20include disable-exec.inc
21include disable-interpreters.inc
22include disable-passwdmgr.inc
23include disable-programs.inc
24include disable-xdg.inc
25
26# apparmor
27caps.drop all
28ipc-namespace
29netfilter
30nonewprivs
31noroot
32nou2f
33novideo
34protocol unix,inet,inet6,netlink
35seccomp
36shell none
37
38# private-etc samba,gcrypt,drirc,fonts,mpd.conf,kde5rc,passwd,xdg,hosts,ssl
39private-bin cantata,mpd,perl
40private-dev
diff --git a/etc/disable-programs.inc b/etc/disable-programs.inc
index 7de2a620f..5481f976f 100644
--- a/etc/disable-programs.inc
+++ b/etc/disable-programs.inc
@@ -94,6 +94,7 @@ blacklist ${HOME}/.config/Nathan Osman
94blacklist ${HOME}/.config/Nylas Mail 94blacklist ${HOME}/.config/Nylas Mail
95blacklist ${HOME}/.config/PBE 95blacklist ${HOME}/.config/PBE
96blacklist ${HOME}/.config/Qlipper 96blacklist ${HOME}/.config/Qlipper
97blacklist ${HOME}/.config/QGIS
97blacklist ${HOME}/.config/QMediathekView 98blacklist ${HOME}/.config/QMediathekView
98blacklist ${HOME}/.config/QuiteRss 99blacklist ${HOME}/.config/QuiteRss
99blacklist ${HOME}/.config/QuiteRssrc 100blacklist ${HOME}/.config/QuiteRssrc
@@ -128,6 +129,7 @@ blacklist ${HOME}/.config/brasero
128blacklist ${HOME}/.config/brave 129blacklist ${HOME}/.config/brave
129blacklist ${HOME}/.config/caja 130blacklist ${HOME}/.config/caja
130blacklist ${HOME}/.config/calibre 131blacklist ${HOME}/.config/calibre
132blacklist ${HOME}/.config/cantata
131blacklist ${HOME}/.config/catfish 133blacklist ${HOME}/.config/catfish
132blacklist ${HOME}/.config/celluloid 134blacklist ${HOME}/.config/celluloid
133blacklist ${HOME}/.config/cherrytree 135blacklist ${HOME}/.config/cherrytree
@@ -208,6 +210,7 @@ blacklist ${HOME}/.config/kdeconnect
208blacklist ${HOME}/.config/knotesrc 210blacklist ${HOME}/.config/knotesrc
209blacklist ${HOME}/.config/konversationrc 211blacklist ${HOME}/.config/konversationrc
210blacklist ${HOME}/.config/ktorrentrc 212blacklist ${HOME}/.config/ktorrentrc
213blacklist ${HOME}/.config/ktouch2rc
211blacklist ${HOME}/.config/leafpad 214blacklist ${HOME}/.config/leafpad
212blacklist ${HOME}/.config/libreoffice 215blacklist ${HOME}/.config/libreoffice
213blacklist ${HOME}/.config/liferea 216blacklist ${HOME}/.config/liferea
@@ -218,6 +221,7 @@ blacklist ${HOME}/.config/mana
218blacklist ${HOME}/.config/mate-calc 221blacklist ${HOME}/.config/mate-calc
219blacklist ${HOME}/.config/mate/eom 222blacklist ${HOME}/.config/mate/eom
220blacklist ${HOME}/.config/mate/mate-dictionary 223blacklist ${HOME}/.config/mate/mate-dictionary
224blacklist ${HOME}/.config/meteo-qt
221blacklist ${HOME}/.config/mfusion 225blacklist ${HOME}/.config/mfusion
222blacklist ${HOME}/.config/midori 226blacklist ${HOME}/.config/midori
223blacklist ${HOME}/.config/mono 227blacklist ${HOME}/.config/mono
@@ -305,6 +309,7 @@ blacklist ${HOME}/.config/xreader
305blacklist ${HOME}/.config/xviewer 309blacklist ${HOME}/.config/xviewer
306blacklist ${HOME}/.config/yandex-browser 310blacklist ${HOME}/.config/yandex-browser
307blacklist ${HOME}/.config/yandex-browser-beta 311blacklist ${HOME}/.config/yandex-browser-beta
312blacklist ${HOME}/.config/yelp
308blacklist ${HOME}/.config/zathura 313blacklist ${HOME}/.config/zathura
309blacklist ${HOME}/.config/zoomus.conf 314blacklist ${HOME}/.config/zoomus.conf
310blacklist ${HOME}/.conkeror.mozdev.org 315blacklist ${HOME}/.conkeror.mozdev.org
@@ -436,6 +441,7 @@ blacklist ${HOME}/.local/share/JetBrains
436blacklist ${HOME}/.local/share/Mendeley Ltd. 441blacklist ${HOME}/.local/share/Mendeley Ltd.
437blacklist ${HOME}/.local/share/Mumble 442blacklist ${HOME}/.local/share/Mumble
438blacklist ${HOME}/.local/share/PBE 443blacklist ${HOME}/.local/share/PBE
444blacklist ${HOME}/.local/share/QGIS
439blacklist ${HOME}/.local/share/QMediathekView 445blacklist ${HOME}/.local/share/QMediathekView
440blacklist ${HOME}/.local/share/QuiteRss 446blacklist ${HOME}/.local/share/QuiteRss
441blacklist ${HOME}/.local/share/Ricochet 447blacklist ${HOME}/.local/share/Ricochet
@@ -451,6 +457,7 @@ blacklist ${HOME}/.local/share/aspyr-media
451blacklist ${HOME}/.local/share/baloo 457blacklist ${HOME}/.local/share/baloo
452blacklist ${HOME}/.local/share/bibletime 458blacklist ${HOME}/.local/share/bibletime
453blacklist ${HOME}/.local/share/caja-python 459blacklist ${HOME}/.local/share/caja-python
460blacklist ${HOME}/.local/share/cantata
454blacklist ${HOME}/.local/share/cdprojektred 461blacklist ${HOME}/.local/share/cdprojektred
455blacklist ${HOME}/.local/share/clipit 462blacklist ${HOME}/.local/share/clipit
456blacklist ${HOME}/.local/share/contacts 463blacklist ${HOME}/.local/share/contacts
@@ -491,6 +498,7 @@ blacklist ${HOME}/.local/share/knotes
491blacklist ${HOME}/.local/share/krita 498blacklist ${HOME}/.local/share/krita
492blacklist ${HOME}/.local/share/ktorrentrc 499blacklist ${HOME}/.local/share/ktorrentrc
493blacklist ${HOME}/.local/share/ktorrent 500blacklist ${HOME}/.local/share/ktorrent
501blacklist ${HOME}/.local/share/ktouch
494blacklist ${HOME}/.local/share/kwrite 502blacklist ${HOME}/.local/share/kwrite
495blacklist ${HOME}/.local/share/liferea 503blacklist ${HOME}/.local/share/liferea
496blacklist ${HOME}/.local/share/local-mail 504blacklist ${HOME}/.local/share/local-mail
@@ -549,6 +557,7 @@ blacklist ${HOME}/.minetest
549blacklist ${HOME}/.moonchild productions/basilisk 557blacklist ${HOME}/.moonchild productions/basilisk
550blacklist ${HOME}/.moonchild productions/pale moon 558blacklist ${HOME}/.moonchild productions/pale moon
551blacklist ${HOME}/.mozilla 559blacklist ${HOME}/.mozilla
560blacklist ${HOME}/.mp3splt-gtk
552blacklist ${HOME}/.mpd 561blacklist ${HOME}/.mpd
553blacklist ${HOME}/.mpdconf 562blacklist ${HOME}/.mpdconf
554blacklist ${HOME}/.mplayer 563blacklist ${HOME}/.mplayer
@@ -572,6 +581,7 @@ blacklist ${HOME}/.pingus
572blacklist ${HOME}/.pioneer 581blacklist ${HOME}/.pioneer
573blacklist ${HOME}/.purple 582blacklist ${HOME}/.purple
574blacklist ${HOME}/.qemu-launcher 583blacklist ${HOME}/.qemu-launcher
584blacklist ${HOME}/.qgis2
575blacklist ${HOME}/.qmmp 585blacklist ${HOME}/.qmmp
576blacklist ${HOME}/.quodlibet 586blacklist ${HOME}/.quodlibet
577blacklist ${HOME}/.redeclipse 587blacklist ${HOME}/.redeclipse
@@ -648,6 +658,7 @@ blacklist ${HOME}/.cache/attic
648blacklist ${HOME}/.cache/bnox 658blacklist ${HOME}/.cache/bnox
649blacklist ${HOME}/.cache/borg 659blacklist ${HOME}/.cache/borg
650blacklist ${HOME}/.cache/calibre 660blacklist ${HOME}/.cache/calibre
661blacklist ${HOME}/.cache/cantata
651blacklist ${HOME}/.cache/champlain 662blacklist ${HOME}/.cache/champlain
652blacklist ${HOME}/.cache/chromium 663blacklist ${HOME}/.cache/chromium
653blacklist ${HOME}/.cache/chromium-dev 664blacklist ${HOME}/.cache/chromium-dev
diff --git a/etc/eo-common.profile b/etc/eo-common.profile
new file mode 100644
index 000000000..ad18e10c4
--- /dev/null
+++ b/etc/eo-common.profile
@@ -0,0 +1,47 @@
1# Firejail profile for eo-common
2# Description: Common profile for Eye of GNOME/MATE graphics viewer program
3# This file is overwritten after every install/update
4# Persistent local customizations
5include eo-common.local
6# Persistent global definitions
7# already included by caller profile
8#include globals.local
9
10noblacklist ${HOME}/.local/share/Trash
11noblacklist ${HOME}/.Steam
12noblacklist ${HOME}/.steam
13
14include disable-common.inc
15include disable-devel.inc
16include disable-exec.inc
17include disable-interpreters.inc
18include disable-passwdmgr.inc
19include disable-programs.inc
20
21include whitelist-var-common.inc
22
23apparmor
24caps.drop all
25ipc-namespace
26machine-id
27no3d
28nodvd
29nogroups
30nonewprivs
31noroot
32nosound
33notv
34nou2f
35novideo
36protocol unix,netlink
37seccomp
38shell none
39tracelog
40
41private-cache
42private-dev
43private-etc alternatives,dconf,fonts,gtk-3.0
44private-lib eog,eom,gdk-pixbuf-2.*,gio,girepository-1.*,gvfs,libgconf-2.so.*
45private-tmp
46
47#memory-deny-write-execute - breaks on Arch
diff --git a/etc/eog.profile b/etc/eog.profile
index 1dcc687fc..8e3aa42fe 100644
--- a/etc/eog.profile
+++ b/etc/eog.profile
@@ -6,46 +6,12 @@ include eog.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9noblacklist ${HOME}/.Steam
10noblacklist ${HOME}/.config/eog 9noblacklist ${HOME}/.config/eog
11noblacklist ${HOME}/.local/share/Trash
12noblacklist ${HOME}/.steam
13
14include disable-common.inc
15include disable-devel.inc
16include disable-exec.inc
17include disable-interpreters.inc
18include disable-passwdmgr.inc
19include disable-programs.inc
20
21include whitelist-var-common.inc
22
23apparmor
24caps.drop all
25ipc-namespace
26machine-id
27no3d
28nodvd
29nogroups
30nonewprivs
31noroot
32nosound
33notv
34nou2f
35novideo
36protocol unix
37seccomp
38shell none
39tracelog
40 10
41# private-bin, private-etc and private-lib break 'Open With' / 'Open in file manager' 11# private-bin, private-etc and private-lib break 'Open With' / 'Open in file manager'
42# comment those if you need that functionality 12# comment those if you need that functionality
43# or put 'ignore private-bin', 'ignore private-etc' and 'ignore private-lib' in your eog.local 13# or put 'ignore private-bin', 'ignore private-etc' and 'ignore private-lib' in your eog.local
44private-bin eog 14private-bin eog
45private-cache
46private-dev
47private-etc alternatives,fonts
48private-lib eog,gdk-pixbuf-2.*,gio,girepository-1.*,gvfs,libgconf-2.so.*
49private-tmp
50 15
51# memory-deny-write-execute 16# Redirect
17include eo-common.profile
diff --git a/etc/eom.profile b/etc/eom.profile
index 7cb3f98cd..437326d38 100644
--- a/etc/eom.profile
+++ b/etc/eom.profile
@@ -6,42 +6,12 @@ include eom.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9noblacklist ${HOME}/.Steam
10noblacklist ${HOME}/.config/mate/eom 9noblacklist ${HOME}/.config/mate/eom
11noblacklist ${HOME}/.local/share/Trash
12noblacklist ${HOME}/.steam
13
14include disable-common.inc
15include disable-devel.inc
16include disable-exec.inc
17include disable-interpreters.inc
18include disable-passwdmgr.inc
19include disable-programs.inc
20
21include whitelist-var-common.inc
22
23caps.drop all
24no3d
25nodvd
26nogroups
27nonewprivs
28noroot
29nosound
30notv
31nou2f
32novideo
33protocol unix
34seccomp
35shell none
36tracelog
37 10
38# private-bin, private-etc and private-lib break 'Open With' / 'Open in file manager' 11# private-bin, private-etc and private-lib break 'Open With' / 'Open in file manager'
39# comment those if you need that functionality 12# comment those if you need that functionality
40# or put 'ignore private-bin', 'ignore private-etc' and 'ignore private-lib' in your eom.local 13# or put 'ignore private-bin', 'ignore private-etc' and 'ignore private-lib' in your eom.local
41private-bin eom 14private-bin eom
42private-dev
43private-etc alternatives,fonts
44private-lib
45private-tmp
46 15
47#memory-deny-write-execute - breaks on Arch 16# Redirect
17include eo-common.profile
diff --git a/etc/exiftool.profile b/etc/exiftool.profile
index 2ee4aae6f..f694ea212 100644
--- a/etc/exiftool.profile
+++ b/etc/exiftool.profile
@@ -41,7 +41,7 @@ shell none
41tracelog 41tracelog
42 42
43# To support exiftool in private-bin on Arch Linux (and derivatives), symlink /usr/bin/vendor_perl/exiftool to /usr/bin/exiftool and uncomment the below. 43# To support exiftool in private-bin on Arch Linux (and derivatives), symlink /usr/bin/vendor_perl/exiftool to /usr/bin/exiftool and uncomment the below.
44# Users on non-Arch Linux distributions can safely uncomment the below to enable extra hardening. 44# Users on non-Arch Linux distributions can safely uncomment (or put in exiftool.local) the line below to enable extra hardening.
45#private-bin exiftool,perl 45#private-bin exiftool,perl
46private-cache 46private-cache
47private-dev 47private-dev
diff --git a/etc/firefox-common.profile b/etc/firefox-common.profile
index 080d9e81a..bccbb3412 100644
--- a/etc/firefox-common.profile
+++ b/etc/firefox-common.profile
@@ -9,7 +9,7 @@ include firefox-common.local
9# noexec ${HOME} breaks DRM binaries. 9# noexec ${HOME} breaks DRM binaries.
10?BROWSER_ALLOW_DRM: ignore noexec ${HOME} 10?BROWSER_ALLOW_DRM: ignore noexec ${HOME}
11 11
12# Uncomment the following line to allow access to common programs/addons/plugins. 12# Uncomment the following line (or put it in your firefox-common.local) to allow access to common programs/addons/plugins.
13#include firefox-common-addons.inc 13#include firefox-common-addons.inc
14 14
15noblacklist ${HOME}/.pki 15noblacklist ${HOME}/.pki
diff --git a/etc/firejail.config b/etc/firejail.config
index 497d9633e..92df8ad1a 100644
--- a/etc/firejail.config
+++ b/etc/firejail.config
@@ -32,7 +32,7 @@
32 32
33# Disable /mnt, /media, /run/mount and /run/media access. By default access 33# Disable /mnt, /media, /run/mount and /run/media access. By default access
34# to these directories is enabled. Unlike --disable-mnt profile option this 34# to these directories is enabled. Unlike --disable-mnt profile option this
35# cannot be overridden by --noblacklist. 35# cannot be overridden by --noblacklist or --ignore.
36# disable-mnt no 36# disable-mnt no
37 37
38# Enable or disable file transfer support, default enabled. 38# Enable or disable file transfer support, default enabled.
diff --git a/etc/gnome-chess.profile b/etc/gnome-chess.profile
index 2f4626891..04409a5e4 100644
--- a/etc/gnome-chess.profile
+++ b/etc/gnome-chess.profile
@@ -18,7 +18,10 @@ include disable-xdg.inc
18 18
19include whitelist-var-common.inc 19include whitelist-var-common.inc
20 20
21apparmor
21caps.drop all 22caps.drop all
23machine-id
24net none
22no3d 25no3d
23nodvd 26nodvd
24nogroups 27nogroups
@@ -35,6 +38,7 @@ tracelog
35 38
36disable-mnt 39disable-mnt
37private-bin fairymax,gnome-chess,hoichess,gnuchess 40private-bin fairymax,gnome-chess,hoichess,gnuchess
41private-cache
38private-dev 42private-dev
39private-etc alternatives,fonts,gnome-chess 43private-etc alternatives,dconf,fonts,gnome-chess,gtk-3.0
40private-tmp 44private-tmp
diff --git a/etc/gpg.profile b/etc/gpg.profile
index 47e6e5265..51662b59c 100644
--- a/etc/gpg.profile
+++ b/etc/gpg.profile
@@ -29,8 +29,7 @@ nou2f
29novideo 29novideo
30protocol unix,inet,inet6 30protocol unix,inet,inet6
31seccomp 31seccomp
32# Causes gpg to hang 32shell none
33#shell none
34tracelog 33tracelog
35 34
36# private-bin gpg,gpg-agent 35# private-bin gpg,gpg-agent
diff --git a/etc/inkview.profile b/etc/inkview.profile
new file mode 100644
index 000000000..6c0127f37
--- /dev/null
+++ b/etc/inkview.profile
@@ -0,0 +1,8 @@
1# Firejail profile for inkview
2# Description: an SVG slideshow program
3# This file is overwritten after every install/update
4# Persistent local customizations
5include inkview.local
6
7# Redirect
8include inkscape.profile
diff --git a/etc/keepassxc.profile b/etc/keepassxc.profile
index 33b4509b7..c1adfd516 100644
--- a/etc/keepassxc.profile
+++ b/etc/keepassxc.profile
@@ -41,7 +41,7 @@ protocol netlink,unix
41seccomp 41seccomp
42shell none 42shell none
43 43
44private-bin keepassxc 44private-bin keepassxc,keepassxc-proxy
45private-dev 45private-dev
46private-etc alternatives,fonts,ld.so.cache,machine-id 46private-etc alternatives,fonts,ld.so.cache,machine-id
47private-tmp 47private-tmp
diff --git a/etc/ktouch.profile b/etc/ktouch.profile
new file mode 100644
index 000000000..446bc50ee
--- /dev/null
+++ b/etc/ktouch.profile
@@ -0,0 +1,50 @@
1# Firejail profile for KTouch
2# Description: a typing tutor by KDE
3# This file is overwritten after every install/update
4# Persistent local customizations
5include ktouch.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/ktouch2rc
10noblacklist ${HOME}/.local/share/ktouch
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-xdg.inc
19
20mkfile ${HOME}/.config/ktouch2rc
21mkdir ${HOME}/.local/share/ktouch
22whitelist ${HOME}/.config/ktouch2rc
23whitelist ${HOME}/.local/share/ktouch
24include whitelist-common.inc
25include whitelist-var-common.inc
26
27apparmor
28caps.drop all
29machine-id
30net none
31nodbus
32nodvd
33nogroups
34nonewprivs
35noroot
36nosound
37notv
38nou2f
39novideo
40protocol unix,netlink
41seccomp
42shell none
43tracelog
44
45disable-mnt
46private-bin ktouch
47private-cache
48private-dev
49private-etc alternatives,fonts,kde5rc,machine-id
50private-tmp
diff --git a/etc/libreoffice.profile b/etc/libreoffice.profile
index 6e77cd741..5bb943323 100644
--- a/etc/libreoffice.profile
+++ b/etc/libreoffice.profile
@@ -29,9 +29,7 @@ include whitelist-var-common.inc
29# comment the next line to use the ubuntu profile instead of firejail's apparmor profile 29# comment the next line to use the ubuntu profile instead of firejail's apparmor profile
30apparmor 30apparmor
31caps.drop all 31caps.drop all
32#machine-id
33netfilter 32netfilter
34#nodbus
35nodvd 33nodvd
36nogroups 34nogroups
37# comment nonewprivs when using the ubuntu 18.04/debian 10 apparmor profile 35# comment nonewprivs when using the ubuntu 18.04/debian 10 apparmor profile
@@ -50,5 +48,4 @@ tracelog
50private-dev 48private-dev
51private-tmp 49private-tmp
52 50
53
54join-or-start libreoffice 51join-or-start libreoffice
diff --git a/etc/masterpdfeditor.profile b/etc/masterpdfeditor.profile
index ce6486115..e4da0c66a 100644
--- a/etc/masterpdfeditor.profile
+++ b/etc/masterpdfeditor.profile
@@ -20,9 +20,7 @@ include whitelist-var-common.inc
20 20
21apparmor 21apparmor
22caps.drop all 22caps.drop all
23ipc-namespace
24machine-id 23machine-id
25no3d
26nodvd 24nodvd
27nogroups 25nogroups
28nonewprivs 26nonewprivs
@@ -36,7 +34,6 @@ seccomp
36shell none 34shell none
37tracelog 35tracelog
38 36
39private-bin masterpdfedito*
40private-cache 37private-cache
41private-dev 38private-dev
42private-etc alternatives,fonts 39private-etc alternatives,fonts
diff --git a/etc/meteo-qt.profile b/etc/meteo-qt.profile
new file mode 100644
index 000000000..a769a97ec
--- /dev/null
+++ b/etc/meteo-qt.profile
@@ -0,0 +1,53 @@
1# Firejail profile for meteo-qt
2# Description: System tray application for weather status information
3# This file is overwritten after every install/update
4# Persistent local customizations
5include meteo-qt.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/autostart
10noblacklist ${HOME}/.config/meteo-qt
11
12# Allow python (blacklisted by disable-interpreters.inc)
13noblacklist ${PATH}/python3*
14noblacklist /usr/lib/python3*
15noblacklist /usr/local/lib/python3*
16
17include disable-common.inc
18include disable-devel.inc
19include disable-exec.inc
20include disable-interpreters.inc
21include disable-passwdmgr.inc
22include disable-programs.inc
23include disable-xdg.inc
24
25whitelist ${HOME}/.config/autostart
26mkdir ${HOME}/.config/meteo-qt
27whitelist ${HOME}/.config/meteo-qt
28include whitelist-common.inc
29include whitelist-var-common.inc
30
31caps.drop all
32netfilter
33nodbus
34nodvd
35nogroups
36nonewprivs
37noroot
38nosound
39notv
40nou2f
41novideo
42protocol unix,inet,inet6
43seccomp
44shell none
45tracelog
46
47disable-mnt
48private-bin meteo-qt,python*
49private-cache
50private-dev
51private-tmp
52
53memory-deny-write-execute
diff --git a/etc/mp3splt-gtk.profile b/etc/mp3splt-gtk.profile
new file mode 100644
index 000000000..d14006112
--- /dev/null
+++ b/etc/mp3splt-gtk.profile
@@ -0,0 +1,41 @@
1# Firejail profile for mp3splt-gtk
2# Description: Gtk utility for mp3/ogg splitting without decoding
3# This file is overwritten after every install/update
4# Persistent local customizations
5include mp3splt-gtk.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.mp3splt-gtk
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17
18include whitelist-var-common.inc
19
20apparmor
21caps.drop all
22net none
23no3d
24nodbus
25nodvd
26nogroups
27nonewprivs
28noroot
29notv
30nou2f
31novideo
32protocol unix
33seccomp
34shell none
35tracelog
36
37private-bin mp3splt-gtk
38private-cache
39private-dev
40private-etc alsa,alternatives,asound.conf,fonts,gtk-3.0,dconf,machine-id,openal,pulse
41private-tmp
diff --git a/etc/ocenaudio.profile b/etc/ocenaudio.profile
index ceeb59384..b2249f63b 100644
--- a/etc/ocenaudio.profile
+++ b/etc/ocenaudio.profile
@@ -24,7 +24,7 @@ ipc-namespace
24# net none breaks AppArmor on Ubuntu systems 24# net none breaks AppArmor on Ubuntu systems
25netfilter 25netfilter
26no3d 26no3d
27# nodbus - breaks preferences, comment when needed 27# nodbus - breaks preferences, comment (or put 'ignore nodbus' in your oceanaudio.local) when needed
28nodbus 28nodbus
29nodvd 29nodvd
30nogroups 30nogroups
@@ -39,12 +39,10 @@ shell none
39tracelog 39tracelog
40 40
41# disable-mnt 41# disable-mnt
42# private
43private-bin ocenaudio 42private-bin ocenaudio
44private-cache 43private-cache
45private-dev 44private-dev
46private-etc alternatives,asound.conf,fonts,ld.so.cache,pulse 45private-etc alternatives,asound.conf,fonts,ld.so.cache,pulse
47# private-lib
48private-tmp 46private-tmp
49 47
50# memory-deny-write-execute - breaks on Arch 48# memory-deny-write-execute - breaks on Arch
diff --git a/etc/orage.profile b/etc/orage.profile
index 2c55ab909..4e12892d6 100644
--- a/etc/orage.profile
+++ b/etc/orage.profile
@@ -24,7 +24,7 @@ nodvd
24nogroups 24nogroups
25nonewprivs 25nonewprivs
26noroot 26noroot
27nosound 27# nosound - calendar application, It must be able to play sound to wake you up.
28notv 28notv
29nou2f 29nou2f
30novideo 30novideo
diff --git a/etc/pidgin.profile b/etc/pidgin.profile
index 444478149..bdd5404f5 100644
--- a/etc/pidgin.profile
+++ b/etc/pidgin.profile
@@ -6,9 +6,7 @@ include pidgin.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9mkdir ${HOME}/.purple
10noblacklist ${HOME}/.purple 9noblacklist ${HOME}/.purple
11whitelist ${HOME}/.purple
12 10
13ignore noexec ${RUNUSER} 11ignore noexec ${RUNUSER}
14ignore noexec /dev/shm 12ignore noexec /dev/shm
@@ -20,6 +18,9 @@ include disable-interpreters.inc
20include disable-passwdmgr.inc 18include disable-passwdmgr.inc
21include disable-programs.inc 19include disable-programs.inc
22include disable-xdg.inc 20include disable-xdg.inc
21
22mkdir ${HOME}/.purple
23whitelist ${HOME}/.purple
23include whitelist-common.inc 24include whitelist-common.inc
24include whitelist-var-common.inc 25include whitelist-var-common.inc
25 26
diff --git a/etc/qgis.profile b/etc/qgis.profile
new file mode 100644
index 000000000..45fe59cf7
--- /dev/null
+++ b/etc/qgis.profile
@@ -0,0 +1,60 @@
1# Firejail profile for qgis
2# Description: GIS application
3# This file is overwritten after every install/update
4# Persistent local customizations
5include qgis.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/QtProject.conf
10noblacklist ${HOME}/.config/QGIS
11noblacklist ${HOME}/.local/share/QGIS
12noblacklist ${HOME}/.qgis2
13noblacklist ${DOCUMENTS}
14
15# Allow python (blacklisted by disable-interpreters.inc)
16noblacklist ${PATH}/python3*
17noblacklist /usr/lib/python3*
18noblacklist /usr/local/lib/python3*
19
20include disable-common.inc
21include disable-devel.inc
22include disable-exec.inc
23include disable-interpreters.inc
24include disable-passwdmgr.inc
25include disable-programs.inc
26include disable-xdg.inc
27
28mkdir ${HOME}/.local/share/QGIS
29mkdir ${HOME}/.qgis2
30mkdir ${HOME}/.config/QGIS
31whitelist ${HOME}/.local/share/QGIS
32whitelist ${HOME}/.qgis2
33whitelist ${HOME}/.config/QGIS
34whitelist ${DOCUMENTS}
35include whitelist-common.inc
36include whitelist-var-common.inc
37
38caps.drop all
39netfilter
40machine-id
41nodbus
42nodvd
43nogroups
44nonewprivs
45noroot
46nosound
47notv
48nou2f
49novideo
50# blacklisting of mbind system calls breaks old version
51seccomp.drop @cpu-emulation,@debug,@obsolete,@privileged,set_mempolicy,migrate_pages,move_pages,open_by_handle_at,name_to_handle_at,ioprio_set,ni_syscall,syslog,fanotify_init,kcmp,add_key,request_key,keyctl,io_setup,io_destroy,io_getevents,io_submit,io_cancel,remap_file_pages,vmsplice,umount,userfaultfd,mincore
52protocol unix,inet,inet6,netlink
53shell none
54tracelog
55
56disable-mnt
57private-cache
58private-dev
59private-etc alternatives,ca-certificates,crypto-policies,fonts,machine-id,pki,resolv.conf,ssl,QGIS,QGIS.conf,Trolltech.conf
60private-tmp
diff --git a/etc/seahorse.profile b/etc/seahorse.profile
index cd9f6c767..fc54a0716 100644
--- a/etc/seahorse.profile
+++ b/etc/seahorse.profile
@@ -50,7 +50,7 @@ nou2f
50novideo 50novideo
51protocol unix,inet,inet6 51protocol unix,inet,inet6
52seccomp 52seccomp
53# shell none - causes gpg to hang 53shell none
54tracelog 54tracelog
55 55
56disable-mnt 56disable-mnt
diff --git a/etc/spotify.profile b/etc/spotify.profile
index 6f7f6ec85..00c2aabe2 100644
--- a/etc/spotify.profile
+++ b/etc/spotify.profile
@@ -6,9 +6,6 @@ include spotify.local
6include globals.local 6include globals.local
7 7
8blacklist ${HOME}/.bashrc 8blacklist ${HOME}/.bashrc
9blacklist /lost+found
10blacklist /sbin
11blacklist /srv
12 9
13noblacklist ${HOME}/.cache/spotify 10noblacklist ${HOME}/.cache/spotify
14noblacklist ${HOME}/.config/spotify 11noblacklist ${HOME}/.config/spotify
@@ -49,5 +46,6 @@ private-bin spotify,bash,sh,zenity
49private-dev 46private-dev
50private-etc alternatives,fonts,group,ld.so.cache,machine-id,pulse,resolv.conf,hosts,nsswitch.conf,host.conf,ca-certificates,ssl,pki,crypto-policies 47private-etc alternatives,fonts,group,ld.so.cache,machine-id,pulse,resolv.conf,hosts,nsswitch.conf,host.conf,ca-certificates,ssl,pki,crypto-policies
51private-opt spotify 48private-opt spotify
49private-srv none
52private-tmp 50private-tmp
53 51
diff --git a/etc/sysprof.profile b/etc/sysprof.profile
index 3cfea5c5e..e978e03f2 100644
--- a/etc/sysprof.profile
+++ b/etc/sysprof.profile
@@ -24,7 +24,7 @@ no3d
24nodvd 24nodvd
25nogroups 25nogroups
26nonewprivs 26nonewprivs
27# Ubuntu 16.04 version needs root privileges - uncomment if you don't use that 27# Ubuntu 16.04 version needs root privileges - uncomment or put in sysprof.local if you don't use that
28#noroot 28#noroot
29nosound 29nosound
30notv 30notv
diff --git a/etc/templates/Notes b/etc/templates/Notes
new file mode 100644
index 000000000..a4170207b
--- /dev/null
+++ b/etc/templates/Notes
@@ -0,0 +1,7 @@
1Notes
2=====
3
4 * Lines with one # are often used
5 * Lines with two ## are only in special situation needed
6 * Add programs specific paths like .config/program to disable-programs.inc
7 * Add the name of the profile/program to src/firecfg/firecfg.config
diff --git a/etc/templates/profile.template b/etc/templates/profile.template
new file mode 100644
index 000000000..d7da0ed20
--- /dev/null
+++ b/etc/templates/profile.template
@@ -0,0 +1,82 @@
1# Firejail profile for PROGRAM_NAME
2# Description: DESCRIPTION
3# This file is overwritten after every install/update
4##quiet
5# Persistent local customizations
6#include PROFILE.local
7# Persistent global definitions
8#include globals.local
9
10##ignore noexec ${HOME}
11
12##blacklist PATH
13
14#noblacklist PATH
15
16# Allow python (blacklisted by disable-interpreters.inc)
17#noblacklist ${PATH}/python2*
18#noblacklist ${PATH}/python3*
19#noblacklist /usr/lib/python2*
20#noblacklist /usr/lib/python3*
21#noblacklist /usr/local/lib/python2*
22#noblacklist /usr/local/lib/python3*
23
24#include disable-common.inc
25#include disable-devel.inc
26#include disable-exec.inc
27#include disable-interpreters.inc
28#include disable-passwdmgr.inc
29#include disable-programs.inc
30#include disable-xdg.inc
31
32#mkdir PATH
33#mkfile PATH
34#whitelist PATH
35#include whitelist-common.inc
36#include whitelist-var-common.inc
37
38#apparmor
39#caps.drop all
40# CLI only
41##ipc-namespace
42#machine-id
43# 'net none' or 'netfilter'
44#net none
45#netfilter
46#no3d
47#nodbus
48#nodvd
49#nogroups
50#nonewprivs
51#noroot
52#nosound
53#notv
54#nou2f
55#novideo
56#protocol unix,inet,inet6,netlink
57#seccomp
58##seccomp.drop SYSCALLS
59#shell none
60#tracelog
61
62#disable-mnt
63##private
64#private-bin PROGRAMS
65#private-cache
66#private-dev
67#private-etc FILES
68# private-etc templates (see also #1734)
69# Internet: ca-certificates,crypto-policies,nsswitch.conf,pki,resolv.conf,ssl
70# Sound: alsa,asound.conf,machine-id,openal,pulse
71# GTK: dconf,fonts,gtk-2.0,gtk-3.0,pango,xdg
72# KDE/QT: fonts,kde4rc,kde5rc,ld.so.cache,machine-id,Trolltech.conf,xdg
73# GUIs: fonts
74# Alternatives: alternatives
75##private-lib LIBS
76##private-opt NAME
77#private-tmp
78
79##env VAR=VALUE
80#memory-deny-write-execute
81##read-only ${HOME}
82##join-or-start NAME
diff --git a/etc/templates/redirect_alias-profile.template b/etc/templates/redirect_alias-profile.template
new file mode 100644
index 000000000..56dd43ca4
--- /dev/null
+++ b/etc/templates/redirect_alias-profile.template
@@ -0,0 +1,36 @@
1# Firejail profile for PRGOGRAM_NAME
2# Description: DESCRIPTION
3# This file is overwritten after every install/update
4# Persistent local customizations
5include PROFILE.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9#NOTE: let include globals.local commented
10
11# Additional blacklisting (if needed)
12#blacklist PATH
13
14# Additional noblacklisting (if needed)
15#noblacklist PATH
16
17# Additional whitelisting (if needed)
18#mkdir PATH
19#mkfile PATH
20#whitelist PATH
21
22# Additional options if needed (see firejail-profile.example)
23
24# Add programs to private-bin (if needed)
25#private-bin PROGRAMS
26# Add files to private-etc (if needed)
27#private-etc FILES
28
29# Ignore something that is in the included profile
30#ignore net none
31#ignore private-bin
32#ignore seccomp
33#...
34
35# Redirect
36include PROFILE.profile
diff --git a/etc/templates/syscalls.txt b/etc/templates/syscalls.txt
new file mode 100644
index 000000000..ec8247517
--- /dev/null
+++ b/etc/templates/syscalls.txt
@@ -0,0 +1,43 @@
1Hints for writing seccomp.drop lines
2====================================
3
4@clock=adjtimex,clock_adjtime,clock_settime,settimeofday,stime
5@module=delete_module,finit_module,init_module
6@raw-io=ioperm,iopl,pciconfig_iobase,pciconfig_read,pciconfig_write,s390_mmio_read,s390_mmio_write
7@reboot=kexec_load,kexec_file_load,reboot,
8@swap=swapon,swapoff
9
10@privileged=@clock,@module,@raw-io,@reboot,@swap,acct,bpf,chroot,mount,nfsservctl,pivot_root,setdomainname,sethostname,umount2,vhangup
11
12@cpu-emulation=modify_ldt,subpage_prot,switch_endian,vm86,vm86old
13@debug=lookup_dcookie,perf_event_open,process_vm_writev,rtas,s390_runtime_instr,sys_debug_setcontext
14@obsolete=_sysctl,afs_syscall,bdflush,break,create_module,ftime,get_kernel_syms,getpmsg,gtty,lock,mpx,prof,profil,putpmsg,query_module,security,sgetmask,ssetmask,stty,sysfs,tuxcall,ulimit,uselib,ustat,vserver
15@resources=set_mempolicy,migrate_pages,move_pages,mbind
16
17@default=@cpu-emulation,@debug,@obsolete,@privileged,@resources,open_by_handle_at,name_to_handle_at,ioprio_set,ni_syscall,syslog,fanotify_init,kcmp,add_key,request_key,keyctl,io_setup,io_destroy,io_getevents,io_submit,io_cancel,remap_file_pages,vmsplice,umount,userfaultfd,mincore
18
19@default-nodebuggers=@default,ptrace,personality,process_vm_readv
20
21@default-keep=execve,prctl
22
23
24+---------+----------------+---------------+
25| @clock | @cpu-emulation | @default-keep |
26| @module | @debug | |
27| @raw-io | @obsolete | |
28| @reboot | @resources | |
29| @swap | | |
30+---------+----------------+---------------+
31 : :
32+-------------+ :
33| @privileged | :
34+-------------+ :
35 : :
36+----------+ :
37| @default |........:
38+----------+
39 :
40+----------------------+
41| @default-nodebuggers |
42+----------------------+
43
diff --git a/etc/transgui.profile b/etc/transgui.profile
index 8043bfa01..0d09cef87 100644
--- a/etc/transgui.profile
+++ b/etc/transgui.profile
@@ -2,7 +2,7 @@
2# Description: Cross-platform Transmission BitTorrent client 2# Description: Cross-platform Transmission BitTorrent client
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4# Persistent local customizations 4# Persistent local customizations
5include /etc/firejail/transgui.local 5include transgui.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
diff --git a/etc/xiphos.profile b/etc/xiphos.profile
index 3ad03e2c6..33056395e 100644
--- a/etc/xiphos.profile
+++ b/etc/xiphos.profile
@@ -13,6 +13,7 @@ noblacklist ${HOME}/.xiphos
13 13
14include disable-common.inc 14include disable-common.inc
15include disable-devel.inc 15include disable-devel.inc
16include disable-exec.inc
16include disable-interpreters.inc 17include disable-interpreters.inc
17include disable-passwdmgr.inc 18include disable-passwdmgr.inc
18include disable-programs.inc 19include disable-programs.inc
@@ -20,8 +21,11 @@ include disable-programs.inc
20whitelist ${HOME}/.sword 21whitelist ${HOME}/.sword
21whitelist ${HOME}/.xiphos 22whitelist ${HOME}/.xiphos
22include whitelist-common.inc 23include whitelist-common.inc
24include whitelist-var-common.inc
23 25
26apparmor
24caps.drop all 27caps.drop all
28machine-id
25netfilter 29netfilter
26nodvd 30nodvd
27nogroups 31nogroups
@@ -36,7 +40,9 @@ seccomp
36shell none 40shell none
37tracelog 41tracelog
38 42
43disable-mnt
39private-bin xiphos 44private-bin xiphos
45private-cache
40private-dev 46private-dev
41private-etc alternatives,fonts,resolv.conf,sword,ca-certificates,ssl,pki,crypto-policies 47private-etc alternatives,fonts,resolv.conf,sword,ca-certificates,ssli,sword.conf,pki,crypto-policies
42private-tmp 48private-tmp
diff --git a/etc/yelp.profile b/etc/yelp.profile
new file mode 100644
index 000000000..66f094e1d
--- /dev/null
+++ b/etc/yelp.profile
@@ -0,0 +1,51 @@
1# Firejail profile for yelp
2# Description: Help browser for the GNOME desktop
3# This file is overwritten after every install/update
4# Persistent local customizations
5include yelp.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/yelp
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19mkdir ${HOME}/.config/yelp
20whitelist ${HOME}/.config/yelp
21include whitelist-common.inc
22include whitelist-var-common.inc
23
24apparmor
25caps.drop all
26net none
27nodvd
28nogroups
29nonewprivs
30noroot
31notv
32nou2f
33novideo
34protocol unix
35seccomp
36shell none
37tracelog
38
39disable-mnt
40private-bin yelp
41private-cache
42private-dev
43private-etc alsa,alternatives,asound.conf,crypto-policies,cups,dconf,drirc,fonts,gcrypt,gtk-3.0,machine-id,openal,os-release,pulse,sgml,xml
44private-tmp
45
46# read-only ${HOME} breaks some not necesarry featrues, comment it if
47# you need them or put 'ignore read-only ${HOME}' into your yelp.local.
48# broken features:
49# 1. yelp --editor-mode
50# 2. saving the window geometry
51read-only ${HOME}