diff options
Diffstat (limited to 'etc')
-rw-r--r-- | etc/Fritzing.profile | 35 | ||||
-rw-r--r-- | etc/Viber.profile | 4 | ||||
-rw-r--r-- | etc/disable-programs.inc | 5 | ||||
-rw-r--r-- | etc/discord-canary.profile | 23 | ||||
-rw-r--r-- | etc/evince.profile | 2 | ||||
-rw-r--r-- | etc/firefox-developer-edition.profile | 10 | ||||
-rw-r--r-- | etc/firefox.profile | 2 | ||||
-rw-r--r-- | etc/ideaIC.profile | 10 | ||||
-rw-r--r-- | etc/kwin_x11.profile | 3 | ||||
-rw-r--r-- | etc/lollypop.profile | 2 | ||||
-rw-r--r-- | etc/minetest.profile | 2 | ||||
-rw-r--r-- | etc/okular.profile | 5 | ||||
-rw-r--r-- | etc/onionshare-gui.profile | 35 | ||||
-rw-r--r-- | etc/pitivi.profile | 33 | ||||
-rw-r--r-- | etc/pycharm-community.profile | 32 | ||||
-rw-r--r-- | etc/pycharm-professional.profile | 7 | ||||
-rw-r--r-- | etc/quiterss.profile | 2 | ||||
-rw-r--r-- | etc/slack.profile | 2 | ||||
-rw-r--r-- | etc/steam.profile | 2 | ||||
-rw-r--r-- | etc/surf.profile | 2 | ||||
-rw-r--r-- | etc/terasology.profile | 2 | ||||
-rw-r--r-- | etc/torbrowser-launcher.profile | 2 | ||||
-rw-r--r-- | etc/transmission-qt.profile | 3 | ||||
-rw-r--r-- | etc/w3m.profile | 2 | ||||
-rw-r--r-- | etc/xonotic.profile | 2 |
25 files changed, 208 insertions, 21 deletions
diff --git a/etc/Fritzing.profile b/etc/Fritzing.profile new file mode 100644 index 000000000..0c4ad0647 --- /dev/null +++ b/etc/Fritzing.profile | |||
@@ -0,0 +1,35 @@ | |||
1 | # Firejail profile for fritzing | ||
2 | # This file is overwritten after every install/update | ||
3 | # Persistent local customizations | ||
4 | include /etc/firejail/Fritzing.local | ||
5 | # Persistent global definitions | ||
6 | include /etc/firejail/globals.local | ||
7 | |||
8 | noblacklist ${HOME}/.config/Fritzing | ||
9 | |||
10 | include /etc/firejail/disable-common.inc | ||
11 | include /etc/firejail/disable-devel.inc | ||
12 | include /etc/firejail/disable-passwdmgr.inc | ||
13 | include /etc/firejail/disable-programs.inc | ||
14 | |||
15 | include /etc/firejail/whitelist-var-common.inc | ||
16 | |||
17 | caps.drop all | ||
18 | ipc-namespace | ||
19 | netfilter | ||
20 | nodvd | ||
21 | nogroups | ||
22 | nonewprivs | ||
23 | noroot | ||
24 | nosound | ||
25 | notv | ||
26 | novideo | ||
27 | protocol unix,inet,inet6 | ||
28 | seccomp | ||
29 | shell none | ||
30 | |||
31 | private-dev | ||
32 | private-tmp | ||
33 | |||
34 | noexec ${HOME} | ||
35 | noexec /tmp | ||
diff --git a/etc/Viber.profile b/etc/Viber.profile index f5843bfd4..eb244efca 100644 --- a/etc/Viber.profile +++ b/etc/Viber.profile | |||
@@ -31,8 +31,10 @@ shell none | |||
31 | 31 | ||
32 | disable-mnt | 32 | disable-mnt |
33 | private-bin sh,bash,dig,awk,Viber | 33 | private-bin sh,bash,dig,awk,Viber |
34 | private-etc hosts,fonts,mailcap,resolv.conf,X11,pulse,alternatives,localtime,nsswitch.conf,ssl,proxychains.conf | 34 | private-etc hosts,fonts,mailcap,resolv.conf,X11,pulse,alternatives,localtime,nsswitch.conf,ssl,proxychains.conf,pki,ca-certificates,crypto-policies |
35 | private-tmp | 35 | private-tmp |
36 | 36 | ||
37 | noexec ${HOME} | 37 | noexec ${HOME} |
38 | noexec /tmp | 38 | noexec /tmp |
39 | |||
40 | env QTWEBENGINE_DISABLE_SANDBOX=1 | ||
diff --git a/etc/disable-programs.inc b/etc/disable-programs.inc index 74e7e45a7..8cfcaa838 100644 --- a/etc/disable-programs.inc +++ b/etc/disable-programs.inc | |||
@@ -3,6 +3,7 @@ | |||
3 | include /etc/firejail/disable-programs.local | 3 | include /etc/firejail/disable-programs.local |
4 | 4 | ||
5 | blacklist ${HOME}/Monero/wallets | 5 | blacklist ${HOME}/Monero/wallets |
6 | blacklist ${HOME}/snap | ||
6 | blacklist ${HOME}/.*coin | 7 | blacklist ${HOME}/.*coin |
7 | blacklist ${HOME}/.8pecxstudios | 8 | blacklist ${HOME}/.8pecxstudios |
8 | blacklist ${HOME}/.AndroidStudio* | 9 | blacklist ${HOME}/.AndroidStudio* |
@@ -13,6 +14,7 @@ blacklist ${HOME}/.IdeaIC* | |||
13 | blacklist ${HOME}/.LuminanceHDR | 14 | blacklist ${HOME}/.LuminanceHDR |
14 | blacklist ${HOME}/.Mathematica | 15 | blacklist ${HOME}/.Mathematica |
15 | blacklist ${HOME}/.Natron | 16 | blacklist ${HOME}/.Natron |
17 | blacklist ${HOME}/.PyCharm* | ||
16 | blacklist ${HOME}/.Skype | 18 | blacklist ${HOME}/.Skype |
17 | blacklist ${HOME}/.Steam | 19 | blacklist ${HOME}/.Steam |
18 | blacklist ${HOME}/.Steampath | 20 | blacklist ${HOME}/.Steampath |
@@ -41,6 +43,7 @@ blacklist ${HOME}/.config/Clementine | |||
41 | blacklist ${HOME}/.config/Cryptocat | 43 | blacklist ${HOME}/.config/Cryptocat |
42 | blacklist ${HOME}/.config/Franz | 44 | blacklist ${HOME}/.config/Franz |
43 | blacklist ${HOME}/.config/FreeCAD | 45 | blacklist ${HOME}/.config/FreeCAD |
46 | blacklist ${HOME}/.config/Fritzing | ||
44 | blacklist ${HOME}/.config/Gitter | 47 | blacklist ${HOME}/.config/Gitter |
45 | blacklist ${HOME}/.config/Google | 48 | blacklist ${HOME}/.config/Google |
46 | blacklist ${HOME}/.config/Google Play Music Desktop Player | 49 | blacklist ${HOME}/.config/Google Play Music Desktop Player |
@@ -155,6 +158,7 @@ blacklist ${HOME}/.config/netsurf | |||
155 | blacklist ${HOME}/.config/nheko | 158 | blacklist ${HOME}/.config/nheko |
156 | blacklist ${HOME}/.config/okularpartrc | 159 | blacklist ${HOME}/.config/okularpartrc |
157 | blacklist ${HOME}/.config/okularrc | 160 | blacklist ${HOME}/.config/okularrc |
161 | blacklist ${HOME}/.config/onionshare | ||
158 | blacklist ${HOME}/.config/opera | 162 | blacklist ${HOME}/.config/opera |
159 | blacklist ${HOME}/.config/opera-beta | 163 | blacklist ${HOME}/.config/opera-beta |
160 | blacklist ${HOME}/.config/orage | 164 | blacklist ${HOME}/.config/orage |
@@ -162,6 +166,7 @@ blacklist ${HOME}/.config/org.kde.gwenviewrc | |||
162 | blacklist ${HOME}/.config/pcmanfm | 166 | blacklist ${HOME}/.config/pcmanfm |
163 | blacklist ${HOME}/.config/pdfmod | 167 | blacklist ${HOME}/.config/pdfmod |
164 | blacklist ${HOME}/.config/Pinta | 168 | blacklist ${HOME}/.config/Pinta |
169 | blacklist ${HOME}/.config/pitivi | ||
165 | blacklist ${HOME}/.config/pix | 170 | blacklist ${HOME}/.config/pix |
166 | blacklist ${HOME}/.config/pluma | 171 | blacklist ${HOME}/.config/pluma |
167 | blacklist ${HOME}/.config/psi+ | 172 | blacklist ${HOME}/.config/psi+ |
diff --git a/etc/discord-canary.profile b/etc/discord-canary.profile new file mode 100644 index 000000000..391af668e --- /dev/null +++ b/etc/discord-canary.profile | |||
@@ -0,0 +1,23 @@ | |||
1 | # Firejail profile for discord-canary | ||
2 | # This file is overwritten after every install/update | ||
3 | # Persistent local customizations | ||
4 | include /etc/firejail/discord-canary.local | ||
5 | # Persistent global definitions | ||
6 | include /etc/firejail/globals.local | ||
7 | |||
8 | include /etc/firejail/disable-common.inc | ||
9 | include /etc/firejail/disable-passwdmgr.inc | ||
10 | include /etc/firejail/disable-programs.inc | ||
11 | |||
12 | whitelist ${DOWNLOADS} | ||
13 | whitelist ${HOME}/.config/discordcanary | ||
14 | |||
15 | caps.drop all | ||
16 | netfilter | ||
17 | nodvd | ||
18 | nogroups | ||
19 | nonewprivs | ||
20 | noroot | ||
21 | notv | ||
22 | protocol unix,inet,inet6,netlink | ||
23 | seccomp | ||
diff --git a/etc/evince.profile b/etc/evince.profile index 679aac08a..bbf0505cf 100644 --- a/etc/evince.profile +++ b/etc/evince.profile | |||
@@ -36,7 +36,7 @@ tracelog | |||
36 | private-bin evince,evince-previewer,evince-thumbnailer | 36 | private-bin evince,evince-previewer,evince-thumbnailer |
37 | private-dev | 37 | private-dev |
38 | private-etc fonts | 38 | private-etc fonts |
39 | private-lib | 39 | #private-lib - seems to be breaking on Gnome Shell 3.26.2, Mutter WM, issue 1711 |
40 | private-tmp | 40 | private-tmp |
41 | 41 | ||
42 | memory-deny-write-execute | 42 | memory-deny-write-execute |
diff --git a/etc/firefox-developer-edition.profile b/etc/firefox-developer-edition.profile new file mode 100644 index 000000000..696f95b56 --- /dev/null +++ b/etc/firefox-developer-edition.profile | |||
@@ -0,0 +1,10 @@ | |||
1 | # Firejail profile for firefox-developer-edition | ||
2 | # This file is overwritten after every install/update | ||
3 | # Persistent local customizations | ||
4 | include /etc/firejail/firefox-developer-edition.local | ||
5 | # Persistent global definitions | ||
6 | include /etc/firejail/globals.local | ||
7 | |||
8 | |||
9 | # Redirect | ||
10 | include /etc/firejail/firefox.profile | ||
diff --git a/etc/firefox.profile b/etc/firefox.profile index be7fdb12c..079cb1536 100644 --- a/etc/firefox.profile +++ b/etc/firefox.profile | |||
@@ -88,7 +88,7 @@ disable-mnt | |||
88 | # private-bin firefox,which,sh,dbus-launch,dbus-send,env,bash | 88 | # private-bin firefox,which,sh,dbus-launch,dbus-send,env,bash |
89 | private-dev | 89 | private-dev |
90 | # private-etc below works fine on most distributions. There are some problems on CentOS. | 90 | # private-etc below works fine on most distributions. There are some problems on CentOS. |
91 | # private-etc iceweasel,ca-certificates,ssl,machine-id,dconf,selinux,passwd,group,hostname,hosts,localtime,nsswitch.conf,resolv.conf,xdg,gtk-2.0,gtk-3.0,X11,pango,fonts,firefox,mime.types,mailcap,asound.conf,pulse | 91 | # private-etc iceweasel,ca-certificates,ssl,machine-id,dconf,selinux,passwd,group,hostname,hosts,localtime,nsswitch.conf,resolv.conf,xdg,gtk-2.0,gtk-3.0,X11,pango,fonts,firefox,mime.types,mailcap,asound.conf,pulse,pki,crypto-policies |
92 | private-tmp | 92 | private-tmp |
93 | 93 | ||
94 | noexec ${HOME} | 94 | noexec ${HOME} |
diff --git a/etc/ideaIC.profile b/etc/ideaIC.profile new file mode 100644 index 000000000..f7a69fa94 --- /dev/null +++ b/etc/ideaIC.profile | |||
@@ -0,0 +1,10 @@ | |||
1 | # Firejail profile for ideaIC | ||
2 | # This file is overwritten after every install/update | ||
3 | # Persistent local customizations | ||
4 | include /etc/firejail/ideaIC.local | ||
5 | # Persistent global definitions | ||
6 | include /etc/firejail/globals.local | ||
7 | |||
8 | |||
9 | # Redirect | ||
10 | include /etc/firejail/idea.sh.profile | ||
diff --git a/etc/kwin_x11.profile b/etc/kwin_x11.profile index 3ce4fe80d..91bb62efc 100644 --- a/etc/kwin_x11.profile +++ b/etc/kwin_x11.profile | |||
@@ -36,8 +36,5 @@ private-dev | |||
36 | private-etc drirc,fonts,ld.so.cache,machine-id,xdg | 36 | private-etc drirc,fonts,ld.so.cache,machine-id,xdg |
37 | private-tmp | 37 | private-tmp |
38 | 38 | ||
39 | # disable QML disk caching as it conflicts with the noexec constraints below | ||
40 | env QML_DISABLE_DISK_CACHE=1 | ||
41 | |||
42 | noexec ${HOME} | 39 | noexec ${HOME} |
43 | noexec /tmp | 40 | noexec /tmp |
diff --git a/etc/lollypop.profile b/etc/lollypop.profile index c0c762c02..f42489cd3 100644 --- a/etc/lollypop.profile +++ b/etc/lollypop.profile | |||
@@ -25,7 +25,7 @@ seccomp | |||
25 | shell none | 25 | shell none |
26 | 26 | ||
27 | private-dev | 27 | private-dev |
28 | private-etc asound.conf,ca-certificates,fonts,host.conf,hostname,hosts,pulse,resolv.conf,ssl | 28 | private-etc asound.conf,ca-certificates,fonts,host.conf,hostname,hosts,pulse,resolv.conf,ssl,pki,crypto-policies,gtk-3.0,xdg,machine-id |
29 | private-tmp | 29 | private-tmp |
30 | 30 | ||
31 | noexec ${HOME} | 31 | noexec ${HOME} |
diff --git a/etc/minetest.profile b/etc/minetest.profile index aa4c2218d..c560ac47c 100644 --- a/etc/minetest.profile +++ b/etc/minetest.profile | |||
@@ -33,7 +33,7 @@ disable-mnt | |||
33 | private-bin minetest | 33 | private-bin minetest |
34 | private-dev | 34 | private-dev |
35 | # private-etc needs to be updated, see #1702 | 35 | # private-etc needs to be updated, see #1702 |
36 | #private-etc asound.conf,ca-certificates,drirc,fonts,group,host.conf,hostname,hosts,ld.so.cache,ld.so.preload,localtime,nsswitch.conf,passwd,pulse,resolv.conf,ssl | 36 | #private-etc asound.conf,ca-certificates,drirc,fonts,group,host.conf,hostname,hosts,ld.so.cache,ld.so.preload,localtime,nsswitch.conf,passwd,pulse,resolv.conf,ssl,pki,crypto-policies |
37 | private-tmp | 37 | private-tmp |
38 | 38 | ||
39 | noexec ${HOME} | 39 | noexec ${HOME} |
diff --git a/etc/okular.profile b/etc/okular.profile index 59c93bdb0..31b773852 100644 --- a/etc/okular.profile +++ b/etc/okular.profile | |||
@@ -43,10 +43,7 @@ tracelog | |||
43 | private-bin okular,kbuildsycoca4,kdeinit4,lpr | 43 | private-bin okular,kbuildsycoca4,kdeinit4,lpr |
44 | private-dev | 44 | private-dev |
45 | private-etc alternatives,cups,fonts,ld.so.cache,machine-id | 45 | private-etc alternatives,cups,fonts,ld.so.cache,machine-id |
46 | # private-tmp - on KDE we need access to the real /tmp for data exchange with thunderbird | 46 | # private-tmp - on KDE we need access to the real /tmp for data exchange with email clients |
47 | |||
48 | # disable QML disk caching as it conflicts with the noexec constraints below | ||
49 | env QML_DISABLE_DISK_CACHE=1 | ||
50 | 47 | ||
51 | # memory-deny-write-execute | 48 | # memory-deny-write-execute |
52 | noexec ${HOME} | 49 | noexec ${HOME} |
diff --git a/etc/onionshare-gui.profile b/etc/onionshare-gui.profile new file mode 100644 index 000000000..7220f7e1c --- /dev/null +++ b/etc/onionshare-gui.profile | |||
@@ -0,0 +1,35 @@ | |||
1 | # Firejail profile for onionshare-gui | ||
2 | # This file is overwritten after every install/update | ||
3 | # Persistent local customizations | ||
4 | include /etc/firejail/onionshare-gui.local | ||
5 | # Persistent global definitions | ||
6 | include /etc/firejail/globals.local | ||
7 | |||
8 | noblacklist ${HOME}/.config/onionshare | ||
9 | |||
10 | include /etc/firejail/disable-common.inc | ||
11 | include /etc/firejail/disable-devel.inc | ||
12 | include /etc/firejail/disable-passwdmgr.inc | ||
13 | include /etc/firejail/disable-programs.inc | ||
14 | |||
15 | caps.drop all | ||
16 | ipc-namespace | ||
17 | netfilter | ||
18 | no3d | ||
19 | nodvd | ||
20 | nogroups | ||
21 | nonewprivs | ||
22 | noroot | ||
23 | nosound | ||
24 | notv | ||
25 | novideo | ||
26 | protocol unix,inet,inet6 | ||
27 | seccomp | ||
28 | shell none | ||
29 | |||
30 | private-dev | ||
31 | private-tmp | ||
32 | |||
33 | memory-deny-write-execute | ||
34 | noexec ${HOME} | ||
35 | noexec /tmp | ||
diff --git a/etc/pitivi.profile b/etc/pitivi.profile new file mode 100644 index 000000000..f2640ed66 --- /dev/null +++ b/etc/pitivi.profile | |||
@@ -0,0 +1,33 @@ | |||
1 | # Firejail profile for pitivi | ||
2 | # This file is overwritten after every install/update | ||
3 | # Persistent local customizations | ||
4 | include /etc/firejail/pitivi.local | ||
5 | # Persistent global definitions | ||
6 | include /etc/firejail/globals.local | ||
7 | |||
8 | |||
9 | noblacklist ${HOME}/.config/pitivi | ||
10 | |||
11 | include /etc/firejail/disable-common.inc | ||
12 | include /etc/firejail/disable-devel.inc | ||
13 | include /etc/firejail/disable-passwdmgr.inc | ||
14 | include /etc/firejail/disable-programs.inc | ||
15 | |||
16 | caps.drop all | ||
17 | ipc-namespace | ||
18 | netfilter | ||
19 | nodvd | ||
20 | nogroups | ||
21 | nonewprivs | ||
22 | noroot | ||
23 | notv | ||
24 | novideo | ||
25 | protocol unix | ||
26 | seccomp | ||
27 | shell none | ||
28 | |||
29 | private-dev | ||
30 | private-tmp | ||
31 | |||
32 | noexec ${HOME} | ||
33 | noexec /tmp | ||
diff --git a/etc/pycharm-community.profile b/etc/pycharm-community.profile new file mode 100644 index 000000000..b5e508d06 --- /dev/null +++ b/etc/pycharm-community.profile | |||
@@ -0,0 +1,32 @@ | |||
1 | # Firejail profile for pycharm-community | ||
2 | # This file is overwritten after every install/update | ||
3 | # Persistent local customizations | ||
4 | include /etc/firejail/pycharm-community.local | ||
5 | # Persistent global definitions | ||
6 | include /etc/firejail/globals.local | ||
7 | |||
8 | noblacklist ${HOME}/snap | ||
9 | noblacklist ${HOME}/.PyCharmCE* | ||
10 | noblacklist ${HOME}/.java | ||
11 | |||
12 | include /etc/firejail/disable-common.inc | ||
13 | include /etc/firejail/disable-devel.inc | ||
14 | include /etc/firejail/disable-passwdmgr.inc | ||
15 | include /etc/firejail/disable-programs.inc | ||
16 | |||
17 | caps.drop all | ||
18 | machine-id | ||
19 | nodvd | ||
20 | nogroups | ||
21 | nosound | ||
22 | notv | ||
23 | novideo | ||
24 | shell none | ||
25 | tracelog | ||
26 | |||
27 | # private-etc fonts,passwd - minimal required to run but will probably break | ||
28 | # program! | ||
29 | private-dev | ||
30 | private-tmp | ||
31 | |||
32 | noexec /tmp | ||
diff --git a/etc/pycharm-professional.profile b/etc/pycharm-professional.profile new file mode 100644 index 000000000..b28082dc4 --- /dev/null +++ b/etc/pycharm-professional.profile | |||
@@ -0,0 +1,7 @@ | |||
1 | # Firejail profilen alias for pycharm-professional | ||
2 | # This file is overwritten after every install/update | ||
3 | |||
4 | noblacklist ${HOME}/.PyCharm* | ||
5 | |||
6 | # Redirect | ||
7 | include /etc/firejail/pycharm-community.profile | ||
diff --git a/etc/quiterss.profile b/etc/quiterss.profile index 0d02cacae..94c64f2dd 100644 --- a/etc/quiterss.profile +++ b/etc/quiterss.profile | |||
@@ -44,7 +44,7 @@ tracelog | |||
44 | disable-mnt | 44 | disable-mnt |
45 | private-bin quiterss | 45 | private-bin quiterss |
46 | private-dev | 46 | private-dev |
47 | # private-etc X11,ssl | 47 | # private-etc X11,ssl,pki,ca-certificates,crypto-policies |
48 | 48 | ||
49 | noexec ${HOME} | 49 | noexec ${HOME} |
50 | noexec /tmp | 50 | noexec /tmp |
diff --git a/etc/slack.profile b/etc/slack.profile index faf875cf1..da1f86638 100644 --- a/etc/slack.profile +++ b/etc/slack.profile | |||
@@ -36,5 +36,5 @@ shell none | |||
36 | disable-mnt | 36 | disable-mnt |
37 | private-bin slack | 37 | private-bin slack |
38 | private-dev | 38 | private-dev |
39 | private-etc asound.conf,ca-certificates,fonts,group,passwd,pulse,resolv.conf,ssl,ld.so.conf,ld.so.cache,localtime | 39 | private-etc asound.conf,ca-certificates,fonts,group,passwd,pulse,resolv.conf,ssl,ld.so.conf,ld.so.cache,localtime,pki,crypto-policies |
40 | private-tmp | 40 | private-tmp |
diff --git a/etc/steam.profile b/etc/steam.profile index a683bcc19..1e0fd57d1 100644 --- a/etc/steam.profile +++ b/etc/steam.profile | |||
@@ -47,5 +47,5 @@ shell none | |||
47 | # private-dev should be commented for controllers | 47 | # private-dev should be commented for controllers |
48 | private-dev | 48 | private-dev |
49 | # private-etc breaks some games | 49 | # private-etc breaks some games |
50 | #private-etc asound.conf,ca-certificates,dbus-1,drirc,fonts,group,gtk-2.0,gtk-3.0,host.conf,hostname,hosts,ld.so.cache,ld.so.preload,ld.so.conf,ld.so.conf.d,localtime,lsb-release,machine-id,mime.types,passwd,pulse,resolv.conf,ssl,services | 50 | #private-etc asound.conf,ca-certificates,dbus-1,drirc,fonts,group,gtk-2.0,gtk-3.0,host.conf,hostname,hosts,ld.so.cache,ld.so.preload,ld.so.conf,ld.so.conf.d,localtime,lsb-release,machine-id,mime.types,passwd,pulse,resolv.conf,ssl,pki,services,crypto-policies |
51 | private-tmp | 51 | private-tmp |
diff --git a/etc/surf.profile b/etc/surf.profile index 7dcbc280e..b91c09885 100644 --- a/etc/surf.profile +++ b/etc/surf.profile | |||
@@ -29,7 +29,7 @@ tracelog | |||
29 | disable-mnt | 29 | disable-mnt |
30 | private-bin ls,surf,sh,bash,curl,dmenu,printf,sed,sleep,st,stterm,xargs,xprop | 30 | private-bin ls,surf,sh,bash,curl,dmenu,printf,sed,sleep,st,stterm,xargs,xprop |
31 | private-dev | 31 | private-dev |
32 | private-etc passwd,group,hosts,resolv.conf,fonts,ssl | 32 | private-etc passwd,group,hosts,resolv.conf,fonts,ssl,pki,ca-certificates,crypto-policies |
33 | private-tmp | 33 | private-tmp |
34 | 34 | ||
35 | noexec ${HOME} | 35 | noexec ${HOME} |
diff --git a/etc/terasology.profile b/etc/terasology.profile index 02a7baeb7..3d27134c4 100644 --- a/etc/terasology.profile +++ b/etc/terasology.profile | |||
@@ -37,7 +37,7 @@ shell none | |||
37 | 37 | ||
38 | disable-mnt | 38 | disable-mnt |
39 | private-dev | 39 | private-dev |
40 | private-etc asound.conf,ca-certificates,dbus-1,drirc,fonts,group,gtk-2.0,gtk-3.0,host.conf,hostname,hosts,ld.so.cache,ld.so.preload,localtime,lsb-release,machine-id,mime.types,passwd,pulse,resolv.conf,ssl,java-8-openjdk,java-7-openjdk | 40 | private-etc asound.conf,ca-certificates,dbus-1,drirc,fonts,group,gtk-2.0,gtk-3.0,host.conf,hostname,hosts,ld.so.cache,ld.so.preload,localtime,lsb-release,machine-id,mime.types,passwd,pulse,resolv.conf,ssl,java-8-openjdk,java-7-openjdk,pki,crypto-policies |
41 | private-tmp | 41 | private-tmp |
42 | 42 | ||
43 | noexec ${HOME} | 43 | noexec ${HOME} |
diff --git a/etc/torbrowser-launcher.profile b/etc/torbrowser-launcher.profile index 51a5d7735..b802478a2 100644 --- a/etc/torbrowser-launcher.profile +++ b/etc/torbrowser-launcher.profile | |||
@@ -33,7 +33,7 @@ tracelog | |||
33 | disable-mnt | 33 | disable-mnt |
34 | private-bin bash,cp,dirname,env,expr,file,getconf,gpg,grep,id,ln,mkdir,python*,readlink,rm,sed,sh,tail,test,tor-browser-en,torbrowser-launcher | 34 | private-bin bash,cp,dirname,env,expr,file,getconf,gpg,grep,id,ln,mkdir,python*,readlink,rm,sed,sh,tail,test,tor-browser-en,torbrowser-launcher |
35 | private-dev | 35 | private-dev |
36 | private-etc fonts | 36 | private-etc fonts,hostname,hosts,resolv.conf,pki,ssl,ca-certificates,crypto-policies |
37 | private-tmp | 37 | private-tmp |
38 | 38 | ||
39 | noexec /tmp | 39 | noexec /tmp |
diff --git a/etc/transmission-qt.profile b/etc/transmission-qt.profile index 0fe124631..b5a41622d 100644 --- a/etc/transmission-qt.profile +++ b/etc/transmission-qt.profile | |||
@@ -40,4 +40,5 @@ private-dev | |||
40 | # private-lib - problems on Arch | 40 | # private-lib - problems on Arch |
41 | private-tmp | 41 | private-tmp |
42 | 42 | ||
43 | memory-deny-write-execute | 43 | # memory-deny-write-execute - problems on Qt 5.10.0, KDE Frameworks 5.41.0 |
44 | |||
diff --git a/etc/w3m.profile b/etc/w3m.profile index 2d56aa660..d35ed9ae0 100644 --- a/etc/w3m.profile +++ b/etc/w3m.profile | |||
@@ -31,5 +31,5 @@ tracelog | |||
31 | 31 | ||
32 | # private-bin w3m | 32 | # private-bin w3m |
33 | private-dev | 33 | private-dev |
34 | private-etc resolv.conf,ssl | 34 | private-etc resolv.conf,ssl,pki,ca-certificates,crypto-policies |
35 | private-tmp | 35 | private-tmp |
diff --git a/etc/xonotic.profile b/etc/xonotic.profile index b3d45dc71..d17d2b612 100644 --- a/etc/xonotic.profile +++ b/etc/xonotic.profile | |||
@@ -32,7 +32,7 @@ disable-mnt | |||
32 | private-bin bash,blind-id,darkplaces-glx,darkplaces-sdl,dirname,grep,ldd,netstat,ps,readlink,sh,uname,xonotic,xonotic-glx,xonotic-linux32-dedicated,xonotic-linux32-glx,xonotic-linux32-sdl,xonotic-linux64-dedicated,xonotic-linux64-glx,xonotic-linux64-sdl,xonotic-sdl | 32 | private-bin bash,blind-id,darkplaces-glx,darkplaces-sdl,dirname,grep,ldd,netstat,ps,readlink,sh,uname,xonotic,xonotic-glx,xonotic-linux32-dedicated,xonotic-linux32-glx,xonotic-linux32-sdl,xonotic-linux64-dedicated,xonotic-linux64-glx,xonotic-linux64-sdl,xonotic-sdl |
33 | private-dev | 33 | private-dev |
34 | # private-etc breaks audio on some distros | 34 | # private-etc breaks audio on some distros |
35 | #private-etc asound.conf,ca-certificates,drirc,fonts,group,host.conf,hostname,hosts,ld.so.cache,ld.so.preload,localtime,nsswitch.conf,passwd,pulse,resolv.conf,ssl | 35 | #private-etc asound.conf,ca-certificates,drirc,fonts,group,host.conf,hostname,hosts,ld.so.cache,ld.so.preload,localtime,nsswitch.conf,passwd,pulse,resolv.conf,ssl,pki,crypto-policies |
36 | private-tmp | 36 | private-tmp |
37 | 37 | ||
38 | noexec ${HOME} | 38 | noexec ${HOME} |