aboutsummaryrefslogtreecommitdiffstats
path: root/etc
diff options
context:
space:
mode:
Diffstat (limited to 'etc')
-rw-r--r--etc/inc/disable-common.inc13
-rw-r--r--etc/inc/disable-programs.inc1
-rw-r--r--etc/profile-a-l/curl.profile6
-rw-r--r--etc/profile-a-l/drill.profile56
-rw-r--r--etc/profile-m-z/playonlinux.profile25
-rw-r--r--etc/profile-m-z/server.profile20
6 files changed, 92 insertions, 29 deletions
diff --git a/etc/inc/disable-common.inc b/etc/inc/disable-common.inc
index bf40457a2..2b56bb5be 100644
--- a/etc/inc/disable-common.inc
+++ b/etc/inc/disable-common.inc
@@ -515,18 +515,21 @@ blacklist /proc/config.gz
515# prevent DNS malware attempting to communicate with the server 515# prevent DNS malware attempting to communicate with the server
516# using regular DNS tools 516# using regular DNS tools
517blacklist ${PATH}/dig 517blacklist ${PATH}/dig
518blacklist ${PATH}/kdig
519blacklist ${PATH}/nslookup
520blacklist ${PATH}/host
521blacklist ${PATH}/dlint 518blacklist ${PATH}/dlint
522blacklist ${PATH}/dnswalk
523blacklist ${PATH}/dns2tcp 519blacklist ${PATH}/dns2tcp
520blacklist ${PATH}/dnswalk
521blacklist ${PATH}/drill
522blacklist ${PATH}/host
524blacklist ${PATH}/iodine 523blacklist ${PATH}/iodine
524blacklist ${PATH}/kdig
525blacklist ${PATH}/knsupdate 525blacklist ${PATH}/knsupdate
526blacklist ${PATH}/ldns-*
527blacklist ${PATH}/ldnsd
528blacklist ${PATH}/nslookup
526blacklist ${PATH}/resolvectl 529blacklist ${PATH}/resolvectl
527 530
528# rest of ${RUNUSER} 531# rest of ${RUNUSER}
529blacklist ${RUNUSER}/*.lock 532blacklist ${RUNUSER}/*.lock
530blacklist ${RUNUSER}/inaccessible 533blacklist ${RUNUSER}/inaccessible
531blacklist ${RUNUSER}/update-notifier.pid
532blacklist ${RUNUSER}/pk-debconf-socket 534blacklist ${RUNUSER}/pk-debconf-socket
535blacklist ${RUNUSER}/update-notifier.pid
diff --git a/etc/inc/disable-programs.inc b/etc/inc/disable-programs.inc
index 25c7796da..9b098f43c 100644
--- a/etc/inc/disable-programs.inc
+++ b/etc/inc/disable-programs.inc
@@ -430,6 +430,7 @@ blacklist ${HOME}/.config/Zulip
430blacklist ${HOME}/.conkeror.mozdev.org 430blacklist ${HOME}/.conkeror.mozdev.org
431blacklist ${HOME}/.crawl 431blacklist ${HOME}/.crawl
432blacklist ${HOME}/.cups 432blacklist ${HOME}/.cups
433blacklist ${HOME}/.curl-hsts
433blacklist ${HOME}/.curlrc 434blacklist ${HOME}/.curlrc
434blacklist ${HOME}/.dashcore 435blacklist ${HOME}/.dashcore
435blacklist ${HOME}/.devilspie 436blacklist ${HOME}/.devilspie
diff --git a/etc/profile-a-l/curl.profile b/etc/profile-a-l/curl.profile
index 996ff51d3..5a5a7496a 100644
--- a/etc/profile-a-l/curl.profile
+++ b/etc/profile-a-l/curl.profile
@@ -7,6 +7,12 @@ include curl.local
7# Persistent global definitions 7# Persistent global definitions
8include globals.local 8include globals.local
9 9
10# curl 7.74.0 introduces experimental support for HSTS cache
11# https://daniel.haxx.se/blog/2020/11/03/hsts-your-curl/
12# technically this file can be anywhere but let's assume users have it in ${HOME}/.curl-hsts
13# if your setup diverts, add 'blacklist /path/to/curl/hsts/file' to your disable-programs.local
14# and 'noblacklist /path/to/curl/hsts/file' to curl.local to keep the sandbox logic intact
15noblacklist ${HOME}/.curl-hsts
10noblacklist ${HOME}/.curlrc 16noblacklist ${HOME}/.curlrc
11 17
12blacklist /tmp/.X11-unix 18blacklist /tmp/.X11-unix
diff --git a/etc/profile-a-l/drill.profile b/etc/profile-a-l/drill.profile
new file mode 100644
index 000000000..8c59b0cb6
--- /dev/null
+++ b/etc/profile-a-l/drill.profile
@@ -0,0 +1,56 @@
1# Firejail profile for drill
2# Description: DNS lookup utility
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include drill.local
7# Persistent global definitions
8include globals.local
9
10noblacklist ${PATH}/drill
11
12blacklist /tmp/.X11-unix
13blacklist ${RUNUSER}/wayland-*
14blacklist ${RUNUSER}
15
16include disable-common.inc
17# include disable-devel.inc
18include disable-exec.inc
19# include disable-interpreters.inc
20include disable-passwdmgr.inc
21include disable-programs.inc
22include disable-xdg.inc
23
24include whitelist-common.inc
25include whitelist-usr-share-common.inc
26include whitelist-var-common.inc
27
28apparmor
29caps.drop all
30ipc-namespace
31machine-id
32netfilter
33no3d
34nodvd
35nogroups
36nonewprivs
37noroot
38nosound
39notv
40nou2f
41novideo
42protocol unix,inet,inet6
43seccomp
44shell none
45tracelog
46
47disable-mnt
48private
49private-bin bash,drill,sh
50private-dev
51private-tmp
52
53dbus-user none
54dbus-system none
55
56memory-deny-write-execute
diff --git a/etc/profile-m-z/playonlinux.profile b/etc/profile-m-z/playonlinux.profile
index 03091af6d..0ebef226a 100644
--- a/etc/profile-m-z/playonlinux.profile
+++ b/etc/profile-m-z/playonlinux.profile
@@ -4,34 +4,17 @@
4# Persistent local customizations 4# Persistent local customizations
5include playonlinux.local 5include playonlinux.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7# added by included profile
8#include globals.local
8 9
9noblacklist ${HOME}/.Steam
10noblacklist ${HOME}/.local/share/Steam
11noblacklist ${HOME}/.local/share/steam
12noblacklist ${HOME}/.steam
13noblacklist ${HOME}/.PlayOnLinux 10noblacklist ${HOME}/.PlayOnLinux
14 11
15# nc is needed to run playonlinux 12# nc is needed to run playonlinux
16noblacklist ${PATH}/nc 13noblacklist ${PATH}/nc
17 14
18# Allow python (blacklisted by disable-interpreters.inc)
19include allow-python2.inc 15include allow-python2.inc
20include allow-python3.inc 16include allow-python3.inc
21
22# Allow perl (blacklisted by disable-interpreters.inc)
23include allow-perl.inc 17include allow-perl.inc
24 18
25include disable-common.inc 19# Redirect
26include disable-devel.inc 20include wine.profile
27include disable-interpreters.inc
28include disable-programs.inc
29
30caps.drop all
31netfilter
32nodvd
33nogroups
34nonewprivs
35noroot
36notv
37seccomp
diff --git a/etc/profile-m-z/server.profile b/etc/profile-m-z/server.profile
index 5bc4735ae..d47f1289a 100644
--- a/etc/profile-m-z/server.profile
+++ b/etc/profile-m-z/server.profile
@@ -45,10 +45,17 @@ include disable-common.inc
45# include disable-interpreters.inc 45# include disable-interpreters.inc
46include disable-passwdmgr.inc 46include disable-passwdmgr.inc
47include disable-programs.inc 47include disable-programs.inc
48# include disable-xdg.inc 48include disable-write-mnt.inc
49include disable-xdg.inc
49 50
51# include whitelist-runuser-common.inc
52# include whitelist-usr-share-common.inc
53# include whitelist-var-common.inc
54
55apparmor
50caps 56caps
51# ipc-namespace 57# ipc-namespace
58machine-id
52# netfilter /etc/firejail/webserver.net 59# netfilter /etc/firejail/webserver.net
53no3d 60no3d
54nodvd 61nodvd
@@ -59,19 +66,26 @@ nosound
59notv 66notv
60nou2f 67nou2f
61novideo 68novideo
69# protocol unix,inet,inet6,netlink
62seccomp 70seccomp
63# shell none 71# shell none
64 72
65# disable-mnt 73disable-mnt
66private 74private
67# private-bin program 75# private-bin program
68# private-cache 76# private-cache
69private-dev 77private-dev
78# see /usr/share/doc/firejail/profile.template for more common private-etc paths.
70# private-etc alternatives 79# private-etc alternatives
71# private-lib 80# private-lib
81# private-opt none
72private-tmp 82private-tmp
73 83
74# dbus-user none 84dbus-user none
75# dbus-system none 85# dbus-system none
76 86
77# memory-deny-write-execute 87# memory-deny-write-execute
88# read-only ${HOME}
89# writable-run-user
90# writable-var
91# writable-var-log