aboutsummaryrefslogtreecommitdiffstats
path: root/src/man/firejail.txt
diff options
context:
space:
mode:
Diffstat (limited to 'src/man/firejail.txt')
-rw-r--r--src/man/firejail.txt112
1 files changed, 107 insertions, 5 deletions
diff --git a/src/man/firejail.txt b/src/man/firejail.txt
index 02c1d27b2..b0c4eeb15 100644
--- a/src/man/firejail.txt
+++ b/src/man/firejail.txt
@@ -326,6 +326,112 @@ $ firejail \-\-list
326$ firejail \-\-cpu.print=3272 326$ firejail \-\-cpu.print=3272
327 327
328.TP 328.TP
329\fB\-\-dbus-system=filter|none
330Set system DBus sandboxing policy.
331.br
332
333.br
334The \fBfilter\fR policy enables the system DBus filter. This option requires
335installing the xdg-dbus-proxy utility. Permissions for well-known can be
336specified with the --dbus-system.talk and --dbus-system.own options.
337.br
338
339.br
340The \fBnone\fR policy disables access to the system DBus.
341.br
342
343.br
344Only the regular system DBus UNIX socket is handled by this option. To disable
345the abstract sockets (and force applications to use the filtered UNIX socket)
346you would need to request a new network namespace using \-\-net command. Another
347option is to remove unix from the \-\-protocol set.
348.br
349
350.br
351Example:
352.br
353$ firejail \-\-dbus-system=none
354
355.TP
356\fB\-\-dbus-system.own=name
357Allows the application to own the specified well-known name on the system DBus.
358The name may have a .* suffix to match all names underneath it, including itself
359(e.g. "foo.bar.*" matches "foo.bar", "foo.bar.baz" and "foo.bar.baz.quux", but
360not "foobar").
361.br
362
363.br
364Example:
365.br
366$ firejail --dbus-system=filter --dbus-system.own=org.gnome.ghex.*
367
368.TP
369\fB\-\-dbus-system.talk=name
370Allows the application to talk to the specified well-known name on the system DBus.
371The name may have a .* suffix to match all names underneath it, including itself
372(e.g. "foo.bar.*" matches "foo.bar", "foo.bar.baz" and "foo.bar.baz.quux", but
373not "foobar").
374.br
375
376.br
377Example:
378.br
379$ firejail --dbus-system=filter --dbus-system.talk=org.freedesktop.Notifications
380
381.TP
382\fB\-\-dbus-user=filter|none
383Set session DBus sandboxing policy.
384.br
385
386.br
387The \fBfilter\fR policy enables the session DBus filter. This option requires
388installing the xdg-dbus-proxy utility. Permissions for well-known names can be
389added with the --dbus-user.talk and --dbus-user.own options.
390.br
391
392.br
393The \fBnone\fR policy disables access to the session DBus.
394.br
395
396.br
397Only the regular session DBus UNIX socket is handled by this option. To disable
398the abstract sockets (and force applications to use the filtered UNIX socket)
399you would need to request a new network namespace using \-\-net command. Another
400option is to remove unix from the \-\-protocol set.
401.br
402
403.br
404Example:
405.br
406$ firejail \-\-dbus-user=none
407
408.TP
409\fB\-\-dbus-user.own=name
410Allows the application to own the specified well-known name on the session DBus.
411The name may have a .* suffix to match all names underneath it, including itself
412(e.g. "foo.bar.*" matches "foo.bar", "foo.bar.baz" and "foo.bar.baz.quux", but
413not "foobar").
414.br
415
416.br
417Example:
418.br
419$ firejail --dbus-user=filter --dbus-user.own=org.gnome.ghex.*
420
421.TP
422\fB\-\-dbus-user.talk=name
423Allows the application to talk to the specified well-known name on the session DBus.
424The name may have a .* suffix to match all names underneath it, including itself
425(e.g. "foo.bar.*" matches "foo.bar", "foo.bar.baz" and "foo.bar.baz.quux", but
426not "foobar").
427.br
428
429.br
430Example:
431.br
432$ firejail --dbus-user=filter --dbus-user.talk=org.freedesktop.Notifications
433
434.TP
329\fB\-\-debug\fR 435\fB\-\-debug\fR
330Print debug messages. 436Print debug messages.
331.br 437.br
@@ -1171,11 +1277,7 @@ $ nc dict.org 2628
1171.br 1277.br
1172.TP 1278.TP
1173\fB\-\-nodbus 1279\fB\-\-nodbus
1174Disable D-Bus access (both system and session buses). Only the regular 1280Disable D-Bus access (both system and session buses). Equivalent to --dbus-system=none --dbus-user=none.
1175UNIX sockets are handled by this command. To disable the abstract
1176sockets you would need to request a new network namespace using
1177\-\-net command. Another option is to remove unix from \-\-protocol
1178set.
1179.br 1281.br
1180 1282
1181.br 1283.br