aboutsummaryrefslogtreecommitdiffstats
path: root/etc/inc
Commit message (Collapse)AuthorAge
* add a profile for cointopLibravatar Reed Riley2022-01-21
|
* profiles: sort pathsLibravatar Reiner Herrmann2022-01-14
|
* fix warzone2100 (Debian 11)Libravatar netblue302022-01-13
|
* add wget2rc to disable-programs.incLibravatar glitsj162022-01-13
|
* Noblacklist rxvt in allow-perl.incLibravatar Vincent Lefevre2022-01-10
| | | | | This is the counterpart of the blacklist of rxvt in commit ed5c259f, as suggested in the discussion of pull request #4831.
* Merge pull request #4826 from adrianlshaw/masterLibravatar netblue302022-01-08
|\ | | | | RPCS3 profile
| * Add rpcs3 profileLibravatar Adrian L. Shaw2022-01-06
| |
* | Blacklist rxvt after the blacklist of Perl.Libravatar Vincent Lefevre2022-01-07
|/ | | | | | rxvt needs Perl modules, thus does not work. And its blacklist is needed so that Firefox can run applications with Terminal=true in their .desktop file (depending on what is installed).
* add notable blacklistsLibravatar glitsj162022-01-05
|
* Merge pull request #4755 from kmk3/mpv-add-yt-dlpLibravatar netblue302021-12-28
|\ | | | | yt-dlp: add missing paths & mpv.profile: whitelist paths for yt-dlp
| * disable-programs.inc: blacklist missing yt-dlp pathsLibravatar Kelvin M. Klann2021-12-09
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This amends commit d6ca41c19 ("update mpv.profile", 2021-10-24) / PR #4634. These paths were taken from yt-dlp(1). They are used since yt-dlp commit e2e43aea2 ("Portable Configuration file (closes #19)", 2021-01-16)[1]. Environment: yt-dlp 2021.12.01-1 on Artix Linux. Relates to: https://github.com/yt-dlp/yt-dlp/issues/19 [1] https://github.com/yt-dlp/yt-dlp/commit/e2e43aea2159a235e151f56bd14383129a6b4355
* | Fix clipgrab profile (yt-dlp requires python)Libravatar Jose Riha2021-12-28
| |
* | Whitelist ${HOME}/.local/opt/tor-browser to make tor-browser workLibravatar York Zhao2021-12-17
|/ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | tor-browser 11.0.2-1 doesn't work without whitelisting this directory. The following was the message I got before whitelisting this directory. Reading profile /etc/firejail/tor-browser.profile Reading profile /etc/firejail/torbrowser-launcher.profile Reading profile /etc/firejail/allow-python2.inc Reading profile /etc/firejail/allow-python3.inc Reading profile /etc/firejail/disable-common.inc Reading profile /etc/firejail/disable-devel.inc Reading profile /etc/firejail/disable-exec.inc Reading profile /etc/firejail/disable-interpreters.inc Reading profile /etc/firejail/disable-passwdmgr.inc Reading profile /etc/firejail/disable-programs.inc Reading profile /etc/firejail/disable-xdg.inc Reading profile /etc/firejail/whitelist-common.inc Reading profile /etc/firejail/whitelist-var-common.inc Reading profile /etc/firejail/whitelist-runuser-common.inc Reading profile /etc/firejail/whitelist-usr-share-common.inc Warning: Warning: NVIDIA card detected, nogroups command disabled Seccomp list in: !chroot, check list: @default-keep, prelist: unknown, Parent pid 12653, child pid 12654 104 programs installed in 153.32 ms Warning: An abstract unix socket for session D-BUS might still be available. Use --net or remove unix from --protocol set. Warning: skipping asound.conf for private /etc Warning: skipping crypto-policies for private /etc Warning fcopy: skipping /etc/fonts/conf.d/11-lcdfilter-default.conf, cannot find inode Warning: skipping pki for private /etc Private /etc installed in 64.84 ms Private /usr/etc installed in 0.00 ms Warning: cleaning all supplementary groups Warning: cleaning all supplementary groups Warning: /sbin directory link was not blacklisted Warning: /usr/sbin directory link was not blacklisted Warning: cleaning all supplementary groups Seccomp list in: !chroot, check list: @default-keep, prelist: unknown, Warning: cleaning all supplementary groups Child process initialized in 325.75 ms /usr/bin/tor-browser: [Error] The tor-browser archive could not be extracted to your home directory. Check the permissions of ~/.local/opt/tor-browser/app. The error log can be found in ~/.local/opt/tor-browser/LOG. /usr/bin/tor-browser: line 218: ~/.local/opt/tor-browser/app/Browser/start-tor-browser: No such file or directory
* Add new cachy-browser profileLibravatar Vladislav Nepogodin2021-12-06
|
* additional electron blacklistsLibravatar glitsj162021-11-30
|
* Blacklist ~/.config/monero-projectLibravatar Ted Robertson2021-11-30
|
* fix #4714Libravatar netblue302021-11-29
|
* disable by default several network toolsLibravatar netblue302021-11-24
|
* Profile fixesLibravatar rusty-snake2021-11-14
| | | | | | | | - Update RELNOTES and README.md - disable-common.inc - blacklist ${HOME}/.local/share/ibus-typing-booster - blacklist /run/timeshift (closes #4660) - fix audacity.profile (closes #4659)
* Merge pull request #4681 from jmetrius/openstego-profileLibravatar netblue302021-11-13
|\ | | | | Add OpenStego profile
| * Add OpenStego profileLibravatar Jan Sonntag2021-11-12
| |
* | Merge pull request #4680 from kmk3/dc-fix-slock-pathLibravatar netblue302021-11-13
|\ \ | | | | | | disable-common.inc: fix paths of slock and physlock
| * | disable-common.inc: fix paths of slock and physlockLibravatar Kelvin M. Klann2021-11-11
| |/ | | | | | | | | | | Added on commit f0adf06c3 ("disable-common.inc: more SUID", 2021-11-09). Relates to #4668.
* / telnet and ftpLibravatar netblue302021-11-12
|/
* change Fedora ssh fixLibravatar glitsj162021-11-10
| | | Suggested in https://github.com/netblue30/firejail/pull/4675#discussion_r746510840. Makes sense!
* add Fedora fixLibravatar glitsj162021-11-10
| | | | Added Fedora path as per https://github.com/netblue30/firejail/pull/4675#pullrequestreview-802438767. NOTE: there are several other profiles touching /usr/libexec, so untill someone on Fedora can shed some light on what files are installed under /usr/libexec, I only blacklisted ssh-keysign. I'll pick this up tomorrow, a bit pressed for time in the non-digital worlds...
* add Fedora fixesLibravatar glitsj162021-11-10
| | | Added Fedora path as per https://github.com/netblue30/firejail/pull/4675#pullrequestreview-802438767.
* fixes for sshLibravatar glitsj162021-11-10
| | | Counterpart fix for changes in allow-ssh.inc.
* fixes for sshLibravatar glitsj162021-11-10
| | | After seeing https://github.com/netblue30/firejail/commit/9a81078ddbbb4215d06f7d1861481ece05ebda99 it dawned on me that Arch Linux doesn't have /usr/lib/openssh, but uses /usr/lib/ssh instead. That's a different path than what's referenced in our current {allow-ssh,disable-common}.inc files. Some very superficial checks revealed that OpenSSH seems to be packaged quite differently, at least on Debian/Ubuntu and Arch Linux. And then there's version differences on non-rolling distro's to consider. All in all IMO it makes more sense to (no)blacklist /usr/lib/openssh and /usr/lib/ssh instead of referencing all the possible individual files that live under those paths.
* disable-common.inc: fix sshLibravatar netblue302021-11-09
|
* disable-common.inc: more SUIDLibravatar netblue302021-11-09
|
* disable-common.inc: vmware SUID binariesLibravatar netblue302021-11-09
|
* disable-common.inc: disable chrome-sandboxLibravatar netblue302021-11-09
|
* disable-common.inc: blacklist sshLibravatar netblue302021-11-09
|
* adding more SUID executables to disable-common.incLibravatar netblue302021-11-04
|
* Sort disaple-programs.incLibravatar rusty-snake2021-10-27
|
* wrc: whitelist journal socketsLibravatar smitsohu2021-10-23
| | | | fixes --tracelog among other things
* promote /run/udev/data to wrcLibravatar smitsohu2021-10-23
|
* disable-exec: add /run/shmLibravatar smitsohu2021-10-23
|
* Merge pull request #4521 from rusty-snake/disable-proc.incLibravatar smitsohu2021-10-20
|\ | | | | Create disable-proc.inc
| * Update disable-proc.incLibravatar rusty-snake2021-10-09
| |
| * Update disable-proc.incLibravatar rusty-snake2021-09-10
| |
| * Create disable-proc.incLibravatar rusty-snake2021-09-09
| |
* | add /run/shm to wrcLibravatar smitsohu2021-10-16
| | | | | | | | | | | | | | | | found in Debian Bullseye. /run/shm is a symbolic link to /dev/shm, and whitelisting it will just recreate the symbolic link.
* | Merge pull request #4587 from kmk3/fix-vscodiumLibravatar netblue302021-10-09
|\ \ | | | | | | Fix vscodium
| * | vscodium.profile: add missing pathsLibravatar Kelvin M. Klann2021-10-04
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | It creates the following directories on startup: * ~/.config/VSCodium * ~/.vscode-oss Environment: $ grep '^NAME' /etc/os-release NAME="Artix Linux" $ pacman -Q vscodium-bin vscodium-bin 1.60.2-2 Note: The following entry is already on disable-programs.inc: noblacklist ${HOME}/.vscode-oss It was added on commit de90834a8 ("Update disable-programs.inc", 2019-03-02). Relates to #3871.
* | | Merge pull request #4519 from rusty-snake/build-systemsLibravatar netblue302021-10-09
|\ \ \ | |/ / |/| | Add profiles for build-systems (/package-managers)
| * | Add profiles for build-systems (/package-managers)Libravatar rusty-snake2021-09-08
| |/ | | | | | | | | | | | | | | | | | | Profiles: bunler, cargo (refactor), cmake (untested), make, meson, pip All redirect to build-systems-common.profile Other fixes: - blacklist ${HOME}/.bundle - blacklist ${HOME}/.cargo/* -> blacklist ${HOME}/.cargo - blacklist /usr/lib64/ruby
* | Profile fixes and hardeningLibravatar rusty-snake2021-09-30
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * cheese - fix: dbus-user.own org.gnome.Cheese - fix: whitelist /usr/share/gstreamer-1.0 - fix: include allow-python3.inc - hardening: include disable-shell.inc - hardening: include whitelist-run-common.inc and whitelist /run/udev/data - hardening: whitelist /usr/libexec/gstreamer-1.0/gst-plugin-scanner - hardening: noinput - hardening: nosound - hardening: seccomp.block-secondary - hardening: private-dev * geekbench (closes #4576) - fix: noblacklist /sbin and noblacklist /usr/sbin - fix: noblacklist, blacklist, mkdir, whitelist, read-write ${HOME}/.geekbench5 - fix: comment/remove private-bin, private-lib, private-opt * inkscape - add quiet for cli usage * musixmatch (#4518) - allow chroot * pandoc - fix: include allow-bin-sh.inc - fix: drop private-bin - hardening: include whitelist-runuser-common.inc - hardening: seccomp.block-secondary
* | trim excess whitespaceLibravatar a13460542021-09-25
| |