aboutsummaryrefslogtreecommitdiffstats
path: root/etc/inc
Commit message (Collapse)AuthorAge
...
* | add a /usr/share whitelist item for uimLibravatar Anton Shestakov2021-02-05
| | | | | | uim is a multilingual input method framework, so any program that takes user input potentially needs it to work.
* | Add profile for avidemux (#3935)Libravatar Neo000012021-01-31
| | | | | | | | | | | | | | | | | | | | | | * Update disable-programs.inc * Update disable-programs.inc * Update firecfg.config * Create avidemux.profile * Update avidemux.profile
* | Merge pull request #3885 from kmk3/fix-sshLibravatar glitsj162021-01-30
|\ \ | | | | | | ssh: Refactor, fix bugs & harden
| * | disable-common.inc: add missing openssh pathsLibravatar Kelvin M. Klann2021-01-27
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The paths are taken from ssh(1) and sshd(8). $ pacman -Q openssh openssh 8.4p1-2 These are only used by sshd(8), so always blacklist them: * ~/.rhosts: controls remote access to the local machine * ~/.shosts: same as above * ~/.ssh/authorized_keys: same as above * ~/.ssh/authorized_keys2: same as above * ~/.ssh/environment: potentially allows arbitrary command execution on the local machine * ~/.ssh/rc: allows arbitrary command execution on the local machine * /etc/hosts.equiv: system-wide equivalent of ~/.rhosts Note: There are files in /etc/ssh that are equivalent to some of the above ones, but they are already blocked by `blacklist /etc/ssh/*`. Note2: From sshd(8): > If the file ~/.ssh/rc exists, sh(1) runs it after reading the > environment files but before starting the user's shell or command. So even if the user shell is set to /usr/bin/firejail and disable-common.inc is loaded, this patch shouldn't interfere with sshd. This file is actually used by ssh(1), so just mark it read-only: * ~/.ssh/config: allows arbitrary command execution on the remote machine (with e.g.: RemoteCommand) and also defines the connection strength Since version 7.3p1 (released on 2016-08-01), openssh supports including other config files on ssh_config(5)[1][2]. This is the conventional path for storing them[3], so mark it read-only: * ~/.ssh/config.d: same as above P.S. See also the explanation on the commit b5542fc94 ("disable-common.inc: read-only access to ~/.ssh/authorized_keys"), which last touched/added the "Remote access" section. [1]: https://anongit.mindrot.org/openssh.git/commit/?id=dc7990be865450574c7940c9880567f5d2555b37 [2]: https://www.openssh.com/txt/release-7.3 [3]: https://superuser.com/a/1142813
| * | allow-ssh.inc: allow access to ssh-agent(1)Libravatar Kelvin M. Klann2021-01-27
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Leaving it limited to only ssh, ssh-agent and seahorse by default seems unnecessarily restrictive. From ssh(1): > The most convenient way to use public key or certificate > authentication may be with an authentication agent. See ssh-agent(1) > and (optionally) the AddKeysToAgent directive in ssh_config(5) for > more information. $ pacman -Q openssh openssh 8.4p1-2 With ssh-agent(1) running in the background (and with the private key(s) loaded through ssh-add(1)), ssh(1) doesn't need direct access to the actual key pair(s), so you could probably get away with this on allow-ssh.local: ignore noblacklist ${HOME}/.ssh noblacklist ${HOME}/.ssh/config noblacklist ${HOME}/.ssh/config.d noblacklist ${HOME}/.ssh/known_hosts And then this on the profiles of ssh key pair managers, such as seahorse.local: noblacklist ${HOME}/.ssh
| * | allow-ssh.inc: allow /etc/ssh/ssh_configLibravatar Kelvin M. Klann2021-01-27
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This is the system-wide equivalent of ~/.ssh/config. $ pacman -Q openssh openssh 8.4p1-2 Reasons for blacklisting both /etc/ssh and /etc/ssh/* on disable-common.inc: Leave /etc/ssh that way so that profiles without allow-ssh.inc remain unable to see inside of /etc/ssh. And blacklist /etc/ssh/* so that profiles with allow-ssh.inc are able to access only nonblacklisted files inside of /etc/ssh.
| * | etc: add allow-ssh.incLibravatar Kelvin M. Klann2021-01-27
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | And move the scattered `noblacklist ${HOME}/.ssh` entries into it. Command used to find the relevant files: $ grep -Fnr 'noblacklist ${HOME}/.ssh' etc Also, add it to profile.template, as reminded by @rusty-snake at https://github.com/netblue30/firejail/pull/3885#pullrequestreview-567527031
| * | ssh: move auth socket blacklist to disable-common.incLibravatar Kelvin M. Klann2021-01-22
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | That was added on the commit e93fbf3bd ("disable ssh-agent sockets in disable-programs.inc"). Currently, it's the only ssh-related entry on disable-programs.inc. Further, it seems that all the other socket blacklists live on disable-common.inc. Also, even though this socket does not necessarily allow arbitrary command execution on the local machine (like some paths on disable-common.inc do), it could still do so for remote systems. Put it above the "top secret" section, like the terminal sockets are above the terminal server section.
* | | Add gfeeds directory for saved articlesLibravatar rusty-snake2021-01-29
| | |
* | | streamline 'Allow xxx' comments (#3922)Libravatar glitsj162021-01-27
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * add comment: allow python * add comment: allow python * reorder allow comments * fix perl allow comment * add comment: allow python * add comment: allow lua, perl & python * reorder allow comments * add comment: allow python * add comment: allow python * add comment: allow lua, perl & python * fix allow comments * add comment: allow python * add comment: allow python * fix spacing in comments * add comment: allow python * add comment: allow python * fix comment * add comment: allow perl & python * add comment: allow lua & python * add comment: allow lua, perl & python * fix allow comments * add comment: allow perl & python * streamline allow python comments
* | | Merge pull request #3853 from botherder/masterLibravatar netblue302021-01-25
|\ \ \ | | | | | | | | New profile for CoyIM
| * | | Implementing some of the suggested changes from #3853Libravatar Nex2020-12-29
| | |/ | |/|
* | | Update disable-programs.incLibravatar Neo000012021-01-24
| | |
* | | refactor google-earth{-pro} (#3915)Libravatar glitsj162021-01-23
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * refactor google-earth{-pro} blacklisting * fix google-earth-pro.profile I've included all binaries found in the Arch Linux AUR package to private-bin. But I also added a note on ignoring private-bin because I'm not sure what google-earth is doing on other distro's. * unbreak google-earth.profile Not sure why we need grep, ls and sed in private-bin exactly but keeping them around wouldn't hurt too much I guess.
* | | Add profile for guvcviewLibravatar rusty-snake2021-01-18
| | |
* | | Add new allow include allow-bin-sh.incLibravatar rusty-snake2021-01-16
| | | | | | | | | | | | | | | | | | | | | | | | | | | /bin/sh is usually just a symlink to bash. However this is not the case for every distro, debian for example uses dash. bash,dash and sh have a blacklist command in disable-shell.inc. An own allow-*.inc for it enusres usage of all necessary nolacklists. For private-bin sh is enough because it follows symlinks.
* | | new profile: qnapi (#3890)Libravatar glitsj162021-01-13
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * add new profile: qnapi * add new profile: qnapi * Create qnapi.profile * add qnapi configs * Update README.md * Update README.md
* | | add new profile: shotwell (#3889)Libravatar glitsj162021-01-13
| |/ |/| | | | | | | | | | | | | | | * new profile: shotwell * Create shotwell.profile * new profile: shotwell * add shotwell blacklists
* | refactor nodejs applications (npm & yarn) (#3876)Libravatar glitsj162021-01-11
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * add yarn & reorder * add node-gyp & yarn files * Create nodejs-common.profile * Create yarn.profile * refactor npm.profile * add new profile: yarn * read-only's for npm/yarn Thanks to the [suggestion](https://github.com/netblue30/firejail/pull/3876#pullrequestreview-564682989) from @kmk3. * ignore read-only's for npm As [suggested](https://github.com/netblue30/firejail/pull/3876#pullrequestreview-564682989) by @kmk3. * ignore read-only for yarn As suggested in https://github.com/netblue30/firejail/pull/3876#pullrequestreview-564682989 by @kmk3. * remove quiet from nodejs-common.profile quiet should go into the caller profiles instead * add quiet to npm.profile Thanks @rusty-snake for the review. * re-ordering some options * re-ordering
* | Add blacklist line for Bohemia Interactive to disable-programsLibravatar Aidan Gauland2021-01-10
| |
* | Add new profile for markerLibravatar rusty-snake2021-01-08
| |
* | Add profile for npm (#3866)Libravatar Aidan Gauland2021-01-08
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * Add profile for npm * Apply suggestions from code review * Remove redundant blacklisting of Wayland. * Remove unnecessary noblacklist lines for nodejs. * Replace absolute paths to .inc files with filenames. * Remove unneeded dbus whitelisting. Co-authored-by: rusty-snake <41237666+rusty-snake@users.noreply.github.com> * Remove empty line To keep consistent with other profiles, remove the blank line after the header comment. Co-authored-by: rusty-snake <41237666+rusty-snake@users.noreply.github.com> * Add npm files to add-common-devel So that our addition of npm paths to disable-programs.inc dose not break IDEs, we need to unblacklist these same paths in allow-common-devel.inc. * Remove extra blank line * Add common whitelist includes to npm profile * Tighten npm profile Include disable-exec.inc, but allowing ${HOME}. * Remove whitelist-common.inc from npm profile whitelist-common breaks npm, and since we don't know where the user's npm projects will be, leave the whitelist-common include in a comment with a note about how to enable it for their setup. * Fix inverted commands Co-authored-by: rusty-snake <41237666+rusty-snake@users.noreply.github.com> * Fixes for whitelisting * Add login.defs to npm profile's private-etc Co-authored-by: Aidan Gauland <aidalgol+git@fastmail.net> Co-authored-by: rusty-snake <41237666+rusty-snake@users.noreply.github.com>
* | new profile: tutanota-desktop (#3870)Libravatar glitsj162021-01-05
| | | | | | | | | | | | | | | | | | * new profile: tutanota-desktop * add tutanota-desktop to firecfg * blacklist tutanota-desktop files * Create tutanota-desktop.profile
* | Merge branch 'master' into browsersLibravatar Reiner Herrmann2020-12-29
|\ \
| * \ Merge pull request #3847 from bbhtt/small_fixesLibravatar Reiner Herrmann2020-12-29
| |\ \ | | | | | | | | Small fixes
| | * | Fix Nheko cache directoryLibravatar bbhtt2020-12-28
| | |/
| * / profiles: add redirect from matrix-mirage to mirage (#3854)Libravatar Reiner Herrmann2020-12-29
| |/
* / Add profiles for MS Edge dev build for Linux and LibrewolfLibravatar bbhtt2020-12-28
|/
* remove trailing whitespacesLibravatar rusty-snake2020-12-21
|
* disable-common.inc: add missing dns tools (#3828)Libravatar Kelvin2020-12-20
| | | | | | | | | | Add the missing binaries in the DNS section, as suggested by @glitsj16: https://github.com/netblue30/firejail/pull/3810#issuecomment-742920539 Packages and their relevant binaries: * bind: dnssec-* * knot: khost * unbound: unbound-host
* archivers: limiting file system access (#3834)Libravatar glitsj162020-12-19
| | | | | | | | | * limit file system access with comments in archiver-common.inc * note wording * Warn against overtightening file system access Be more explicit about things breaking when archiver profiles are too tight. Thanks for the suggestion by @rusty-snake in #3834.
* disable-shell.inc: add oksh (#3829)Libravatar Kelvin2020-12-16
| | | | | | | | | | | "Portable OpenBSD ksh, based on the Public Domain Korn Shell (pdksh)." Project page: https://github.com/ibara/oksh $ pacman -Q oksh oksh 6.8.1-1 $ pacman -Qlq oksh | grep bin/ /usr/bin/ /usr/bin/oksh
* New profiles for alacarte,tootle,photoflare (#3816)Libravatar kortewegdevries2020-12-16
| | | | | | | * New profiles for alacarte,tootle,photoflare * Fix dbus Co-authored-by: kortewegdevries <kortewegdevries@protonmail.ch>
* Refactor archivers (#3820)Libravatar glitsj162020-12-15
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * Create archiver-common.inc * add apparmor to archiver-common.inc * refactor 7z.profile * refactor ar.profile * refactor atool.profile * refactor bsdtar.profile * refactor cpio.profile * refactor gzip.profile * refactor tar.profile * refactor unrar.profile * refactor unzip.profile * refactor xzdec.profile * refactor zstd.profile * rewording * blacklist ${RUNUSER} in archiver-common.inc Thanks to @rusty-snake for suggesting this. * drop non-sensical ${RUNUSER}/wayland-* blacklisting in archiver-common.inc See discussion in https://github.com/netblue30/firejail/pull/3820#discussion_r543523343
* rename softmaker-common.inc to softmaker-common.profile (#3825)Libravatar glitsj162020-12-15
| | | | | | | | | | | | | | | | | | | | | | | * Rename etc/inc/softmaker-common.inc to etc/profile-m-z/softmaker-common.profile As per suggestion by @rusty-snake in https://github.com/netblue30/firejail/pull/3819#issuecomment-745244982 * softmaker-common.profile name change * softmaker-common.profile name change * softmaker-common.profile name change * softmaker-common.profile name change * softmaker-common.profile name change * softmaker-common.profile name change * softmaker-common.profile name change * softmaker-common.profile name change * softmaker-common.profile name change
* rename whitelist-players.inc to whitelist-player-common.inc (#3819)Libravatar glitsj162020-12-15
| | | | | | | | | | | | | | | | | * Update and rename whitelist-players.inc to whitelist-player-common.inc * renamed whitelist-player-common.inc * renamed whitelist-player-common.inc * renamed whitelist-player-common.inc * renamed whitelist-player-common.inc * renamed whitelist-player-common.inc * renamed whitelist-player-common.inc * renamed whitelist-player-common.inc
* streamline comments in inc files (#3818)Libravatar glitsj162020-12-14
| | | | | | | | | | | * streamline comments * streamline comments * streamline comments * streamline comments * streamline comments
* Merge pull request #3810 from kmk3/dc-add-ldnsLibravatar netblue302020-12-12
|\ | | | | Dc add ldns
| * disable-common.inc: blacklist ldns toolsLibravatar Kelvin M. Klann2020-12-10
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | drill(1) from ldns is the first tool suggested on the Arch Wiki for DNS lookup: https://wiki.archlinux.org/index.php/Domain_name_resolution#Lookup_utilities Home page: https://www.nlnetlabs.nl/projects/ldns/about/ $ pacman -Q ldns ldns 1.7.1-2 $ pacman -Qlq ldns | grep bin /usr/bin/ /usr/bin/drill /usr/bin/ldns-chaos /usr/bin/ldns-compare-zones /usr/bin/ldns-config /usr/bin/ldns-dane /usr/bin/ldns-dpa /usr/bin/ldns-gen-zone /usr/bin/ldns-key2ds /usr/bin/ldns-keyfetcher /usr/bin/ldns-keygen /usr/bin/ldns-mx /usr/bin/ldns-notify /usr/bin/ldns-nsec3-hash /usr/bin/ldns-read-zone /usr/bin/ldns-resolver /usr/bin/ldns-revoke /usr/bin/ldns-rrsig /usr/bin/ldns-signzone /usr/bin/ldns-test-edns /usr/bin/ldns-testns /usr/bin/ldns-update /usr/bin/ldns-verify-zone /usr/bin/ldns-version /usr/bin/ldns-walk /usr/bin/ldns-zcat /usr/bin/ldns-zsplit /usr/bin/ldnsd
| * disable-common.inc: sort DNS / RUNUSER pathsLibravatar Kelvin M. Klann2020-12-10
| |
* | curl HSTS cache support (#3813)Libravatar glitsj162020-12-12
|/ | | | | * add curl HSTS support * add HSTS support
* fixesLibravatar rusty-snake2020-12-09
| | | | | | - hopefully fix #3795 finally - fix README.md codeblock - blacklist ${HOME}/.texlive20*
* Add profile for authenticator-rs, improve falkon (#3747)Libravatar kortewegdevries2020-12-07
| | | | | | | | | * Add profile for authenticator-rs, improve falkon, balsa * Fix * Add private-tmp to falkon * Revert balsa
* Add a profile for dolphin-emuLibravatar Tad2020-11-29
| | | | | Games folder must be whitelisted in a dolphin-emu.local Its private-etc can likely be shortened
* make ${HOME}/.local/lib read-onlyLibravatar rusty-snake2020-11-24
|
* Add a profile for LutrisLibravatar Tad2020-11-23
| | | | | | | | - Lutris isn't added to firecfg just yet, needs more testing - aria2c profile has a comment regarding Lutris/Winetricks, but it shouldn't matter since it can't be nested - Add commented wusc to wine.profile - Add vulkan and zenity to wusc.inc
* reorder disable-write-mnt.incLibravatar glitsj162020-11-23
|
* Whitelist wayland-1 socketLibravatar Kristóf Marussy2020-11-22
| | | | | | If the GDM display manager runs with Wayland support, and it starts a desktop environment other than (?) GNOME, the desktop environment will use the `wayland-1` socket instead of the `wayland-0` socket.
* various profilesLibravatar rusty-snake2020-11-20
| | | | | | - disable-common: read-only ${HOME}/.zfunc - fix #3761 -- w3m with w3m-img installed does not display images when on virtual console/framebuffer - yelp can be used to display manpages
* Add profile for straw-viewer (#3742)Libravatar kortewegdevries2020-11-18
| | | | | * Add profile for straw-viewer * Remove blacklist, fixes