aboutsummaryrefslogtreecommitdiffstats
path: root/etc/inc
Commit message (Collapse)AuthorAge
* adding .cache/youtube-viewerLibravatar pirate4867431862021-03-20
|
* Fix nheko (#4117)Libravatar rusty-snake2021-03-19
| | | closes #4115
* Merge pull request #4101 from pirate486743186/patch-12Libravatar netblue302021-03-19
|\ | | | | [minor] qcomicbook and pipe-viewer in disable-programs
| * adding mcomixLibravatar pirate4867431862021-03-18
| |
| * qcomicbook and pipe-viewer in disable-programsLibravatar pirate4867431862021-03-15
| | | | | | qcomicbook is the "PawelStolowski" folders
* | Merge pull request #4098 from tredondo/masterLibravatar netblue302021-03-19
|\ \ | | | | | | Create bcompare.profile
| * | Add bcompare to disable-programs.incLibravatar Ted Robertson2021-03-13
| | |
* | | Add a profile for pcsxrLibravatar Tad2021-03-15
| | |
* | | Add a profile for openmwLibravatar Tad2021-03-15
| | |
* | | Add a profile for JamiLibravatar Tad2021-03-15
| |/ |/| | | | | Left out of firecfg because I think it was buggy.
* | Merge pull request #4079 from Neo00001/masterLibravatar netblue302021-03-14
|\ \ | | | | | | Add profile for youtube-dl-gui & some other changes
| * | Update disable-programs.incLibravatar Neo000012021-03-11
| | |
* | | Merge pull request #4064 from pirate486743186/patch-8Libravatar netblue302021-03-14
|\ \ \ | |/ / |/| | newsboat/newsbeuter corrections
| * | more newsboat/newsbeuterLibravatar pirate4867431862021-03-10
| | |
* | | more jailtestLibravatar netblue302021-03-08
|/ /
* | new profile: com.github.phase1geo.minderLibravatar rusty-snake2021-03-06
| |
* | Merge pull request #3997 from nidamanx/patch-2Libravatar netblue302021-03-05
|\ \ | |/ |/| Create nextcloud-desktop.profile
| * Add nextcloud-desktopLibravatar Nicola Davide Mannarelli2021-02-20
| |
* | Merge pull request #4031 from glitsj16/firefox-common-addonsLibravatar glitsj162021-03-02
|\ \ | | | | | | Rename firefox-common-addons.inc
| * | Rename etc/inc/firefox-common-addons.inc to ↵Libravatar glitsj162021-03-02
| | | | | | | | | | | | etc/profile-a-l/firefox-common-addons.profile
* | | Merge pull request #4030 from glitsj16/chromium-common-hardenedLibravatar glitsj162021-03-02
|\ \ \ | | | | | | | | Rename chromium-common-hardened.inc
| * | | Rename etc/inc/chromium-common-hardened.inc to ↵Libravatar glitsj162021-03-02
| |/ / | | | | | | | | | etc/profile-a-l/chromium-common-hardened.profile
* | | Merge pull request #4029 from glitsj16/feh-networkLibravatar glitsj162021-03-02
|\ \ \ | | | | | | | | Rename feh-network.inc
| * | | Rename etc/inc/feh-network.inc to etc/profile-a-l/feh-network.profileLibravatar glitsj162021-03-02
| |/ /
* / / Rename etc/inc/archiver-common.inc to etc/profile-a-l/archiver-common.profileLibravatar glitsj162021-03-02
|/ /
* / add local override functionalityLibravatar glitsj162021-03-01
|/ | | Due to https://github.com/netblue30/firejail/commit/5d88ee8957dc38a52c36f71b91c786dbec9d4ec9 we should provide an override option here IMO.
* Merge pull request #3849 from bbhtt/emailLibravatar netblue302021-02-09
|\ | | | | Email part (2)
| * Add folks cache directoryLibravatar bbhtt2020-12-29
| |
| * Add whitelisting to mutt; improve geary, new profile for neomuttLibravatar bbhtt2020-12-28
| |
* | archivers: wrap commentsLibravatar Kelvin M. Klann2021-02-08
| |
* | Add profile for Gemini (#3946)Libravatar Neo000012021-02-07
| | | | | | | | | | | | | | | | | | | | | | * Update disable-programs.inc * Create calligragemini.profile * Update calligra.profile * Update calligra.profile * Update firecfg.config
* | disable-interpreters.inc: blacklist the other libmozjsLibravatar Kelvin M. Klann2021-02-06
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | And sort the paths on allow-gjs.inc. $ pacman -Q js78 js78 78.6.0-1 $ pacman -Qlq js78 | grep -v /usr/include/ /usr/ /usr/bin/ /usr/bin/js78 /usr/bin/js78-config /usr/lib/ /usr/lib/libmozjs-78.so /usr/lib/pkgconfig/ /usr/lib/pkgconfig/mozjs-78.pc This appears to be the only counterpart path missing when looking at the current lib64 entries with: $ grep -Fnr lib64 etc
* | disable-interpreters.inc: sort pathsLibravatar Kelvin M. Klann2021-02-06
| |
* | add a /usr/share whitelist item for uimLibravatar Anton Shestakov2021-02-05
| | | | | | uim is a multilingual input method framework, so any program that takes user input potentially needs it to work.
* | Add profile for avidemux (#3935)Libravatar Neo000012021-01-31
| | | | | | | | | | | | | | | | | | | | | | * Update disable-programs.inc * Update disable-programs.inc * Update firecfg.config * Create avidemux.profile * Update avidemux.profile
* | Merge pull request #3885 from kmk3/fix-sshLibravatar glitsj162021-01-30
|\ \ | | | | | | ssh: Refactor, fix bugs & harden
| * | disable-common.inc: add missing openssh pathsLibravatar Kelvin M. Klann2021-01-27
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The paths are taken from ssh(1) and sshd(8). $ pacman -Q openssh openssh 8.4p1-2 These are only used by sshd(8), so always blacklist them: * ~/.rhosts: controls remote access to the local machine * ~/.shosts: same as above * ~/.ssh/authorized_keys: same as above * ~/.ssh/authorized_keys2: same as above * ~/.ssh/environment: potentially allows arbitrary command execution on the local machine * ~/.ssh/rc: allows arbitrary command execution on the local machine * /etc/hosts.equiv: system-wide equivalent of ~/.rhosts Note: There are files in /etc/ssh that are equivalent to some of the above ones, but they are already blocked by `blacklist /etc/ssh/*`. Note2: From sshd(8): > If the file ~/.ssh/rc exists, sh(1) runs it after reading the > environment files but before starting the user's shell or command. So even if the user shell is set to /usr/bin/firejail and disable-common.inc is loaded, this patch shouldn't interfere with sshd. This file is actually used by ssh(1), so just mark it read-only: * ~/.ssh/config: allows arbitrary command execution on the remote machine (with e.g.: RemoteCommand) and also defines the connection strength Since version 7.3p1 (released on 2016-08-01), openssh supports including other config files on ssh_config(5)[1][2]. This is the conventional path for storing them[3], so mark it read-only: * ~/.ssh/config.d: same as above P.S. See also the explanation on the commit b5542fc94 ("disable-common.inc: read-only access to ~/.ssh/authorized_keys"), which last touched/added the "Remote access" section. [1]: https://anongit.mindrot.org/openssh.git/commit/?id=dc7990be865450574c7940c9880567f5d2555b37 [2]: https://www.openssh.com/txt/release-7.3 [3]: https://superuser.com/a/1142813
| * | allow-ssh.inc: allow access to ssh-agent(1)Libravatar Kelvin M. Klann2021-01-27
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Leaving it limited to only ssh, ssh-agent and seahorse by default seems unnecessarily restrictive. From ssh(1): > The most convenient way to use public key or certificate > authentication may be with an authentication agent. See ssh-agent(1) > and (optionally) the AddKeysToAgent directive in ssh_config(5) for > more information. $ pacman -Q openssh openssh 8.4p1-2 With ssh-agent(1) running in the background (and with the private key(s) loaded through ssh-add(1)), ssh(1) doesn't need direct access to the actual key pair(s), so you could probably get away with this on allow-ssh.local: ignore noblacklist ${HOME}/.ssh noblacklist ${HOME}/.ssh/config noblacklist ${HOME}/.ssh/config.d noblacklist ${HOME}/.ssh/known_hosts And then this on the profiles of ssh key pair managers, such as seahorse.local: noblacklist ${HOME}/.ssh
| * | allow-ssh.inc: allow /etc/ssh/ssh_configLibravatar Kelvin M. Klann2021-01-27
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This is the system-wide equivalent of ~/.ssh/config. $ pacman -Q openssh openssh 8.4p1-2 Reasons for blacklisting both /etc/ssh and /etc/ssh/* on disable-common.inc: Leave /etc/ssh that way so that profiles without allow-ssh.inc remain unable to see inside of /etc/ssh. And blacklist /etc/ssh/* so that profiles with allow-ssh.inc are able to access only nonblacklisted files inside of /etc/ssh.
| * | etc: add allow-ssh.incLibravatar Kelvin M. Klann2021-01-27
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | And move the scattered `noblacklist ${HOME}/.ssh` entries into it. Command used to find the relevant files: $ grep -Fnr 'noblacklist ${HOME}/.ssh' etc Also, add it to profile.template, as reminded by @rusty-snake at https://github.com/netblue30/firejail/pull/3885#pullrequestreview-567527031
| * | ssh: move auth socket blacklist to disable-common.incLibravatar Kelvin M. Klann2021-01-22
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | That was added on the commit e93fbf3bd ("disable ssh-agent sockets in disable-programs.inc"). Currently, it's the only ssh-related entry on disable-programs.inc. Further, it seems that all the other socket blacklists live on disable-common.inc. Also, even though this socket does not necessarily allow arbitrary command execution on the local machine (like some paths on disable-common.inc do), it could still do so for remote systems. Put it above the "top secret" section, like the terminal sockets are above the terminal server section.
* | | Add gfeeds directory for saved articlesLibravatar rusty-snake2021-01-29
| | |
* | | streamline 'Allow xxx' comments (#3922)Libravatar glitsj162021-01-27
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * add comment: allow python * add comment: allow python * reorder allow comments * fix perl allow comment * add comment: allow python * add comment: allow lua, perl & python * reorder allow comments * add comment: allow python * add comment: allow python * add comment: allow lua, perl & python * fix allow comments * add comment: allow python * add comment: allow python * fix spacing in comments * add comment: allow python * add comment: allow python * fix comment * add comment: allow perl & python * add comment: allow lua & python * add comment: allow lua, perl & python * fix allow comments * add comment: allow perl & python * streamline allow python comments
* | | Merge pull request #3853 from botherder/masterLibravatar netblue302021-01-25
|\ \ \ | | | | | | | | New profile for CoyIM
| * | | Implementing some of the suggested changes from #3853Libravatar Nex2020-12-29
| | |/ | |/|
* | | Update disable-programs.incLibravatar Neo000012021-01-24
| | |
* | | refactor google-earth{-pro} (#3915)Libravatar glitsj162021-01-23
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * refactor google-earth{-pro} blacklisting * fix google-earth-pro.profile I've included all binaries found in the Arch Linux AUR package to private-bin. But I also added a note on ignoring private-bin because I'm not sure what google-earth is doing on other distro's. * unbreak google-earth.profile Not sure why we need grep, ls and sed in private-bin exactly but keeping them around wouldn't hurt too much I guess.
* | | Add profile for guvcviewLibravatar rusty-snake2021-01-18
| | |
* | | Add new allow include allow-bin-sh.incLibravatar rusty-snake2021-01-16
| | | | | | | | | | | | | | | | | | | | | | | | | | | /bin/sh is usually just a symlink to bash. However this is not the case for every distro, debian for example uses dash. bash,dash and sh have a blacklist command in disable-shell.inc. An own allow-*.inc for it enusres usage of all necessary nolacklists. For private-bin sh is enough because it follows symlinks.
* | | new profile: qnapi (#3890)Libravatar glitsj162021-01-13
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * add new profile: qnapi * add new profile: qnapi * Create qnapi.profile * add qnapi configs * Update README.md * Update README.md