summaryrefslogtreecommitdiffstats
path: root/etc/vlc.profile
Commit message (Collapse)AuthorAge
* automatically fixed all private-{bin,etc} linesLibravatar rusty-snake2019-06-13
|
* add disable-exec.inc to all profiles with apparmor (#2576)Libravatar smitsohu2019-03-12
| | | | | | * add disable-exec.inc to all profiles with apparmor - #2385 #2505 * drop disable-exec.inc from generic electron.profile
* remove nodbus from MPRIS client profilesLibravatar Carlo Abelli2019-02-01
| | | | | | | MPRIS is a D-Bus interface for controlling media players. The nodbus option prevents these players from being controlled through MPRIS. It seems that most of the other media players did not have the nodbus option or it was already commented out.
* Merge pull request #2201 from SkewedZeppelin/u2f-apLibravatar netblue302018-10-17
|\ | | | | Add nou2f to all profiles
| * Add nou2f to all profilesLibravatar Tad2018-10-15
| | | | | | | | - Closes #2194
* | Remove "/etc/firejail/" from all include paths, now that profile_read will ↵Libravatar Glenn Washburn2018-10-17
|/ | | | search for the file.
* Misc profile hardeningLibravatar Tad2018-09-19
|
* Cleanup descriptionsLibravatar Tad2018-08-13
|
* Add descriptions to profiles, pulled from Ubuntu 18.04Libravatar Tad2018-08-13
|
* Add disable-xdg.inc to ~100 profilesLibravatar Tad2018-07-24
|
* cleanupLibravatar smitsohu2018-05-01
| | | | cin profile: 'protocol unix' implies nonewprivs
* VLC fix for Ubuntu 18.04Libravatar netblue302018-04-30
|
* WIP: Blacklist common programming interpreters. (#1837)Libravatar Fred Barclay2018-04-02
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * Use path variable instead of full path when blacklisting devel tools. * Part 1: blacklist python, perl, ruby, etc in disable-interpreters.inc * Part 2: allow access to java as needed * Typo: missing blacklist * Part 3: allow perl access as needed * typo * Add xreader thumbnailer and previewer profiles * Add xplayer audio-preview and thumbnailer profiles * Add atril thumbnailer and previewer profiles * More fixups after adding disable-interpreters.inc * Blacklist javac * More javac noblacklisting * Remove javac from dex2jar, libreoffice, multimc5, and pdfsam profiles * --nodbus, first draft for #1825 * dbus.c * rework akonadi integration the usr.sbin.mysqld-akonadi apparmor profile, enforced by default in ubuntu and debian testing (and probably opensuse), doesn't play well with a number of firejail options. the reason for this is that once the no_new_privs bit is set, apparmor profile transitions are forbidden. enforcing our own apparmor policy instead is also no solution, because these programs don't even start without d-bus. relaxing the kmail profile was necessary so that kmail can fire up akonadi itself, just in case akonadi has not been started earlier already by another program. this is always an issue when kmail is the only installed akonadi client, but there may be more circumstances. for reasons outlined above this doesn't help debian and ubuntu (opensuse?) users though :-/ a brief summary of the seccomp exceptions: chroot is needed for qt webengine, io_prioset for the akonadi indexing agent, io_getevents, io_submit, io_setup are needed for mysqld. when akonadi has an sqlite3 backend, less exceptions to the seccomp filter are necessary, but mysqld is the default. in the future all kontact suite profiles (itm only kmail, knotes) should probably be redirections to akonadi_control, but the issues with apparmor make this somewhat impractical for now (options like 'protocol' couldn't go to akonadi_control.local any more, if current kmail redirected to there). * Add nodbus to some profiles - part 1 * Spotify works with nodbus on Arch * Enable nodbus for keepassx and keepassxc profiles. I've tested on keepassxc but should work for keepassx as well. Settings are not immutable. * recalibrate dbus access, deploy nodbus option see #1822 and #1825. also systematically replaces 'blacklist /run/user/*/bus' with 'nodbus'. with contributions from @Fred-Barclay * various blacklist additions * Add a profile for ncdu, enable private-etc in Steam again, and fixup gnome-recipes * comment nodbus where it interferes with dconf pending further discussion * Add a disabled and extensive private-bin for Steam * Further improve private-bin in steam * comment apparmor, net where they interfere with dconf - #1843 * gnome-calculator fixup * spectre support for clang compiler * spectre clang support * enable/disable dbus handling in /etc/firejail/firejail.config * nodbus man pages, etc. * redirect knotes to kmail, some tweaks * testing * gimp fixup * Even more fixups after adding disable-interpreters.inc * AWS and GCP store credentials in local directories as part of project setup. Configuration for cloud providers is sensitive information; it should be in the default block list. I didn't see profiles for gcloud or awscli, so haven't added any exclusions. boto and kubectl are not provider-specific, but also store credentials for whichever platforms they happen to be being used with. * testing * consolidate makefiles * gitignore * Use path variable instead of full path when blacklisting devel tools. * Part 1: blacklist python, perl, ruby, etc in disable-interpreters.inc * Part 2: allow access to java as needed * Typo: missing blacklist * Part 3: allow perl access as needed * typo * More fixups after adding disable-interpreters.inc * Blacklist javac * More javac noblacklisting * Remove javac from dex2jar, libreoffice, multimc5, and pdfsam profiles * Cleanup rebase leftovers * imagej doesn't need javac access * Add cc to blacklisted compilers * Use wildcards when blacklisting some gcc paths * Blacklist lua in disable-interpreters * Correct blacklist for node.js * Fred Barclay note: some of these commits (all of the ones that don't affect files inside etc/) aren't mine but were added during a rebase + squash
* redirect knotes to kmail, some tweaksLibravatar smitsohu2018-03-30
|
* Merge branch 'master' into nodbusLibravatar smitsohu2018-03-30
|\
| * various blacklist additionsLibravatar smitsohu2018-03-28
| |
* | recalibrate dbus access, deploy nodbus optionLibravatar smitsohu2018-03-28
|/ | | | | | | see #1822 and #1825. also systematically replaces 'blacklist /run/user/*/bus' with 'nodbus'. with contributions from @Fred-Barclay
* Move apparmor option to the top of the options list in all profilesLibravatar Tad2018-03-17
|
* man page, README.md, RELNOTESLibravatar netblue302018-02-21
|
* matching noblacklist in profile files with blacklist in disable-programs.incLibravatar netblue302017-11-02
|
* fix vlc profileLibravatar netblue302017-10-25
|
* Tighten multiple profiles.Libravatar Fred-Barclay2017-10-04
| | | | | This adds whitelist-var-common, machine-id, memory-deny-write-execute, and noexec home and tmp when possible.
* whitelisting /varLibravatar netblue302017-09-17
|
* harmonize vlc and cvlcLibravatar smitsohu2017-08-22
|
* various profile fixesLibravatar smitsohu2017-08-22
|
* Fix comments in 88 profilesLibravatar Tad2017-08-07
| | | | There may actually be some other comments that were removed, but the bulk have been restored
* Unify all profilesLibravatar Tad2017-08-07
|
* various profile fixes (#1433)Libravatar Vladimir Schowalter2017-08-06
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * calibre: add netlink protocol (FB note: removed before merge) calibre started without netlink protocol throws following error in console: Exception in thread Thread-8: Traceback (most recent call last): File "/usr/lib/python2.7/threading.py", line 801, in __bootstrap_inner self.run() File "/usr/lib/calibre/calibre/utils/mdns.py", line 43, in run _all_ip_addresses = self.get_all_ips() File "/usr/lib/calibre/calibre/utils/mdns.py", line 27, in get_all_ips for x in netifaces.interfaces(): OSError: [Errno 95] Operation not supported * mpv: add nogroups, tracelog, ipc-namespace, private-dev I used testes all above options and didn't noticed any breakage. * qbittorrent: add netlink protocol, private-etc Netlink protocol is needed if user select to bind specific network interface in config. Otherwise it throws an error in qbittorent log: The network interface defined is invalid: tun0 Example private-etc is added but commented out by default. It's tested but as there are many different system configurations users should enable it manually. * vlc: disable memory-deny-write-execute With memory-deny-write-execute vlc freezes after loading video file. According to https://github.com/VladimirSchowalter20/firejail/commit/b18f42ab0236de7eed5888f43ba36cdaf990cbca memory-deny-write-execute is similar to PAX mprotect feature and linked github project explicitly disables that feature for vlc binary, see https://github.com/copperhead/paxd-archive/commit/deb39e0b91996e2e9c7917b3543030880cd476f4 * Update vlc.profile * wine: add nogroups Nogroups should be safe addition for wine * wireshark: allow users to run wireshark as non-root Wireshark can be run unprivileged when user is part of wireshark group. Unfortunately enabling nogroups,nonewprivs and seccomp will break it with permissions errors. Also added example private-etc option which is commented out by default for now. * cosmetic fix * mpv: comment out ipc-namespace for now As requested in review https://github.com/netblue30/firejail/pull/1433#discussion_r131550515 * calibre: disable netlink protocol It throws an error but actual breakage isn't observed for now.
* Initial adding of memory-deny-write-execute to profilesLibravatar Tad2017-08-02
| | | | | | | | - mdwe breaks most vm-based languages so python/java/javascript and some mono programs are not compatible - mdwe also breaks most 3d accelerated programs such as 3d games - mdwe is similar to PaX's mprotect meaning PaX flag managers can be used as reference -- See https://github.com/copperhead/paxd-archive/blob/master/paxd.conf -- See https://github.com/nning/linux-pax-flags
* Uncomment private-dev for vlc profile.Libravatar Fred Barclay2017-06-15
| | | | Since private-dev now allows video devices, we can probably enable private-dev in the profile.
* added /etc/firejail/globals.local for global customizationsLibravatar netblue302017-05-23
|
* Fix VLC GUI artifacts #1277Libravatar Tad2017-05-17
|
* Harden more profilesLibravatar Tad2017-04-17
|
* Harden 19 more profilesLibravatar Tad2017-04-15
|
* added Geeqie profileLibravatar netblue302017-03-05
|
* persistent support for all profile filesLibravatar netblue302017-02-09
|
* profile mergesLibravatar netblue302017-01-20
|
* bugfix: crashing vlc when pressing Ctrl-OLibravatar netblue302016-11-09
|
* vlc profile fixLibravatar netblue302016-10-09
|
* tested and stableLibravatar Fred-Barclay2016-09-01
|
* tightened vlcLibravatar Fred-Barclay2016-08-05
|
* private-bin conversionLibravatar netblue302016-06-10
|
* private-bin conversionLibravatar netblue302016-06-10
|
* merged Various #542 pull request from Fred-BarclayLibravatar netblue302016-05-31
|
* profiles: Add nonewprivs where sensibleLibravatar The Fox in the Shell2016-05-25
|
* delete blacklist wine from profilesLibravatar avoidr2016-04-12
|
* introducing disable-passwdmgr.incLibravatar netblue302016-03-28
|
* consolidated disable-terminals into disable-commonLibravatar netblue302016-03-27
|
* consolidating disable-mgmt and disable-sercret into disable-commonLibravatar netblue302016-03-26
|
* profile workLibravatar netblue302016-03-26
|