aboutsummaryrefslogtreecommitdiffstats
path: root/etc
Commit message (Collapse)AuthorAge
* Fix chromium browsers in firejail 0.9.68Libravatar rusty-snake2022-04-14
| | | | closes #4965
* fix --writable-etcLibravatar netblue302022-04-12
|
* small fixesLibravatar netblue302022-04-10
|
* Merge pull request #5092 from smitsohu/vlcLibravatar smitsohu2022-04-10
|\ | | | | harden vlc
| * harden vlcLibravatar smitsohu2022-04-10
| | | | | | | | | | apparmor doesn't disable D-Bus anymore, so add it back remove memory-deny-write-execute comment, as this also breaks JIT compiled QtQuick nowadays
* | libvirt dnsmasq: more fixes (#5089)Libravatar smitsohu2022-04-10
| | | | | | | | | | | | | | following up ce6f792efd0af09b95050864b71f79c46359fa49 /var/lib/libvirt is blacklisted in disable-common.inc so merely whitelisting the directory is not enough
* | harden dnsmasqLibravatar smitsohu2022-04-10
| | | | | | | | | | private option implies private-cache, so it is safe to remove
* | libvirt dnsmasq fix (#5089)Libravatar smitsohu2022-04-10
| |
* | unbound: fixes, blacklist all of ${RUNUSER}Libravatar smitsohu2022-04-10
| |
* | steam: add HotLine Miami (#5097)Libravatar Kelvin M. Klann2022-04-08
| | | | | | https://store.steampowered.com/app/219150/Hotline_Miami/
* | more snap blacklisting (#5093)Libravatar smitsohu2022-04-04
|/
* teams: drop doubled option (#5087)Libravatar glitsj162022-04-01
|
* Merge pull request #5077 from kmk3/dc-add-pkcs11Libravatar netblue302022-03-29
|\ | | | | disable-common.inc: make ~/.config/pkcs11 read-only
| * disable-common.inc: make ~/.config/pkcs11 read-onlyLibravatar Kelvin M. Klann2022-03-27
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | It looks like it allows arbitrary command execution. From pkcs11.conf(5): > remote: > Instead of loading the PKCS#11 module locally, run the module > remotely. > > Specify a command to run, prefixed with | a pipe. The command > must speak the p11-kit remoting protocol on its standard in > and standard out. For example: > > remote: |ssh user@remote p11-kit remote /path/to/module.so > > Other forms of remoting will appear in later p11-kit releases. Environment: p11-kit 0.24.1-1 on Artix Linux. Currently this entry only exists on whitelist-common.inc, added on commit f74cfd07c ("add p11-kit support - #1646"). With this commit applied, all read-only entries on whitelist-commons.inc are also part of disable-common.inc. See also the discussion on #5069.
* | Merge pull request #5071 from kmk3/add-appimage-dirLibravatar netblue302022-03-29
|\ \ | |/ |/| appimage: blacklist and make ~/Applications dir read-only
| * disable-programs.inc: blacklist ~/Applications dirLibravatar Kelvin M. Klann2022-03-24
| | | | | | | | | | | | | | | | | | | | | | | | | | It is used for storing AppImages. Note that even when blacklisting a directory, it is possible to execute an AppImage from it. For example, the following works: firejail --noprofile --blacklist='${HOME}/Applications' --appimage \ ~/Applications/foo.AppImage While the resulting process does not appear to have access to the blacklisted directory.
| * disable-common.inc: make ~/Applications dir read-onlyLibravatar Kelvin M. Klann2022-03-24
| | | | | | | | | | | | | | | | | | | | This directory is monitored by both appimaged[1] and AppImageLauncher[2]. Also, when opening an AppImage with AppImageLauncher, it may prompt the user to move the AppImage to ~/Applications. [1] https://github.com/AppImage/appimaged/blob/2323f1825ed6abe19f2d3791d81307449692be03/README.md#monitored-directories [2] https://github.com/TheAssassin/AppImageLauncher/wiki/Configuration
* | megaglest.profile: Add allow-lua.inc (#5066)Libravatar NetSysFire2022-03-25
| | | | | | | | | | * megaglest.profile: Add allow-lua.inc * Move comment to line above
* | Fix Hugin profile. (#5072)Libravatar Jose Riha2022-03-25
|/ | | Fixes #5068.
* Merge pull request #5061 from glitsj16/ping-fixesLibravatar netblue302022-03-24
|\ | | | | ping: (extra) hardening
| * ping: fix hardening commentLibravatar glitsj162022-03-21
| |
| * Create ping-hardened.inc.profileLibravatar glitsj162022-03-21
| |
| * ping: extra hardeningLibravatar glitsj162022-03-21
| |
* | nodejs-common: fix noteLibravatar glitsj162022-03-21
| |
* | Create semver.profileLibravatar glitsj162022-03-20
| |
* | Create npx.profileLibravatar glitsj162022-03-20
| |
* | Create node-gyp.profileLibravatar glitsj162022-03-20
| |
* | nodejs-common: add comment & minor hardeningLibravatar glitsj162022-03-20
| |
* | wget: add nvm support commentLibravatar glitsj162022-03-20
| |
* | webui-aria2: add nvm supportLibravatar glitsj162022-03-20
| |
* | webstorm: fix orderingLibravatar glitsj162022-03-20
| |
* | tar: add nvm support commentLibravatar glitsj162022-03-20
| |
* | sha256sum: add nvm support commentLibravatar glitsj162022-03-20
| |
* | nvm: remove profileLibravatar glitsj162022-03-20
| | | | | | [nvm](https://github.com/nvm-sh/nvm) is implemented as a sourced shell function, not an executable binary. Regular sandboxing doesn't work but we can add nvm support to the applications used by it internally (curl, sha256sum, tar & wget).
* | curl: add nvm support commentLibravatar glitsj162022-03-20
| |
* | allow-nodejs.inc: add nvm supportLibravatar glitsj162022-03-20
|/
* ocenaudio hardening (#5056)Libravatar glitsj162022-03-18
| | | | | | | * ocenaudio: blacklist cache dir * ocenaudio: hardenings * ocenaudio: fix protocol comment
* cmake: fix local override & wusc (#5054)Libravatar glitsj162022-03-16
| | | | | * cmake: fix local override & wusc * cmake: another wusc fix
* pip: fixes (#5053)Libravatar glitsj162022-03-15
| | | | | | | | | * pip: fix including local override * pip: allow access to cache The shared build-systems-common.profile (to which pip.profile redirects) blacklists ${HOME}/.cache/pip. Override that here. * pip: add cache support in commented whitelist
* allow-common-devel.inc: add missing java/scala pathsLibravatar Kelvin M. Klann2022-03-14
| | | | | | | | This amends commit f32cb8393 ("Blacklist scala devel stuff", 2022-03-05) / PR #5013. See the following review: https://github.com/netblue30/firejail/pull/5013#pullrequestreview-903794958
* opera fixes (#5041)Libravatar glitsj162022-03-14
| | | | | * opera fixes * disable-common.inc: add blacklist /usr/lib/opera/opera_sandbox
* mupdf refactoring cfr. ↵Libravatar glitsj162022-03-14
| | | | | | | | | | | | | | | | | | | | | | | | | https://github.com/netblue30/firejail/discussions/4993 (#5042) * refactor mupdf * refactor mupdf * refactor mupdf * refactor mupdf * add mupdf-gl blacklist * move history file back to mupdf-gl * refactor mupdf-gl * add no3d to mupdf.profile * add suggestions from review * drop unix from protocol [accumulates] * fix protocol
* minor cleanups, no functional changes (#5040)Libravatar glitsj162022-03-13
| | | | | | | | | * drop redundant noblacklist noblacklist ${HOME}/.vscode-oss already exists in included code.profile * remove newline Nitpick for persistency with other profiles that have the comment about #2624.
* hardening onionshare-gui.profile (#4959)Libravatar glitsj162022-03-13
| | | | | | | * hardening onionshare-gui.profile * add another dbus-user filter to onionshare-gui.profile * harden onionshare
* disable-programs.inc: add ~/.preyLibravatar Kelvin M. Klann2022-03-11
| | | | | This amends commit af8f681c0 ("steam.profile: allow "${HOME}/.prey"", 2022-03-11) / PR #5029.
* Merge branch 'master' of https://github.com/netblue30/firejailLibravatar smitsohu2022-03-11
|\
| * Merge pull request #5013 from rusty-snake/scalaLibravatar netblue302022-03-11
| |\ | | | | | | Blacklist scala devel stuff
| | * Blacklist scala devel stuffLibravatar rusty-snake2022-03-05
| | |
| * | Merge pull request #5017 from TheOneric/fix_steam+protonLibravatar netblue302022-03-11
| |\ \ | | | | | | | | Fix newest Steam client and Proton ≥ 5.13
| | * | steam.profile: fix black windowLibravatar Oneric2022-03-06
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | After the Steam cleint update of the 04th March 2022 the steamwebhelper process now needs to be able to do chroot syscalls to render anything. If not all content tabs in the client will just appear black. fixes: https://github.com/netblue30/firejail/issues/5014