aboutsummaryrefslogtreecommitdiffstats
path: root/src/man
Commit message (Collapse)AuthorAge
* fixed firecfg man page, update READMELibravatar netblue302020-04-02
|
* whitelist globing man pageLibravatar netblue302020-04-01
|
* seccomp: allow defining separate filters for 32-bit archLibravatar Topi Miettinen2020-03-28
| | | | | | | | | | | | | | | | | | | | | System calls (names and numbers) are not exactly the same for 32 bit and 64 bit architectures. Let's allow defining separate filters for 32-bit arch using seccomp.32, seccomp.32.drop, seccomp.32.keep. This is useful for mixed 64/32 bit application environments like Steam and Wine. Implement protocol and mdwx filtering also for 32 bit arch. It's still better to block secondary archs completely if not needed. Lists of supported system calls are also updated. Warn if preload libraries would be needed due to trace, tracelog or postexecseccomp (seccomp.drop=execve etc), because a 32-bit dynamic linker does not understand the 64 bit preload libraries. Closes #3267. Signed-off-by: Topi Miettinen <toiwoton@gmail.com>
* new condition: HAS_NOSOUNDLibravatar rusty-snake2020-03-15
|
* misc thingsLibravatar rusty-snake2020-02-22
| | | | | | - spelling suggestion from @glitsj16 on fda62527 - drop python2 from openshot it never has a python2 version - #3126 note in manpage: cannot combine --private with --private=
* Documentation for DHCP supportLibravatar Kristóf Marussy2020-01-27
|
* Improve --version command exampleLibravatar glitsj162020-01-20
| | | Fixes #3135.
* spelling fixLibravatar Reiner Herrmann2019-12-30
|
* Fix ordering of 'RESTRICTED SHELL'Libravatar glitsj162019-12-15
|
* add HAS_NET conditionalLibravatar smitsohu2019-11-11
|
* add HAS_X11 conditional, disconnect session manager - #2205Libravatar smitsohu2019-10-08
|
* alphabetize man page entriesLibravatar smitsohu2019-10-04
|
* increase socket buffer size for firemon, bug #2700Libravatar netblue302019-09-29
|
* Merge branch 'master' into fix-profile-builderLibravatar netblue302019-09-15
|\
| * update seccomp in man firejailLibravatar rusty-snake2019-09-13
| |
* | Update man page to note that --trace can now take an optional parameter.Libravatar Glenn Washburn2019-08-29
|/
* Merge pull request #2928 from topimiettinen/seccomp-more-groupsLibravatar netblue302019-08-29
|\ | | | | Add further seccomp groups
| * Add further seccomp groupsLibravatar Topi Miettinen2019-08-28
| | | | | | | | Get further seccomp group definitions from systemd.
* | Allow exceptions to seccomp listsLibravatar Topi Miettinen2019-08-25
|/ | | | | | | Prefix ! can be used to make exceptions to system call blacklists and whitelists used by seccomp, seccomp.drop and seccomp.keep. Closes #1366
* various fixes and improvementsLibravatar rusty-snake2019-08-22
| | | | | | | | | | | | - install contrib/syscalls.sh - add GitLab-CI status to README.md - read-only ${HOME}/.cargo/env - move blacklist ${HOME}/.cargo/registry, ${HOME}/.cargo/config to disable-programs - typo in man firejail firejail-profiles firecfg - better descriptions in man firejail-profiles - fixes in man firejail - template descriptions in firejail-profiles
* fix private-bin for tb-starter-wrapper #2863Libravatar rusty-snake2019-08-19
|
* document profile support for allow-debuggers in firejail-profile man page ↵Libravatar Sebastian Hafner2019-07-17
| | | | (#2861)
* man fix (appimage, #2807)Libravatar netblue302019-07-04
|
* Fix typo in man firejail [--x11] (#2785)Libravatar glitsj162019-06-19
|
* template hint in CONTRIBUTING.md & firejail-prof…Libravatar rusty-snake2019-06-04
| | | | | …ile manpage added + some profileprofile fixes
* Grammar fixLibravatar Reiner Herrmann2019-05-29
| | | | (found by lintian)
* Merge pull request #2712 from apmorton/features/private-cwdLibravatar smitsohu2019-05-24
|\ | | | | Add private-cwd option to control working directory within jail
| * Add private-cwd option to control working directory within jailLibravatar Austin Morton2019-05-23
| |
* | Add deterministic-exit-code option to ensure firejail exits with the first ↵Libravatar Austin Morton2019-05-20
|/ | | | childs exit code regardless of the termination ordering of orphaned children
* man pages: add FIREJAIL_QUIETLibravatar smitsohu2019-05-18
|
* dbus: make --nodbus block also system D-Bus socketLibravatar Topi Miettinen2019-05-15
| | | | Signed-off-by: Topi Miettinen <toiwoton@gmail.com>
* update man pages (private-dev, noexec)Libravatar smitsohu2019-05-04
|
* Add a conditional to control DRM/noexec exception for browsersLibravatar Tad2019-04-13
|
* Fixes for man firejail (#2628)Libravatar glitsj162019-03-29
|
* Follow-up on flatpak/snap support (#2601)Libravatar glitsj162019-03-16
| | | | | | | | | | * Remove obsolete snap support from disable-programs.inc * Remove obsolete snap support from pycharm-community.profile * Update RELNOTES to reflect non-existing/dropped flatpak/snap support * Update firejail.txt to reflect flatpak/snap packages are not supported
* Update firejail.txt (#2585)Libravatar glitsj162019-03-13
|
* mdwx: block memfd_createLibravatar Topi Miettinen2019-03-05
| | | | | Some profiles may need adjusting if app uses memfd_create(2) and memory-deny-write-execute was enabled.
* Sort items alphabetically in man firejail (#2479)Libravatar glitsj162019-02-26
|
* documentation updateLibravatar smitsohu2019-02-23
|
* Add machine-id note to man firejail (#2442)Libravatar glitsj162019-02-21
|
* Stress apparmor local overridesLibravatar glitsj162019-02-05
| | | As per discussion on https://github.com/netblue30/firejail/pull/2390, we better use slightly stronger/less optional wording when it comes to where local apparmor overrides need to be done.
* --name reworkLibravatar netblue302019-02-01
|
* removed mincore syscall from default seccomp filterLibravatar netblue302019-01-23
|
* adding mincore syscall to the default seccomp filter and some independent ↵Libravatar netblue302019-01-14
| | | | profiles
* Merge pull request #2297 from smitsohu/patchLibravatar startx20172018-12-17
|\ | | | | enforce nonewprivs instead of seccomp for chroot sandboxes
| * enforce nonewprivs instead of seccomp for chroot sandboxesLibravatar smitsohu2018-12-15
| | | | | | | | | | currently users are able to specify a seccomp filter of their choosing, leaving the real defense to nonewprivs anyway.
* | fix netstats typo in man firejailLibravatar glitsj162018-12-16
|/
* add HAS_NODBUS conditional, ${RUNUSER} makroLibravatar smitsohu2018-12-07
|
* Merge pull request #2276 from smitsohu/tmpfsLibravatar netblue302018-11-28
|\ | | | | refactor private-cache and tmpfs
| * refactor private-cache and tmpfsLibravatar smitsohu2018-11-26
| | | | | | | | | | | | has the immediate benefit that the result of combining --noexec and --tmpfs does not depend on the sequence of the options