From e8d31279d489dc09343b0c01a807c54dbb1c6ed1 Mon Sep 17 00:00:00 2001 From: rusty-snake <41237666+rusty-snake@users.noreply.github.com> Date: Fri, 11 Dec 2020 17:03:56 +0100 Subject: Create firejail-welcome.s fix #3797 -- Get ride of all these u2f and drm issues --- RELNOTES | 1 + contrib/firejail-welcome.sh | 119 ++++++++++++++++++++++++++++++++++++++++++++ 2 files changed, 120 insertions(+) create mode 100755 contrib/firejail-welcome.sh diff --git a/RELNOTES b/RELNOTES index 9fa72d1d4..4eda50bc8 100644 --- a/RELNOTES +++ b/RELNOTES @@ -2,6 +2,7 @@ firejail (0.9.65) baseline; urgency=low * allow --tmpfs inside $HOME for unprivileged users * --disable-usertmpfs compile time option * allow AF_BLUETOOTH via --protocol=bluetooth + * Setup guide for new users: contrib/firejail-welcome.sh * new profiles: spectacle, chromium-browser-privacy, gtk-straw-viewer * new profiles: gtk-youtube-viewer, gtk2-youtube-viewer, gtk3-youtube-viewer * new profiles: straw-viewer, lutris, dolphin-emu, authenticator-rs diff --git a/contrib/firejail-welcome.sh b/contrib/firejail-welcome.sh new file mode 100755 index 000000000..21425562d --- /dev/null +++ b/contrib/firejail-welcome.sh @@ -0,0 +1,119 @@ +#!/bin/bash + +# This file is part of Firejail project +# Copyright (C) 2014-2020 Firejail Authors +# License GPL v2 + +export LANG=en_US.UTF8 + +zenity --title=firejail-welcome.sh --text-info --width=750 --height=500 <.local in ~/.config/firejal. + +Firejails own configuration can be found at /etc/firejail/firejail.config. + +Please note that running this script a second time can set new options, but does not unset options +set in a previous run. + +Webiste: https://firejail.wordpress.com +Bug-Tracker: https://github.com/netblue30/firejail/issues +Documentation: +- https://github.com/netblue30/firejail/wiki +- https://github.com/netblue30/firejail/wiki/Frequently-Asked-Questions +- https://firejail.wordpress.com/documentation-2 +- man:firejail(1) and man:firejail-profile(5) + +PS: If you have any improvements for this script, open a issues or pull request. +EOM +[[ $? -eq 1 ]] && exit 0 + +sed_scripts=() + +read -r -d $'\0' MSG_Q_BROWSER_DISABLE_U2F <Should browsers be allowed to access u2f hardware? +EOM + +read -r -d $'\0' MSG_Q_BROWSER_ALLOW_DRM <Should browsers be able to play DRM content? + +\$HOME is noexec,nodev,nosuid by default for the most sandboxes. This means that executing ELFs which are located in \$HOME, +is forbidden, the setuid attribute on files is ignored and device files inside \$HOME don't work. Browsers install proprietary +DRM plug-ins such as Widevine under \$HOME by default. In order to use them, \$HOME must be mounted exec inside the sandbox to +allow there execution. Clearly, this may help an attacker to start malicious code. + +NOTE: Other software written in an interpreter language such as bash, python or java can always started from \$HOME. + +TIPP: If /home has its own partition, you can mount it nodev,nosuid for all programs. +EOM + +read -r -d $'\0' MSG_L_ADVANCED_OPTIONS <Should the most programs started in firejail by default? +EOM + +read -r -d $'\0' MSG_I_ROOT_REQUIRED <