From 19427f0f6102946b56f5fbf3d11c5e5c38043fa7 Mon Sep 17 00:00:00 2001 From: netblue30 Date: Sun, 8 Nov 2015 11:31:39 -0500 Subject: 0.9.34 released --- README.md | 71 --------------------------------------------------------------- 1 file changed, 71 deletions(-) (limited to 'README.md') diff --git a/README.md b/README.md index 5e39b8765..ecae2d38a 100644 --- a/README.md +++ b/README.md @@ -34,74 +34,3 @@ FAQ: https://l3net.wordpress.com/projects/firejail/firejail-faq/ -## New features in the development version - -### Whitelisting in default Firefox profile - -The next release will bring in default whitelisting for Firefox files and folders under /home/user. -If you start the sandbox without any other options, this is what you'll get: - -![Whitelisted home directory](firefox-whitelist.png?raw=true) - -The code is located in etc/firefox.inc file: - -````` -whitelist ~/.mozilla -whitelist ~/Downloads -whitelist ~/dwhelper -whitelist ~/.zotero -whitelist ~/.lastpass -whitelist ~/.gtkrc-2.0 -whitelist ~/.vimperatorrc -whitelist ~/.vimperator -whitelist ~/.pentadactylrc -whitelist ~/.pentadactyl -````` - -I intend to bring in all files and directories used by Firefox addons and plugins. So far I have -[Video DownloadHelper](https://addons.mozilla.org/en-US/firefox/addon/video-downloadhelper/), -[Zotero](https://www.zotero.org/download/), -[LastPass](https://addons.mozilla.org/en-US/firefox/addon/lastpass-password-manager/), -[Vimperator](https://addons.mozilla.org/en-US/firefox/addon/vimperator/) -and [Pentadactyl](http://5digits.org/pentadactyl/) -If you're using anything else, please let me know. - -### Whitelisting in default Chromium profile - -![Whitelisted home directory](chromium-whitelist.png?raw=true) - -### --ignore option - -Ignore commands in profile files. Example: -````` -$ firejail --ignore=seccomp wine -````` - -### --protocol option - -Enable protocol filter. It is based on seccomp and it filters the first argument to socket system call. -If the value is not recognized, seccomp will kill the process. -Valid values: unix, inet, inet6, netlink and packet. - -Example: -````` -$ firejail --protocol=unix,inet,inet6 -````` - -"unix" describes the regular Unix socket connections, -and "inet" and "inet6" describe the regular IPv4 and IPv6 traffic. Most GUI applications need "unix,inet,inet6". "netlink" is the protocol -used to talk to Linux kernel. You'll only need this for applications such as [iproute2](http://www.linuxfoundation.org/collaborate/workgroups/networking/iproute2) -used in system administration, and "packet" is used by sniffers to talk directly with the Ethernet layer. - -Protocol filter is enabled in all default security profiles for GUI applications ("protocol unix,inet,inet6"). - -### Dual i386/amd64 seccomp filter - ---seccomp option now installs a dual i386/amd64 default filter. -32bit applications, such as Skype, running on regular 64bit computers, are protected by i386 seccomp filter. - -### New security profiles - -Steam, Skype, Wine. The dual seccomp filter is enabled by default for these applications. - - -- cgit v1.2.3-54-g00ecf