From 37032636d46d3c592cbec1ae0a5781dfa4176d2a Mon Sep 17 00:00:00 2001 From: netblue30 Date: Tue, 19 Apr 2022 08:09:51 -0400 Subject: resurecting welcome.sh --- contrib/firejail-welcome.sh | 128 -------------------------------------------- 1 file changed, 128 deletions(-) delete mode 100755 contrib/firejail-welcome.sh (limited to 'contrib') diff --git a/contrib/firejail-welcome.sh b/contrib/firejail-welcome.sh deleted file mode 100755 index c9b6c450b..000000000 --- a/contrib/firejail-welcome.sh +++ /dev/null @@ -1,128 +0,0 @@ -#!/bin/bash - -# This file is part of Firejail project -# Copyright (C) 2020-2022 Firejail Authors -# License GPL v2 - -if ! command -v zenity >/dev/null; then - echo "Please install zenity." - exit 1 -fi -if ! command -v sudo >/dev/null; then - echo "Please install sudo." - exit 1 -fi - -export LANG=en_US.UTF8 - -zenity --title=firejail-welcome.sh --text-info --width=750 --height=500 <.local in ~/.config/firejal. - -Firejail's own configuration can be found at /etc/firejail/firejail.config. - -Please note that running this script a second time can set new options, but does not unset options -set in a previous run. - -Website: https://firejail.wordpress.com -Bug-Tracker: https://github.com/netblue30/firejail/issues -Documentation: -- https://github.com/netblue30/firejail/wiki -- https://github.com/netblue30/firejail/wiki/Frequently-Asked-Questions -- https://firejail.wordpress.com/documentation-2 -- man:firejail(1) and man:firejail-profile(5) - -PS: If you have any improvements for this script, open an issue or pull request. -EOM -[[ $? -eq 1 ]] && exit 0 - -sed_scripts=() - -read -r -d $'\0' MSG_Q_BROWSER_DISABLE_U2F <Should browsers be allowed to access u2f hardware? -EOM - -read -r -d $'\0' MSG_Q_BROWSER_ALLOW_DRM <Should browsers be able to play DRM content? - -\$HOME is noexec,nodev,nosuid by default for the most sandboxes. This means that executing programs which are located in \$HOME, -is forbidden, the setuid attribute on files is ignored and device files inside \$HOME don't work. Browsers install proprietary -DRM plug-ins such as Widevine under \$HOME by default. In order to use them, \$HOME must be mounted exec inside the sandbox to -allow their execution. Clearly, this may help an attacker to start malicious code. - -NOTE: Other software written in an interpreter language such as bash, python or java can always be started from \$HOME. - -HINT: If /home has its own partition, you can mount it nodev,nosuid for all programs. -EOM - -read -r -d $'\0' MSG_L_ADVANCED_OPTIONS <Should most programs be started in firejail by default? -EOM - -read -r -d $'\0' MSG_I_ROOT_REQUIRED <