From 880f2c98a1dee26228530875fc45d54db68ed1c8 Mon Sep 17 00:00:00 2001 From: netblue30 Date: Wed, 25 May 2022 07:36:42 -0400 Subject: Removed IDS feature from the default build. To enable it, use --enable-ids at compile time. --- src/man/firejail.txt | 4 ++++ 1 file changed, 4 insertions(+) (limited to 'src/man/firejail.txt') diff --git a/src/man/firejail.txt b/src/man/firejail.txt index 366a4e061..420a96ab5 100644 --- a/src/man/firejail.txt +++ b/src/man/firejail.txt @@ -820,6 +820,7 @@ Example: .br $ firejail \-\-hosts-file=~/myhosts firefox +#ifdef HAVE_IDS .TP \fB\-\-ids-check Check file hashes previously generated by \-\-ids-check. See INTRUSION DETECTION SYSTEM section for more details. @@ -839,6 +840,7 @@ Initialize file hashes. See INTRUSION DETECTION SYSTEM section for more details. Example: .br $ firejail \-\-ids-init +#endif .TP \fB\-\-ignore=command @@ -3342,6 +3344,7 @@ $ firejail \-\-cat=mybrowser ~/.bashrc .br #endif +#ifdef HAVE_IDS .SH INTRUSION DETECTION SYSTEM (IDS) The host-based intrusion detection system tracks down and audits user and system file modifications. The feature is configured using /etc/firejail/ids.config file, the checksums are stored in /var/lib/firejail/USERNAME.ids, @@ -3399,6 +3402,7 @@ New files and deleted files are also flagged. Currently while scanning the file system, symbolic links are not followed, and files the user doesn't have read access to are silently dropped. The program can also be run as root (sudo firejail --ids-init/--ids-check). +#endif .SH MONITORING Option \-\-list prints a list of all sandboxes. The format -- cgit v1.2.3-70-g09d2