From b482f8fa29529e64ec8f4bf0e21f5f568c61737c Mon Sep 17 00:00:00 2001 From: netblue30 Date: Thu, 12 Oct 2017 10:36:33 -0400 Subject: apparmor --- src/man/firejail.txt | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) (limited to 'src/man') diff --git a/src/man/firejail.txt b/src/man/firejail.txt index 83ac12d86..20f2b7f8c 100644 --- a/src/man/firejail.txt +++ b/src/man/firejail.txt @@ -2261,9 +2261,14 @@ commands such as "top" and "ps aux". programs and scripts from user home or other directories writable by the user is not allowed. .br +.br +- Allow access to files only in the following standard directories: /bin, /dev, /etc, /home, /lib*, /media, /mnt, /opt, +/proc, /root, /run, /sbin, /srv, /sys, /tmp, /usr, and /var +.br + .br - Disable D-Bus. D-Bus has long been a huge security hole, and most programs don't use it anyway. -You should have no problems running Chromium or Firefox. +You should have no problems running Chromium or Firefox. This feature is available only on Ubuntu kernels. .TP To enable AppArmor confinement on top of your current Firejail security features, pass \fB\-\-apparmor\fR flag to Firejail command line. You can also include \fBapparmor\fR command in a Firejail profile file. Example: -- cgit v1.2.3-70-g09d2