From 214b62cebecab39340b523880cc44994f343244b Mon Sep 17 00:00:00 2001 From: Aleksey Manevich Date: Sat, 10 Sep 2016 21:59:20 +0300 Subject: update man --- src/man/firejail-profile.txt | 11 +++++++++++ src/man/firejail.txt | 7 +++++++ 2 files changed, 18 insertions(+) (limited to 'src') diff --git a/src/man/firejail-profile.txt b/src/man/firejail-profile.txt index 51b45cd10..d4ab0af55 100644 --- a/src/man/firejail-profile.txt +++ b/src/man/firejail-profile.txt @@ -267,6 +267,17 @@ There is no root account (uid 0) defined in the namespace. .TP \fBx11 Enable X11 sandboxing. +.TP +\fBx11 xpra +Enable X11 sandboxing with xpra. +.TP +\fBx11 xephyr +Enable X11 sandboxing with xephyr. +.TP +\fBx11 block +Blacklist /tmp/.X11-unix directory, ${HOME}/.Xauthority and file specified in ${XAUTHORITY} enviroment variable. +Remove DISPLAY and XAUTHORITY enviroment variables. +Stop with error message if X11 abstract socket will be accessible in jail. .SH Resource limits, CPU affinity, Control Groups These profile entries define the limits on system resources (rlimits) for the processes inside the sandbox. diff --git a/src/man/firejail.txt b/src/man/firejail.txt index a5d3623b6..c05c8e201 100644 --- a/src/man/firejail.txt +++ b/src/man/firejail.txt @@ -1672,6 +1672,13 @@ Example: .br $ firejail \-\-x11=xephyr --net=eth0 openbox +.TP +\fB\-\-x11=block +Blacklist /tmp/.X11-unix directory, ${HOME}/.Xauthority and file specified in ${XAUTHORITY} enviroment variable. +Remove DISPLAY and XAUTHORITY enviroment variables. +Stop with error message if X11 abstract socket will be accessible in jail. +.br + .TP \fB\-\-zsh Use /usr/bin/zsh as default user shell. -- cgit v1.2.3-54-g00ecf