1. Deal with .purple directory. It holds the confiig files for pidgin 2. Startup warnings on Arch Linux: (all fine here) $ ./firejail Parent pid 2495, child pid 2496 Child process initialized $ (warnings) $ ./firejail --overlay Parent pid 2500, child pid 2501 OverlayFS configured in /home/ablive/.firejail/2500 directory Warning: /var/lock not mounted Warning: cannot find /var/run/utmp Warning: failed to unmount /sys Child process initialized $ (warnings) $ ./firejail --chroot=/media/mylinux Parent pid 2503, child pid 2504 Warning: cannot find /var/run/utmp Dropping all Linux capabilities and enforcing default seccomp filter Warning: failed to unmount /sys Child process initialized $ 3. Remove private.keep in 0.9.34 release (deprecated in 0.9.30) 4. Remove exclude-token from profile include in 0.9.34 (deprecated in 0.9.30) 5. Add IRC clients: KVIrc (KDE), BitchX (CLI), Smuxi, Konversation (KDE), HexChat, Irssi (CLI), WeeChat (CLI) RSS: Liferea, akregator (KDE), newsbeuter (CLI), rawdog, 6. add kexec_file_load to default seccomp filter 7. Tests not working on Arch: profile_syntax.exp (profile syntax) fs_chroot.exp (chroot as user) private-etc.exp 8. Disable /dev/tcp in bash. Compiled time: --enable-net-redirections, --disable-net-redirections ksh and zsh seem to have it. Tests: a) cat /dev/tcp/www.google.com/80 echo -e "GET / HTTP/1.1\r\nhost: http://www.google.com\r\nConnection: close\r\n\r\n" >&3 cat <&3 c) A list of attacks http://www.lanmaster53.com/2011/05/7-linux-shells-using-built-in-tools/ 9. protocol filter: AF_UNIX, AF_INET, AF_INET6, AF_NETLINK, AF_PACKET // Create a raw IP socket with UDP protocol sd = socket(PF_INET, SOCK_RAW, IPPROTO_UDP); // open a raw ethernet socket s = socket(AF_PACKET, SOCK_DGRAM, htons(ETHERTYPE_IP));