Replies: 4 comments 16 replies
-
It depends whether there is a
These programs that do not run as your user can not use firejail. Therefore it does not matter what the profile behaviour is.
|
Beta Was this translation helpful? Give feedback.
-
FWIW, |
Beta Was this translation helpful? Give feedback.
-
Additionally, I can't seem to now execute anything in firejail at all. $ firejail kate
Reading profile /etc/firejail/kate.profile
Reading profile /etc/firejail/allow-common-devel.inc
Reading profile /etc/firejail/disable-common.inc
Reading profile /etc/firejail/disable-exec.inc
Reading profile /etc/firejail/disable-programs.inc
Reading profile /etc/firejail/whitelist-run-common.inc
Reading profile /etc/firejail/whitelist-var-common.inc
Parent pid 8528, child pid 8529
Warning: /sbin directory link was not blacklisted
Warning: /usr/sbin directory link was not blacklisted
Warning: not remounting /run/user/1000/doc
Warning: cleaning all supplementary groups
Child process initialized in 96.92 ms
Error: execute permission denied for /usr/local/bin/kate
Error: no suitable kate executable found
Parent is shutting down, bye... $ firejail firefox
Reading profile /etc/firejail/firefox.profile
Reading profile /etc/firejail/whitelist-usr-share-common.inc
Reading profile /etc/firejail/firefox-common.profile
Reading profile /etc/firejail/disable-common.inc
Reading profile /etc/firejail/disable-devel.inc
Reading profile /etc/firejail/disable-exec.inc
Reading profile /etc/firejail/disable-interpreters.inc
Reading profile /etc/firejail/disable-proc.inc
Reading profile /etc/firejail/disable-programs.inc
Reading profile /etc/firejail/whitelist-common.inc
Reading profile /etc/firejail/whitelist-run-common.inc
Reading profile /etc/firejail/whitelist-runuser-common.inc
Reading profile /etc/firejail/whitelist-var-common.inc
Seccomp list in: !chroot, check list: @default-keep, prelist: unknown,
Parent pid 9577, child pid 9581
Warning: An abstract unix socket for session D-BUS might still be available. Use --net or remove unix from --protocol set.
Warning: /sbin directory link was not blacklisted
Warning: /usr/sbin directory link was not blacklisted
Seccomp list in: !chroot, check list: @default-keep, prelist: unknown,
Warning: cleaning all supplementary groups
Warning: Replacing profile instead of stacking it. It is a legacy behavior that can result in relaxation of the protection. It is here as a temporary measure to unbreak the software that has been broken by switching to the stacking behavior.
Child process initialized in 230.16 ms
Error: execute permission denied for /usr/local/bin/firefox
Error: no suitable firefox executable found
$ ls -al /usr/local/bin/
total 20
drwxr-xr-x 2 root root 4096 19. Aug 07:09 .
drwxr-xr-x 11 root root 4096 17. Mär 2023 ..
-rw-r--r-- 1 root root 175 25. Mai 2023 {}
lrwxrwxrwx 1 root root 17 19. Aug 07:09 akonadi_control -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 ark -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 audacity -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 baloo_filemetadata_temp_extractor -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 bleachbit -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 chromium -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 clipgrab -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 conplay -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 cvlc -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 desktopeditors -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 digikam -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 discord -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 display -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 dnscrypt-proxy -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 dnsmasq -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 enchant-2 -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 enchant-lsmod-2 -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 exiftool -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 ffplay -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 ffprobe -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 firefox -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 gapplication -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 ghb -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 gimp -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 gimp-2.10 -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 img2txt -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 kate -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 kcalc -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 kdenlive -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 keepassxc -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 keepassxc-cli -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 keepassxc-proxy -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 kmail -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 kwrite -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 mediainfo -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 meld -> /usr/bin/firejail
-rwxr-xr-x 1 root root 1380 16. Feb 2024 mine_ac.sh
-rwxr-xr-x 1 root root 1373 16. Feb 2024 mine_battery.sh
lrwxrwxrwx 1 root root 17 19. Aug 07:09 mpg123 -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 mpg123-id3dump -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 mpg123-strip -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 mpv -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 obs -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 okular -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 out123 -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 patch -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 pavucontrol-qt -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 pdftotext -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 ping -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 qbittorrent -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 qt-faststart -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 secret-tool -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 skanlite -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 soundconverter -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 spectacle -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 ssh -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 strawberry -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 strings -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 teams -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 telegram-desktop -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 tshark -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 viewnior -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 vlc -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 wget -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 wireshark -> /usr/bin/firejail
lrwxrwxrwx 1 root root 17 19. Aug 07:09 yt-dlp -> /usr/bin/firejail $ groups
libvirt realtime video storage render audio wheel usernamehere firejail $ ls -l /usr/bin/firejail:
-rwsr-x--- 1 root firejail 450224 1. Mai 17:09 /usr/bin/firejail |
Beta Was this translation helpful? Give feedback.
-
Running telegram-desktop via konsole will automatically firejail it. |
Beta Was this translation helpful? Give feedback.
-
I just installed firejail and I have followed the advice to make firejail only to be executable by users added to the firejail group.
See: https://wiki.archlinux.org/title/Firejail#Hardening_Firejail
Now this would mean, that any program that is configured to run by a custom user (e.g. dnscrypt-proxy, emby-server, syncthing,...) will not be run by firejail anymore unless added to the firejail group?
This also means, that the firejail default of "run anything that does not have a custom.profile file with a standard.profile file" will not be working anymore for such programs which run not as my own user?
This actually opens another security hole by potentially letting some programs run without firejail?
Thanks!
Beta Was this translation helpful? Give feedback.
All reactions