Skip to content

Commit

Permalink
README/README.md
Browse files Browse the repository at this point in the history
  • Loading branch information
netblue30 committed Aug 30, 2022
1 parent 0fcb576 commit 796fa09
Show file tree
Hide file tree
Showing 2 changed files with 67 additions and 22 deletions.
1 change: 1 addition & 0 deletions README
Original file line number Diff line number Diff line change
Expand Up @@ -43,6 +43,7 @@ Maintainer:
Committers
- chiraag-nataraj (https://github.com/chiraag-nataraj)
- crass (https://github.com/crass)
- ChrysoliteAzalea (https://github.com/ChrysoliteAzalea)
- curiosityseeker (https://github.com/curiosityseeker)
- glitsj16 (https://github.com/glitsj16)
- Fred-Barclay (https://github.com/Fred-Barclay)
Expand Down
88 changes: 66 additions & 22 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -214,7 +214,7 @@ Milestone page: https://github.com/netblue30/firejail/milestone/1
$ firejail --restrict-namespaces=user,net
`````

#### Support for custom AppArmor profiles
### Support for custom AppArmor profiles

`````
--apparmor
Expand All @@ -228,6 +228,50 @@ Milestone page: https://github.com/netblue30/firejail/milestone/1
kernel. For more information, please see APPARMOR section be‐
`````

### Landlock support - EXPERIMENTAL
For the next release (0.9.72), landlock support is experimental. It is disabled in the normal build
or in the executable archives we provide. It will be "officially" released
in 0.9.74, sometime early next year. For now, use --enable-landlock durring software compile:
`````
$ ./configure --enable-landlock
`````
The functionality is segragated with ifdefs in the code, at times it might not even compile!
Work in progress, the interface described in the man page below could change.
`````
--landlock
Create a Landlock ruleset (if it doesn't already exist) and add
basic access rules to it. See LANDLOCK section for more informa‐
tion.
--landlock.proc=no|ro|rw
Add an access rule for /proc directory (read-only if set to ro
and read-write if set to rw). The access rule for /proc is added
after this directory is set up in the sandbox. Access rules for
/proc set up with other Landlock-related command-line options
have no effect.
--landlock.read=path
Create a Landlock ruleset (if it doesn't already exist) and add
a read access rule for path.
--landlock.write=path
Create a Landlock ruleset (if it doesn't already exist) and add
a write access rule for path.
--landlock.special=path
Create a Landlock ruleset (if it doesn't already exist) and add
a permission rule to create FIFO pipes, Unix domain sockets and
block devices beneath given path.
--landlock.execute=path
Create a Landlock ruleset (if it doesn't already exist) and add
an execution permission rule for path.
Example:
$ firejail --landlock.read=/ --landlock.write=/home --land‐
lock.execute=/usr
`````

### Profile Statistics

A small tool to print profile statistics. Compile and install as usual. The tool is installed in /usr/lib/firejail directory.
Expand All @@ -238,30 +282,30 @@ No include .local found in /etc/firejail/noprofile.profile
Warning: multiple caps in /etc/firejail/transmission-daemon.profile
Stats:
profiles 1191
include local profile 1190 (include profile-name.local)
include globals 1164 (include globals.local)
blacklist ~/.ssh 1063 (include disable-common.inc)
seccomp 1082
capabilities 1185
noexec 1070 (include disable-exec.inc)
noroot 991
memory-deny-write-execute 267
apparmor 710
private-bin 689
private-dev 1041
private-etc 539
profiles 1196
include local profile 1195 (include profile-name.local)
include globals 1169 (include globals.local)
blacklist ~/.ssh 1067 (include disable-common.inc)
seccomp 1087
capabilities 1190
noexec 1075 (include disable-exec.inc)
noroot 995
memory-deny-write-execute 269
apparmor 713
private-bin 695
private-dev 1045
private-etc 542
private-lib 70
private-tmp 915
whitelist home directory 573
whitelist var 855 (include whitelist-var-common.inc)
whitelist run/user 1159 (include whitelist-runuser-common.inc
private-tmp 918
whitelist home directory 575
whitelist var 858 (include whitelist-var-common.inc)
whitelist run/user 1164 (include whitelist-runuser-common.inc
or blacklist ${RUNUSER})
whitelist usr/share 628 (include whitelist-usr-share-common.inc
net none 403
dbus-user none 673
whitelist usr/share 630 (include whitelist-usr-share-common.inc
net none 404
dbus-user none 677
dbus-user filter 123
dbus-system none 833
dbus-system none 837
dbus-system filter 12
```

Expand Down

0 comments on commit 796fa09

Please sign in to comment.