Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Permit disabling/whitelisting features system-wide #511

Closed
KellerFuchs opened this issue May 12, 2016 · 4 comments
Closed

Permit disabling/whitelisting features system-wide #511

KellerFuchs opened this issue May 12, 2016 · 4 comments
Labels
information_old (Deprecated; use "doc-todo" or "needinfo" instead) Information was/is required

Comments

@KellerFuchs
Copy link
Contributor

Currently, it is problematic for an administrator to install firejail in a multiuser environment, as there is no way to prevent users from using problematic features (which aren't problematic on a local, single-user computer, usually).

For instance:

  • interface, ip, ip6 and iprange all allow the user to configure network interfaces;
  • net lets a user “grab” a new IP on the local network: in some circumstances (network using routable addresses, colocation, ...), this is highly undesirable [0].

The simplest way I can see to handle that is to let the sysadmin specify either a whitelist or a blacklist of features in a dedicated file under /etc/firejail. Special care must be taken to avoid features such as private-etc being used to fool firejail into ignoring those restrictions.

[0] Some providers have trigger-happy automation that would consider it an IP-spoofing attempt and it would lead to the server being immediately shut down.

@netblue30
Copy link
Owner

I'll have a new firejail version out in a few days. For now you can grab the code from git. The new version fixes this problem by using a run-time configuration file: /etc/firejail/firejail.config. Among other things, it allows the admin to disable networking. This is the link in git: https://github.com/netblue30/firejail/blob/master/etc/firejail.config

@netblue30 netblue30 added the information_old (Deprecated; use "doc-todo" or "needinfo" instead) Information was/is required label May 12, 2016
@KellerFuchs
Copy link
Contributor Author

@netblue30 I indeed didn't notice this was already possible in the current git version.

Sorry for the spurious issue.

@netblue30
Copy link
Owner

No problem! If you need something else to be disabled, I can add support easily.

@KellerFuchs
Copy link
Contributor Author

Thanks a lot.

I will reopen the issue if I find features that are problematic and that you don't (yet) support blocking.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
information_old (Deprecated; use "doc-todo" or "needinfo" instead) Information was/is required
Projects
None yet
Development

No branches or pull requests

2 participants