-
Notifications
You must be signed in to change notification settings - Fork 588
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
No access to /tmp if blacklisted paths symlink to it #5338
Comments
|
@birdie-github commented on Aug 23:
That version is from over a year ago and is unsupported by us: Does it happen with 0.9.70 or with the version from master?
I cannot reproduce this on Artix with the current master: $ firejail --quiet --profile=default ls -la /tmp >/dev/null; echo $?
0 |
I've compiled version 0.9.70, the issue persists:
|
Remove this symlinks.
If you want them to be in a tmpfs, you can use firejail's |
Without these symlinks this issue is gone but I'd love to leave everything as is. Looks like I'll be removing these two rules from |
Still it would be great if firejail were a tad more verbose when it detects problems like this.
I guess it could be fixed in a few lines of code. Yes, this is verbose but it will spare a ton of time for users. |
Firejail does what you ask it for:
We are already to complex. This should be added to firejail. If, we could develop a
This can be said about D-Bus, X11, ... as well. |
@birdie-github commented on Aug 28:
Note that there is also So it could be added to firefox-common.local and chromium-common.local.
Does it work with disable-programs.inc as is + By the way, the rules can also be ignored by adding the following commands to
|
This works:
|
Make it more explicit that they do and add an example for each command. Relates to netblue30#5338.
I see now that $ ln -s /tmp ~/.cache/tmp
$ firejail --quiet --noprofile --private-cache \
--blacklist='${HOME}/.cache/tmp' ls /tmp >/dev/null; echo $?
ls: cannot open directory '/tmp': Permission denied
2 To avoid issues with Note that the target directory usually does not even have to exist before Example: $ test -z XDG_RUNTIME_DIR && XDG_RUNTIME_DIR="/run/user/$(id -u)"
$ ln -s "${XDG_RUNTIME_DIR}/.cache/foo" ~/.cache/foo
$ firejail --quiet --noprofile --private-cache \
--blacklist='${HOME}/.cache/foo' ls /tmp >/dev/null; echo $?
0
$ firejail --quiet --noprofile --private-cache \
--blacklist='${HOME}/.cache/foo' ls -l ~/.cache
total 0 And when using symlinks in this way, I'd also suggest blacklisting the target
|
Unlike /tmp it is required to be so IIRC. |
In summary, firejail is working as intended and a workaround for the reported Closing this since there hasn't been any more activity. Feel free to post updates and to request to reopen if you have more questions. |
firejail-0.9.66-3.fc36.x86_64
Relevant debug strings:
This is Fedora 36 with a custom kernel.
I am confused. The documentation makes it look like
/tmp
must be available.The text was updated successfully, but these errors were encountered: