I took the installation order on the official nim website. please note that i have installed the latest version of firejail (0.9.70) and the result is the same. just for information. thank you for your excellent work.
On Linux I found njsail or firejail which help with process isolations. That means, once a logged-in user starts a process in the incoming connection to read out the data, it is wrapped in such sandbox commands to ensure he can't break out of his "user-directory".
Thanks, xerxes_. Yes, I've tried xephyr. You're right that it's more lightweight, but it's also a lot more fiddly to get things like randr working, plus windows don't interact seamlessly with other windows on the desktop (of course this can also be a positive if you want clearer mental separation between the two X servers). Thanks again.
When I run the launcher, the "firejailed" Firefox starts and runs correctly but the icon that is displayed in the window overview and in the task bar (or dock) is the standard Firefox icon (orange/yellow) not the blue one I specified.
It has practically access to everything on the computer, but the network interface is controlled. Since firejail is based on cgroups, all processes and subprocesses are collectively subject to the network bandwidth limit.
I installed firejail ( both the 15.1 and 15.2 have the wrong permissions and need fixing to work ) but you have to sudo chmod /usr/bin/firejail 4755 for it to work on 15.2 and 15.1.
If you want the 15.1 version it is here:
_Leap_15.1/
There is a one-click for 15.2 and Tumbleweed.
Now that Steam is fully installed, we need a convenient way to start Steam inside Firejail.Conceptually this is a two-step process: First start the Firejail by invoking firejail --private=steam_jail.Then inside the Firejail, run ./steam to start up Steam.But those two actions can also be done in a single command:
Firejail is a command-line tool. For the most basic usage, you simple invoke it against any which program youwant, like firejail firefox. And then, the program should start in its isolated environment. Firejail reads itsdefault sandboxing rules from the disk, which define what the application can do, including directories andfiles it can touch.
If you're keen on making your own rules and blacklists and setting up Firejail the way you like it, then yousearch enlightenment under /etc/firejail. Much like editing EMET XML files onyour own. Be careful and patient. And remember, things may only break a year from now, long after you'veforgotten about your sandboxing.
Ok. I give up. It makes me sad, but I have switched to Google Chrome for my browser. It runs in firejail whereas I cannot get Firefox, my long-term browser, to work properly without specifying --noprofile. Since I do not know what sort of isolation this gives the browser, I do not feel safe using it.
(I have no such problem with firejail vivaldi.) By trial and error, I found that remarking out "seccomp" from the firejail firefox profile solves the problem, but I have no idea of the security implications I assume it's better than noprofile; I hope someone can educate me.
Thanks for your reply. I sometimes now use chromium-browser in firejail, but the browser goes into a strange state at time where the display smears. It becomes unusable. I have resorted to using Firefox without firejail for the time being. It works ok then, except it is losing cookies that I have told it to retain.
Ideally, you might want to use --name= to name it, should you want to join that sandbox later on with --join=. This is particularly useful for opening new windows on firefox, since one instance is used to manage multiple windows.
By default firejail gives each firejailed program it's own view of the filesystem, so you may need to whitelist directories in some programs to access your files (whitelisting your pictures directory for your web browser to post chinese cartoons on imageboards, for example).
To whitelist a directory for a program, edit the programs respective profile in /.config/firejail. For instance, to whitelist your documents directory in firefox, you would copy your firefox.profile file to /.config/firejail/firefox.profile and add the line whitelist /Documents. These rules are user-wide, but firejail will read / as the users own home directory, so don't worry about cross contamination. Permissions in whitelisted directories are the same as their filesystem permissions, so if you make a file read-only in a whitelisted directory, programs with that directory whitelist will respect that permission and will only be able to read the file.
Sometimes if you exit out of Chromium, it will keep running in the background. You will notice this in your firejail terminal. Press Control-C and Chromium is killed and the firejail ended (this is true for all firejailed programs/processes).
While a firejail is running, firejail will lock your /etc/group and /etc/passwd files, making it so no program can access or write data to them (even root). This is a security feature and not a bug. If your group or passwd files don't work correctly (groupadd error code 10), close all firejails then try again.
thank you very much, the gsettings set... works well.
the image above shows a firejailed browser and i think firejail is not able to read some config files due to path restrictions and uses
a fallback window size larger than the screen. i'll try a window manager app to resize it.