-
-
Save rusty-snake/c6d773fc27ddde9071461e0fe4010610 to your computer and use it in GitHub Desktop.
For net eth0
there's no equivalent in systemd directives.
For netfilter /etc/firejail/myfilter.net
, similar features are IPIngressFilterPath=
/IPEgressFilterPath=
and more general BPFProgram=
. They use BPF rather than iptables/nftables.
Yes but there are also
/bin
/sbin
and/usr/sbin
. With a unified filesystem-hirachy (/bin
and/sbin
are symlinks to there/usr
counterparts) this is just an additionalTemporaryFileSystem=/usr/sbin
but without?
Yes. I think there could be also further unification where also /usr/sbin
is just a symlink to /usr/bin
.
I implemented
ExecPaths=
andNoExecPaths=
in systemd PR 18273, but this has not been released yet.
This is now merged and released.
| Not Implemented |
UMask=0077
|I don't know if this is system-wide, but for single paths, isn't
read-only
+
noexec
equivalent?
Not really, umask is applied when creating new files but read-only
or noexec
remount a directory tree with flags to deny writing or executing. A new umask can be also installed easily (unless prevented with seccomping) but changing mount flags would need superuser capabilities.
@topimiettinen commented on Aug 11:
I implemented
ExecPaths=
andNoExecPaths=
in systemd PR
18273, but this has not
been released yet.This is now merged and released.
Nice.
| Not Implemented |
UMask=0077
|I don't know if this is system-wide, but for single paths, isn't
read-only
+noexec
equivalent?Not really, umask is applied when creating new files but
read-only
or
noexec
remount a directory tree with flags to deny writing or executing. A
new umask can be also installed easily (unless prevented with seccomping) but
changing mount flags would need superuser capabilities.
I see; thanks for the explanation. For some reason I thought that the option
was actually about enforcing the permissions rather than just changing the
umask.
Note: I'm not very familiar with using systemd, so I don't have much to add.
@rusty-snake commented 7 hours ago:
I think the side-by-side equivalents are very nice to have. It's good to know
if we are missing useful functionality compared to other projects and
vice-versa. Also, I had no idea that there were so many similarities.
[...]
I don't know if this is system-wide, but for single paths, isn't
read-only
+noexec
equivalent?[...]
I was going to comment about
ipc-namespace
, but now I see that it ismentioned later with relation to
PrivateIPC=yes
. At first glance, it lookslike having such an option could be complementary to
dbus-user none
+dbus-system none
.Nice; I think using the GNU APL makes a lot of sense for gists.
(Offtopic)
This is kind of a PR for the wiki, so I'll just leave this linked here:
netblue30/firejail#4441