-
Notifications
You must be signed in to change notification settings - Fork 568
Creating Profiles
~/.config/firejail/
is the place for user-defined profiles.
The default configuration starts any program with a profile in a sandbox. However a user can still run applications without firejail (/usr/bin/firefox
) and use parameters to specify profiles (firejail --noprofile firefox
or firejail --profile=myprofile firefox
). Any local non-admin user can also load their own profiles by placing them in ~/.config/firejail
.
Profiles are configurations defined as how Firejail will treat the application being run under it. This defines options such as what directories it has access to, what base system functionality it has access to, and so on.
The execution sequence is generally the following:
- Command line parameter execution as customizations
- Recursive running the profiles
- Redirection due to alias profile (loading full profile)
- Local customization
- Global customization
- Profile content (which often uses common settings)
See Locations and Types, or the profile template in /usr/share/doc/firejail/profile.template
and the man page for understanding the customizations.
Every file in a firejail directory (/etc/firejail
or /usr/local/etc/firejail
when compiled without --prefix=/usr
, ~/.config/firejail
) is basically a profile. They all follow the same syntax.
However, there are still some different file types:
- Regular profiles (
.profile
)- It contains settings for a specific application, like
curl.profile
- There are a few subtypes:
- Regular profiles, like
curl.profile
- Alias profiles, like
atom-beta.profile
. They usually only containinclude
statements.atom-beta
is very similar toatom
, so the same sandboxing settings are used. - Common profiles, like
firefox-common.profile
. Some applications have different flavors, like Firefox, and all have some sandboxing settings in common.
- Regular profiles, like
- It contains settings for a specific application, like
- Overrides (
.local
)- This file contains overrides which can override specific parts of a regular profile, like
curl.local
. Also see this wiki page -
globals.local
is a special override file. It will affect every regular profile.
- This file contains overrides which can override specific parts of a regular profile, like
- Includes (
.inc
)- Every file type can be included, see the recurring
include globals.local
andinclude $application.local
parts of almost every profile but this file type usually contains useful reusable statements, likedisable-common.inc
- An include will fail if the file you want to include does not exist, except when trying to include a
.local
file. - There are some subtypes:
- Includes that start with
allow
handle allowing access to certain paths. e.gallow-ruby.inc
will allow access to certain ruby paths, which the application may need for addons/plugins. -
disable-*
includes handle blacklisting paths, like disallowing access to sensitive files. -
whitelist-*
includes contain statements necessary for whitelisting profiles - Everything else is a special application-specific include, like
firefox-common-addons.inc
- Includes that start with
- Every file type can be included, see the recurring
Depending on where you put a file, it might override other files.
Files in ~/.config/firejail
have a higher priority than /etc/firejail
(or /usr/local/etc/firejail
), so if /etc/firejail/curl.profile
and ~/.config/firejail/curl.profile
both exist, firejail uses ~/.config/firejail/curl.profile
. This applies to every file type mentioned above.
System-wide profiles for pull requests are supposed to be created in the etc/profile-*
directory and are based on a template in /usr/share/doc/firejail/profile.template
.
The process is fairly straightforward:
- Copy
etc/templates/profile.template
to~/PROGRAM.profile
- Open
~/PROGRAM.profile
in a text editor and follow the instructions in the file. To run, usefirejail --profile=PROGRAM.profile PROGRAM
. If your program acts like a similar program (e.g. an Electron app is similar to Discord andteams-for-linux
), you can look at their profiles.
The debugger options--debug
,--debug-{blacklists, caps, errnos, private-lib, protocols, syscalls, whitelists}
,--trace
,--build
and--audit
may be of use. - If the program has its own configuration files/directories, add them to
etc/inc/disable-programs.inc
- Add the program to
src/firecfg/firecfg.config
- Submit a pull request.
-
blacklist PATH
:PATH
is still present, but not accessible (withwhitelist
they don't exist) -
noblacklist ~/Documents/presentations
blacklist ~/Documents
: does not work - whitelisting in profiles: new files are not saved (=> don't use for text editors, image editing software, ... )
- Write fail-safe profiles that use
blacklist
,noblacklist
andwhitelist
. Recall that thewhitelist
directive blacklists everything else, so a user might want to temporarily disable it in a.local
override, in order to give a program access to another directory. If there's noblacklist
, then the program will have access to everything in the user's home directory. Theblacklist
s provide a failsafe ifwhitelist
s are disables. Then you neednoblacklist
s for specific directories to allow a program to access them despite the profile including otherdisable-*
profiles that do blacklist many programs. For more details, see the Wire whitelist-noblacklist and why we have blacklist, noblacklist, and whitelist in the same profile.noblacklist ${HOME}/.config/Wire mkdir ${HOME}/.config/Wire whitelist ${HOME}/.config/Wire