「Firejail」の版間の差分
Kusanaginoturugi (トーク | 投稿記録) |
(→使用方法: タイトルのみを翻訳) |
||
54行目: | 54行目: | ||
$ firejail --profile=/absolute/path/to/profile <program name> |
$ firejail --profile=/absolute/path/to/profile <program name> |
||
− | === |
+ | === デフォルトで firejail を使う === |
To use Firejail by default for all applications for which it has profiles, run the ''firecfg'' tool as root. |
To use Firejail by default for all applications for which it has profiles, run the ''firecfg'' tool as root. |
||
92行目: | 92行目: | ||
{{Warning|Upstream provides profiles for {{ic|gpg}} and {{ic|gpg-agent}}. If gpg is symlinked with the supplied profile, pacman will be unable to update {{pkg|archlinux-keyring}}.}} |
{{Warning|Upstream provides profiles for {{ic|gpg}} and {{ic|gpg-agent}}. If gpg is symlinked with the supplied profile, pacman will be unable to update {{pkg|archlinux-keyring}}.}} |
||
− | === |
+ | === hardened_malloc を使う === |
{{AUR|hardened_malloc}} is a hardened implementation of glibc's malloc() allocator, originally written for Android but extended for use on the desktop. While not integrated into glibc yet, it can be used selectively with LD_PRELOAD. The proper way to launch an application within firejail using hardened_malloc is demonstrated below. To make it permanent, you'd need to create your own entry in /usr/local/bin for the desired application.'' |
{{AUR|hardened_malloc}} is a hardened implementation of glibc's malloc() allocator, originally written for Android but extended for use on the desktop. While not integrated into glibc yet, it can be used selectively with LD_PRELOAD. The proper way to launch an application within firejail using hardened_malloc is demonstrated below. To make it permanent, you'd need to create your own entry in /usr/local/bin for the desired application.'' |
||
99行目: | 99行目: | ||
The various environment variables and settings that can be used to tune hardened_malloc can be found on it's [https://github.com/GrapheneOS/hardened_malloc github page]. |
The various environment variables and settings that can be used to tune hardened_malloc can be found on it's [https://github.com/GrapheneOS/hardened_malloc github page]. |
||
− | === |
+ | === AppArmor のサポートを有効化する === |
There are a number of ways to enable [[AppArmor]] confinement on top of a Firejail security profile: |
There are a number of ways to enable [[AppArmor]] confinement on top of a Firejail security profile: |
||
106行目: | 106行目: | ||
* Enable Apparmor globally in {{ic|/etc/firejail/globals.local}} and disable as needed through the use of {{ic|ignore apparmor}} in {{ic|/etc/firejail/<ProgramName>.local}}. |
* Enable Apparmor globally in {{ic|/etc/firejail/globals.local}} and disable as needed through the use of {{ic|ignore apparmor}} in {{ic|/etc/firejail/<ProgramName>.local}}. |
||
− | === |
+ | === Firejail が使用中かを確認する === |
$ firejail --list |
$ firejail --list |
2022年5月14日 (土) 17:10時点における版
関連記事
Firejail は使いやすい SUID サンドボックスプログラムであり、Linux の名前空間や seccomp-bpf、Linux ケイパビリティを使うことで、信頼のおけないアプリケーションの実行環境を制限することにより、セキュリティ侵害のリスクを軽減します。
目次
- 1 インストール
- 2 設定
- 3 使用方法
- 4 Creating custom profiles
- 5 Firejail with Xephyr
- 6 Tips and tricks
- 7 トラブルシューティング
- 7.1 Remove Firejail symbolic links
- 7.2 Desktop files
- 7.3 PulseAudio
- 7.4 Hidepid
- 7.5 Proprietary Nvidia drivers
- 7.6 --net options and Linux kernel >=4.20.0
- 7.7 Warning: Cannot confine the application using AppArmor
- 7.8 /usr/bin/patch: **** Can't open patch file
- 7.9 Graphical applications hang on start with AMDGPU
- 8 参照
インストール
firejail または firejail-gitAUR パッケージをインストールしてください。Firejail で使用するためのGUIアプリケーション、firetools も用意されています。
Apparmor 統合
0.9.60-1 以降、firejail は一般的な apparmor プロファイルを通じて Apparmor との直接的な統合をサポートしてきました。インストール中に、プロファイル firejail-default
は、/etc/apparmor.d
ディレクトリに配置され、root として次のコマンドを実行してカーネルにロードする必要があります:
# apparmor_parser -r /etc/apparmor.d/firejail-default
マニュアルを引用します:
- インストールされたプロファイルは、主な firejail の機能を補足するものであり、特に次の事を行います:
- ptrace を無効にします。ptrace を使用すると、実行中のプログラムを検査してハイジャックすることができます。通常、これはデバッグのみに必要です。
/run
,/proc
,/sys
以下のいくつかのファイルへの書き込みアクセスをホワイトリストにする。- プログラムの実行を、
/bin
,/sbin
,/usr/bin
などのよく知られたシステムパスからのみ許可する。これらのパスは読み取り専用になります。 - ユーザのホームディレクトリやユーザが書き込み可能なディレクトリからのプログラムやスクリプトの実行は許可されていません。
- 非標準のネットワークソケットを使用しないようにしてください。
unix
,inet
,inet6
,netlink
,raw
とパケットのみが許可されています。 .snapshots
のような既知の機密パスへのアクセスを拒否します。
apparmor プロファイルのローカルカスタマイズは、/etc/apparmor.d/local/firejail-local
ファイルを編集することでサポートされます。
設定
Most users will not require any custom configuration and can proceed to #Usage.
Firejail uses profiles to set the security protections for each of the applications executed inside of it - you can find the default profiles in /etc/firejail/application.profile
. Should you require custom profiles for applications not included, or wish to modify the defaults, you may place new rules or copies of the defaults in the ~/.config/firejail/
directory. You may have multiple custom profile files for a single application, and you may share the same profile file among several applications.
If firejail does not have a profile for a particular application, it uses its restrictive system-wide default profile. This can result in the application not functioning as desired, without first creating a custom, and less restrictive profile.
Refer to firejail-profile(5).
使用方法
そのアプリケーションに対する firejail のデフォルトの保護(デフォルトのプロファイル)を使用してアプリケーションを実行するには、以下を実行します:
$ firejail <program name>
デフォルトプロファイルへの1回限りの追加は、コマンドラインオプションとして追加できます(マニュアルページを参照)。たとえば、seccomp 保護を使用して okular を実行するには、次のコマンドを実行します:
$ firejail --seccomp okular
1つのプログラムにデフォルト以外の複数のプロファイルを定義できます。プロファイルファイルを作成したら、次のコマンドを実行して使用できます:
$ firejail --profile=/absolute/path/to/profile <program name>
デフォルトで firejail を使う
To use Firejail by default for all applications for which it has profiles, run the firecfg tool as root.
# firecfg
This creates symbolic links in /usr/local/bin
pointing to /usr/bin/firejail
, for all programs for which firejail has default profiles.
To manually map individual applications execute:
# ln -s /usr/bin/firejail /usr/local/bin/<application>
hardened_malloc を使う
hardened_mallocAUR is a hardened implementation of glibc's malloc() allocator, originally written for Android but extended for use on the desktop. While not integrated into glibc yet, it can be used selectively with LD_PRELOAD. The proper way to launch an application within firejail using hardened_malloc is demonstrated below. To make it permanent, you'd need to create your own entry in /usr/local/bin for the desired application.
firejail --env=LD_PRELOAD='/usr/lib/libhardened_malloc.so' /usr/bin/firefox
The various environment variables and settings that can be used to tune hardened_malloc can be found on it's github page.
AppArmor のサポートを有効化する
There are a number of ways to enable AppArmor confinement on top of a Firejail security profile:
- Pass the
--apparmor
flag to Firejail in the command line, e.g.$ firejail --apparmor firefox
- Use a custom profile.
- Enable Apparmor globally in
/etc/firejail/globals.local
and disable as needed through the use ofignore apparmor
in/etc/firejail/<ProgramName>.local
.
Firejail が使用中かを確認する
$ firejail --list
Creating custom profiles
Whitelists and Blacklists
Blacklists are permissive:
- Permit everything not explicitly forbidden:
blacklist <location/file>
- Permit file or location in any later blacklist:
noblacklist <location/file>
Whitelists are restrictive:
- Forbid everything not explicitly permitted:
whitelist <location/file>
- Forbid file or location in any later whitelist:
nowhitelist <location/file>
Profile writing
The basic process is:
- Copy the default profile (which uses blacklists) to your work folder and give it a unique name
- Change the line
include /etc/firejail/default.local
toinclude /etc/firejail/ProfileName.local
- Gradually comment/uncomment the various options while checking at each stage that the application runs inside the new sandbox
- Desirable options not available in the copied default profile can be found by consulting the manual
- Build a whitelist of permitted locations. For portability, it may be advisable to place at least some of this list it in a
.local
file - Test the profile for security holes, see #Testing profiles
- Once satisfied, copy your new profile to either
/etc/firejail/
or~/.config/firejail/
You may find the following to be useful:
firejail --debug $OtherOptions $PathToProfile $Program > $PathToOutputFile
Gives a detailed breakdown of the sandboxfirejail --debug-caps
gives a list of caps supported by the current Firejail software build. This is useful when building a caps whitelist.firejail --help
for a full list of--debug
optionsfiremon PID
monitors the running process. Seefiremon --help
for details- checksec may also be useful in testing which standard security features are being used
Persistent local customisation
The standard profile layout now includes the capability to make persistent local customisations through the inclusion of .local
files. Basically, each officially supported profile contains the lines include /etc/firejail/ProgramName.local
and include /etc/firejail/globals.local
. Since the order of precedence is determined by which is read first, this makes for a very powerful way of making local customisations.
For example, with reference this firejail question, to globally enable Apparmor and disable Internet connectivity, one could simply create/edit /etc/firejail/globals.local
to include the lines
# enable Apparmor and disable Internet globally net none apparmor
Then, to allow, for example, "curl" to connect to the internet, yet still maintain its apparmor confinement, one would create/edit /etc/firejail/curl.local
to include the lines.
# enable internet for curl ignore net
Since curl.local
is read before globals.local
, ignore net
overrides net none
, and, as a bonus, the above changes would be persistent across future updates.
Testing profiles
Firejail's built in audit feature allows the user to find gaps in a security profile by replacing the program to be sandboxed with a test program. By default, firejail uses the faudit
program distributed with Firejail. (Note: A custom test program supplied by the user can also be used.)
Examples:
- Run the default audit program:
$ firejail --audit transmission-gtk
- Run a custom audit program:
$ firejail --audit=~/sandbox-test transmission-gtk
In the examples above, the sandbox configures the transmission-gtk profile and starts the test program. The real program, transmission-gtk, will not be started.
Firejail with Xephyr
Xephyr will allow you to sandbox Xorg. If you want to be able to resize windows, install a window manager such as Openbox.
xephyr-screen WidthxHeight
can be set in /etc/firejail/firejail.config
where Width
and Height
are in pixels and based on your screen resolution.
To open the sandbox:
$ firejail --x11 --net=device openbox
device
is your active network interface. Then right click and select your applications to run.
A great guide can be found on the Firejail Wordpress.
According to the guide:
- The sandbox replaces the regular X11 server with Xpra or Xephyr server. This prevents X11 keyboard loggers and screenshot utilities from accessing the main X11 server.
Note that the statement:
- The only way to disable the abstract socket
@/tmp/.X11-unix/X0
is by using a network namespace. If for any reasons you cannot use a network namespace, the abstract socket will still be visible inside the sandbox. Hackers can attach keylogger and screenshot programs to this socket.
is incorrect, xserverrc can be edited to -nolisten local
which disables the abstract sockets of X11 and helps isolate it.
Sandboxing a browser
Openbox can be configured to start a certain browser at startup. program.profile
is the respective profile contained in /etc/firejail
, and --startup "command"
is the command line used to start the program. For example, to start Chromium in the sandbox:
$ firejail --x11 --profile=/etc/firejail/chromium.profile openbox --startup "chromium"
Tips and tricks
Paths containing spaces
If you need to reference, whitelist, or blacklist a directory within a custom profile, such as with palemoonAUR, you must do so using the absolute path, without encapsulation or escapes:
/home/user/.moonchild productions
Private mode
Firejail also includes a one time private mode, in which no mounts are made in the chroots to your home directory. In doing this, you can execute applications without performing any changes to disk. For example, to execute okular in private mode, do the following:
$ firejail --seccomp --private okular
トラブルシューティング
Some applications do not work properly with Firejail, and others simply require special configuration. In the instance any directories are disallowed or blacklisted for any given application, you may have to further edit the profile to enable nonstandard directories that said application needs to access. One example is wine; wine will not work with seccomp in most cases.
Other configurations exist; it is suggested you check out the man page for firejail to see them all, as firejail is in rapid development.
Remove Firejail symbolic links
To remove Firejail created symbolic links (e.g. reset to default):
# firecfg --clean
Verify if any leftovers of Desktop entries are still overruled by Firejail.
Desktop files
Some GUI application launchers (.desktop
files) are coded using absolute paths to an executable, which circumvents firejail's symlink method of ensuring that it is being used. The firecfg tool includes an option to over-ride this on a per-user basis by copying the .desktop
files from /usr/share/applications/*.desktop
to ~/.local/share/applications/
and replacing the absolute paths with simple file names.
$ firecfg --fix
There may be cases for which you need to manually modify the EXEC line of the .desktop
file in ~/.local/share/applications/
to explicitly call Firejail.
PulseAudio
Firejail で PulseAudio が上手く動作しないという 既知の問題 が存在します。一時的に解決する方法:
cp /etc/pulse/client.conf ~/.config/pulse/
echo "enable-shm = no" >> ~/.config/pulse/client.conf
Hidepid
If you have hidepid installed, Firemon can only be run as root. This, among other things, will cause problems with the Firetools GUI incorrectly reporting "Capabilities", "Protocols" and the status of "Seccomp". See [2]
Proprietary Nvidia drivers
Some users report problems when using Firejail and proprietary graphic drivers from NVIDIA (e.g. [3], [4] or [5]). This can often be solved by disabling the noroot
Firejail option in the application's profile file.
--net options and Linux kernel >=4.20.0
There is a bug on firejail 0.5.96 with linux >= 4.20.0, see [6] and [7]
Example error message:
$ firejail --noprofile --net=eth0 ls Parent pid 8521, child pid 8522 Error send: arp.c:182 arp_check: Invalid argument Error: proc 8521 cannot sync with peer: unexpected EOF Peer 8522 unexpectedly exited with status 1
Warning: Cannot confine the application using AppArmor
For some applications (e.g. Firefox [8]) starting with Firejail may result in warnings like:
Warning: Cannot confine the application using AppArmor. Maybe firejail-default AppArmor profile is not loaded into the kernel. As root, run "aa-enforce firejail-default" to load it.
When running the suggested command you might see:
ERROR: Cache read/write disabled: interface file missing. (Kernel needs AppArmor 2.4 compatibility patch.)
This means that AppArmor is not enabled as a kernel parameter, so you have to set it according to AppArmor#Installation.
/usr/bin/patch: **** Can't open patch file
This means the PKGBUILD
uses patch
with a -i
switch so a whitelist for $SRCDEST
in /etc/makepkg.conf
is needed.
Create: /etc/firejail/patch.local
with the value of your $SRCDEST
:
whitelist /path/to/makepkg/sources
Changing the PKGBUILD
to use stdin
also works:
patch -p1 < ../the.patch
Graphical applications hang on start with AMDGPU
Some graphical applications, eg Firefox and mpv, will hang on start when using AMDGPU with Mesa >= 19.3.4. See [9]. The issue is fixed upstream, so firejail-gitAUR should work. Alternatively, for all affected applications, add seccomp !kcmp
to their profiles in etc/firejail
. If they already have a seccomp
statement, you can concatenate them as a comma-separated list, eg seccomp !chroot,!kcmp
.
参照
- Firejail GitHub プロジェクトページ
- bubblewrap Firejail の最小限の代用品