LWN: Comments on "Sandboxing with Firejail" https://lwn.net/Articles/671534/ This is a special feed containing comments posted to the individual LWN article titled "Sandboxing with Firejail". en-us Thu, 25 Sep 2025 02:54:58 +0000 Thu, 25 Sep 2025 02:54:58 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net Sandboxing with Firejail https://lwn.net/Articles/673508/ https://lwn.net/Articles/673508/ Cyberax <div class="FormattedComment"> You can try instructions here: <a href="http://askubuntu.com/questions/371687/how-to-carry-audio-over-ssh">http://askubuntu.com/questions/371687/how-to-carry-audio-...</a><br> <p> I've tried it in the past to stream audio from my laptop, but the quality was not very good over the WiFi.<br> </div> Tue, 26 Jan 2016 02:24:00 +0000 Sandboxing with Firejail https://lwn.net/Articles/673474/ https://lwn.net/Articles/673474/ drag <div class="FormattedComment"> With something like skype... if it supports pusleaudio then configure pulseaudio to listen on a TCP socket, give skype the necessary ~/.pulse/ configuration file and cookie to connect to that socket. Run it in a Xvnc server since X11 networking is so problematic. <br> <p> Should work even if it's ugly. <br> </div> Mon, 25 Jan 2016 19:32:38 +0000 Sandboxing with Firejail https://lwn.net/Articles/673134/ https://lwn.net/Articles/673134/ raven667 <div class="FormattedComment"> <font class="QuotedText">&gt; Which doesn't work with programs not explicitly written for this kind of model.</font><br> <p> Well sure, there is no such thing as a free lunch, you need to modify applications to support sandboxing in a user friendly way. The alternative is to bind mount the ~/Download directory in the sandbox but that is substantially more access. <br> </div> Sat, 23 Jan 2016 01:19:32 +0000 Sandboxing with Firejail https://lwn.net/Articles/673114/ https://lwn.net/Articles/673114/ lsl <div class="FormattedComment"> Which doesn't work with programs not explicitly written for this kind of model. Which makes it kinda useless for most of the things you'd want to contain. See "such a bastard as skype" above.<br> <p> If open(2) doesn't work for opening a file, real-world utility is going to be limited.<br> </div> Fri, 22 Jan 2016 23:42:20 +0000 Sandboxing with Firejail https://lwn.net/Articles/672962/ https://lwn.net/Articles/672962/ raven667 <div class="FormattedComment"> The standard way to fix this is to allow am IPC socket inside the sandbox that has access control and only allows a file:open widget outside the sandbox, with file transfer over IPC between security contexts. <br> </div> Fri, 22 Jan 2016 14:16:21 +0000 Sandboxing with Firejail https://lwn.net/Articles/672958/ https://lwn.net/Articles/672958/ andrey.utkin <div class="FormattedComment"> What about sandboxing such a bastard as skype? It needs audio &amp; video input and output, it needs to upload and download your files when you wish so. Still, I'd wish to guard my .ssh, .gnupg, .thunderbird, .firefox etc. from it.<br> <p> Currently I am achieving this by running it in separate user account.<br> </div> Fri, 22 Jan 2016 13:23:02 +0000 Related projects https://lwn.net/Articles/672956/ https://lwn.net/Articles/672956/ rwmj <div class="FormattedComment"> And libvirt-sandbox (<a rel="nofollow" href="http://sandbox.libvirt.org/quickstart/">http://sandbox.libvirt.org/quickstart/</a>) which gives you a choice of sandboxing in either a container or a full virtual machine.<br> </div> Fri, 22 Jan 2016 13:04:34 +0000 Sandboxing with Firejail https://lwn.net/Articles/672526/ https://lwn.net/Articles/672526/ federico3 <div class="FormattedComment"> Firejail is really underrated. It can also create persistent overlay filesystems, limit bandwidth, trace system calls.<br> </div> Wed, 20 Jan 2016 16:42:50 +0000 Related projects https://lwn.net/Articles/672502/ https://lwn.net/Articles/672502/ sam.thursfield <div class="FormattedComment"> Looks like an interesting project and with quite some momentum!<br> <p> Some related tools:<br> <p> * libsandbox &lt;<a href="https://github.com/openjudge/sandbox">https://github.com/openjudge/sandbox</a>&gt; (sandboxing library written in Python)<br> * linux-user-chroot &lt;<a href="https://git.gnome.org/browse/linux-user-chroot">https://git.gnome.org/browse/linux-user-chroot</a>&gt; (minimal sandboxing tool written in C, intended for use by build systems)<br> * Warden &lt;<a href="https://github.com/cloudfoundry/warden">https://github.com/cloudfoundry/warden</a>&gt; (sandboxing program used by CloudFoundry/BOSH, written in Ruby)<br> * xdg-app &lt;<a href="https://github.com/alexlarsson/xdg-app">https://github.com/alexlarsson/xdg-app</a>&gt; (desktop-app-specific sandboxing)<br> <p> I wrote a pretty minimal and incomplete Python library for wrapping different sandboxing mechanisms called Sandboxlib, which currently only wraps linux-user-chroot or the chroot() syscall, but it would be interesting to add support for Firejail. Sandboxlib is here: &lt;<a href="https://github.com/CodethinkLabs/sandboxlib">https://github.com/CodethinkLabs/sandboxlib</a>&gt;<br> </div> Wed, 20 Jan 2016 12:30:49 +0000 Sandboxing with Firejail https://lwn.net/Articles/672432/ https://lwn.net/Articles/672432/ nix <div class="FormattedComment"> Thankfully, it looks like the user namespace stuff is extremely optional: all it does is stops someone elevating to root quite as easily. That means this is still usable if you consider user namespaces to be problematic security-wise on account of multiple horrible holes since introduction and disable them :)<br> <p> This does look *really* useful.<br> </div> Tue, 19 Jan 2016 15:43:42 +0000 Sandboxing with Firejail https://lwn.net/Articles/671957/ https://lwn.net/Articles/671957/ flussence <div class="FormattedComment"> This is great news; I've been wanting a program like this for *ages*! Having to configure an entire LXC environment always felt like massive overkill for a server with under a dozen services.<br> </div> Thu, 14 Jan 2016 19:46:23 +0000