firejail.config 2.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778
  1. # This is Firejail system-wide configuration file, see firejail-config(5) for
  2. # more information. The file contains keyword-argument pairs, one per line.
  3. # Most features are enabled by default. Use 'yes' or 'no' as configuration
  4. # values.
  5. # Enable or disable bind support, default enabled.
  6. # bind yes
  7. # Enable or disable chroot support, default enabled.
  8. # chroot yes
  9. # Use chroot for desktop programs, default enabled. The sandbox will have full
  10. # access to system's /dev directory in order to allow video acceleration,
  11. # and it will harden the rest of the chroot tree.
  12. # chroot-desktop yes
  13. # Enable or disable file transfer support, default enabled.
  14. # file-transfer yes
  15. # Force use of nonewprivs. This mitigates the possibility of
  16. # a user abusing firejail's features to trick a privileged (suid
  17. # or file capabilities) process into loading code or configuration
  18. # that is partially under their control. Default disabled.
  19. # force-nonewprivs no
  20. # Enable or disable networking features, default enabled.
  21. # network yes
  22. # Enable or disable overlayfs features, default enabled.
  23. # overlayfs yes
  24. # Enable or disable private-home feature, default enabled
  25. # private-home yes
  26. # Enable --quiet as default every time the sandbox is started. Default disabled.
  27. # quiet-by-default no
  28. # Remount /proc and /sys inside the sandbox, default enabled.
  29. # remount-proc-sys yes
  30. # Enable or disable restricted network support, default disabled. If enabled,
  31. # networking features should also be enabled (network yes).
  32. # Restricted networking grants access to --interface, --net=ethXXX and
  33. # --netfilter only to root user. Regular users are only allowed --net=none.
  34. # restricted-network no
  35. # Change default netfilter configuration. When using --netfilter option without
  36. # a file argument, the default filter is hardcoded (see man 1 firejail). This
  37. # configuration entry allows the user to change the default by specifying
  38. # a file containing the filter configuration. The filter file format is the
  39. # format of iptables-save and iptable-restore commands. Example:
  40. # netfilter-default /etc/iptables.iptables.rules
  41. # Enable or disable seccomp support, default enabled.
  42. # seccomp yes
  43. # Enable or disable user namespace support, default enabled.
  44. # userns yes
  45. # Enable or disable whitelisting support, default enabled.
  46. # whitelist yes
  47. # Enable or disable X11 sandboxing support, default enabled.
  48. # x11 yes
  49. # Screen size for --x11=xephyr, default 800x600. Run /usr/bin/xrandr for
  50. # a full list of resolutions available on your specific setup.
  51. # xephyr-screen 640x480
  52. # xephyr-screen 800x600
  53. # xephyr-screen 1024x768
  54. # xephyr-screen 1280x1024
  55. # Firejail window title in Xephyr, default enabled.
  56. # xephyr-window-title yes
  57. # Xephyr command extra parameters. None by default, and the declaration is commented out.
  58. # xephyr-extra-params -keybd ephyr,,,xkbmodel=evdev
  59. # xephyr-extra-params -grayscale