Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Use bubblewrap for sandboxing instead of firejail #62

Open
madaidan opened this issue Oct 7, 2019 · 1 comment
Open

Use bubblewrap for sandboxing instead of firejail #62

madaidan opened this issue Oct 7, 2019 · 1 comment

Comments

@madaidan
Copy link

madaidan commented Oct 7, 2019

Firejail has way too large attack surface that has led to many privilege escalations and sandbox escapes in the past.

It would be better if orjail used bubblewrap instead which is similar to firejail but has minimal attack surface.

I can create a pull request that implements most of the same functionality as firejail but using bubblewrap instead if this is something you're interested in. The only things I don't know how to replicate with bubblewrap are the --dns=, --name= and --netns= options.

@phantomcraft
Copy link
Collaborator

phantomcraft commented Feb 29, 2020

You should pass "ip netns exec brwrap <...>" to make bubblewrap use the network namespace.

As for "--dns=", you should create a folder at /etc/netns with the same name of network namespace and put a resolv.conf file inside it.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants