LinuxCommandLibrary

firejail

application sandboxing with Linux namespaces

TLDR

Integrate firejail with desktop environment

$ sudo firecfg
copy
Open a restricted Firefox
$ firejail [firefox]
copy
Start restricted Apache on specific network
$ firejail --net=[eth0] --ip=[192.168.1.244] [/etc/init.d/apache2] [start]
copy
List running sandboxes
$ firejail --list
copy
List network activity from sandboxes
$ firejail --netstats
copy
Shutdown a running sandbox
$ firejail --shutdown=[7777]
copy
Run highly restricted Firefox session
$ firejail --seccomp --private --private-dev --private-tmp --protocol=inet firefox --new-instance --no-remote --safe-mode --private-window
copy
Use custom hosts file
$ firejail --hosts-file=[~/myhosts] [curl http://mysite.arpa]
copy

SYNOPSIS

firejail [options] [program] [arguments]

DESCRIPTION

firejail securely sandboxes processes using Linux namespaces, seccomp-bpf, and capabilities. It isolates applications from the rest of the system for security.
Provides per-application profiles for common programs like Firefox and VLC.

PARAMETERS

--list

List running sandboxes
--netstats
Show network activity
--shutdown pid
Stop sandbox by PID
--net interface
Use network namespace
--ip address
Assign IP address
--seccomp
Enable seccomp filtering
--private
Use private home directory
--private-tmp
Use private /tmp
--private-dev
Use private /dev

CONFIGURATION

/etc/firejail/[application].profile

Application-specific sandboxing profiles defining restrictions and permissions.
~/.config/firejail/[application].profile
User-level custom profiles that override system defaults.

CAVEATS

Some applications may not work correctly in sandbox. Profiles in /etc/firejail/. Use firecfg to integrate with desktop.

SEE ALSO

> TERMINAL_GEAR

Curated for the Linux community

Copied to clipboard

> TERMINAL_GEAR

Curated for the Linux community