-
Notifications
You must be signed in to change notification settings - Fork 577
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Question] Does 'netfilter=filename' affect the system firewall, eg UFW #1642
Comments
I don't think Firejail ever directly interacts with UFW. And afaik UFW is just a fancy bash script to control iptables. As for learning about iptables here are some nice writeups:
|
No, Firejail doesn't touch your system firewall. It installs a new one in the sandbox if you use --net to start another network namespace. Each network namespace (system or sandbox) has its own firewall. I'll start bringing in your profiles, thanks. |
all merged, thanks. |
This is an AUR helper and disable-common.inc has entries for pacman and other system package managers. Added on commit 6c10737 ("archaudit-report and cower for Arch platforms, netblue30#1642", 2017-11-15).
This is an AUR helper and disable-common.inc has entries for pacman and other system package managers. Added on commit 6c10737 ("archaudit-report and cower for Arch platforms, netblue30#1642", 2017-11-15).
As the title states: Does playing around with Firejail netfilters on a per application basis represent a safe way of learning about netfilter rules?
At the moment, I use the default UFW rules
and am loathe to experiment with these settings until I have a better understanding of what I am doing
Thanks
Irvine
Ps, If if you are interested, I have attached zipped profiles for: bsdtar, cower, makepkg, ping and archaudit-report
Profiles.zip
The text was updated successfully, but these errors were encountered: