-
Notifications
You must be signed in to change notification settings - Fork 590
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
firecfg: Support OpenDoas #5899
Labels
Comments
kmk3
added a commit
to kmk3/firejail
that referenced
this issue
Jul 14, 2023
Closes netblue30#5899. Suggested-by: @shaggonit
Assuming you use doas, can you run If so it is a simple second check in Line 292 in c7b8e00
firejail/src/jailcheck/utils.c Line 28 in c7b8e00
|
@shaggonit Done in #5900, thanks for the suggestion. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
Is your feature request related to a problem? Please describe.
There was a somewhat recent security vulnerability in sudo leading some users (myself included) to look into projects such as OpenDoas, which is a simpler and easier to audit way of handling privilege escalation that I and some other users in the GNU/Linux community have migrated to. Firecfg does NOT function properly using
doas
to run, it explicitly requiressudo
. When attempting to usedoas
, it will act as thoughfirecfg
was run as the root user, and not as a heightened-privilege user similar tosudo
.Describe the solution you'd like
Perhaps adding an option similar to paru's config file that easily allows Firecfg to be run in "doas mode."
Describe alternatives you've considered
I am not entirely sure if this is something
doas
is capable of accomplishing, as it is intentionally left as simple as possible. But, I do believe a workaround can be made. I am not a programmer, I'd love to make a pull request if I knew how to add such a feature. 😅Additional context
Any response is appreciated. :)
The text was updated successfully, but these errors were encountered: