nsjail/configs/home-documents-with-xorg-no-net.cfg
2017-05-28 00:15:53 +02:00

106 lines
1.3 KiB
INI

name: "documents-with-xorg"
description: "
This policy allows to run many X-org based tool, which are allowed
to access $HOME/Documents directory only. An example of use is:
./nsjail --config configs/documents-with-xorg.cfg -- \\
/usr/bin/geeqie /user/Documents/
What is more, this policy doesn't allow to access networking.
"
mode: ONCE
hostname: "NSJAIL"
cwd: "/"
time_limit: 1000
envar: "DISPLAY=:0"
envar: "HOME=/user"
rlimit_as: 512
rlimit_cpu: 1000
rlimit_fsize: 1024
rlimit_nofile: 16
mount {
src: "/lib"
dst: "/lib"
is_bind: true
}
mount {
src: "/bin"
dst: "/bin"
is_bind: true
}
mount {
src: "/sbin"
dst: "/sbin"
is_bind: true
}
mount {
src: "/usr"
dst: "/usr"
is_bind: true
}
mount {
src: "/lib64"
dst: "/lib64"
is_bind: true
mandatory: false
}
mount {
src: "/lib32"
dst: "/lib32"
is_bind: true
mandatory: false
}
mount {
dst: "/tmp"
fstype: "tmpfs"
is_ro: false
}
mount {
dst: "/user"
fstype: "tmpfs"
is_ro: false
}
mount {
prefix_src_env: "HOME"
src: "/Documents"
dst: "/user/Documents"
is_bind: true
}
mount {
src: "/tmp/.X11-unix/X0"
dst: "/tmp/.X11-unix/X0"
is_ro: false
is_bind: true
}
mount {
src: "/etc/passwd"
dst: "/etc/passwd"
is_bind: true
}
seccomp_string: "
POLICY example {
KILL {
ptrace,
process_vm_readv,
process_vm_writev
}
}
USE example DEFAULT ALLOW
"