SELinux belongs in hell. Firejail is good for user softwares. AppArmor is good for system services. #6166
Replies: 4 comments 10 replies
-
systemd
audit2allow |
Beta Was this translation helpful? Give feedback.
-
No, this is not true. I cannot speak about SELinux (which I tried years ago on Fedora) but with AppArmor you can easily confine user-space applications. I'm using https://github.com/roddhjav/apparmor.d which contains profiles for quite a number of apps. On my system I confine, e.g., Firefox and Brave (both in combination with Firejail), Thunderbird, LibreOffice, Okular, Gwenview and some more. Mostly apps for which I repeatedly run into problems with Firejail because of failed profile transitions.
No, this isn't true, either. AppArmor has deny rules which take precedence. That said, deny rules are actually not really needed as in AppArmor everything is forbidden which is not explicitly allowed. Insofar it's similar to whitelisting in Firejail.
No, this isn't true again - see remarks above. I don't know if Firejail itself can be properly restricted by AppArmor. But you can use both in tandem for an application: it's recommended to include <abstractions/base.d/firejail-base> to your *.local AppArmor profile and add ignore apparmor to your *.local Firejail profile to make sure that not |
Beta Was this translation helpful? Give feedback.
-
That's debatable. In those cases where Firejail prevents a profile transition it's not simpler to me. With AppArmor this is not a problem by using Px.
You're aware that right now 788 Firejail profiles use AppArmor? Yes, only |
Beta Was this translation helpful? Give feedback.
-
May I ask what exactly did you add/modify? Since firejail-default is used by all of those 788 profiles, such changes might work for some applications but might break others. |
Beta Was this translation helpful? Give feedback.
-
System-level MAC softwares like SELinux and AppArmor don't try to restrict user-level access which is abused by malwares.
If SELinux or AppArmor ever got in the way of desktop users, it will be a UX disaster.
SELinux is too complicated and too restrictive even for most professional admins.
AppArmor is far simpler than SELinux, but it doesn't have blacklist, so it can't restrict and allow user-level access in granular details. It also can't change network namespace, but firejail can. AppArmor is still good for system services, but only if admins have some time to fiddle with apparmor profiles. AppArmor is justifiable only for restricting a few system services running on mission-critical machines. Return on investment for writing apparmor profiles for every system software is negative.
Bubblewrap is useless due to lack of profiles and blacklists. It is best used by flatpak.
Firejail sucks for system services because it cannot restrict root and because it breaks if a service runs as a user without any home directory. But, it is great for user-level softwares.
So, we are left with firejail and apparmor. I am still skeptical of the value of apparmor beyond restricting a few system services running in the background...... I'm also skeptical of restricting firejail with apparmor. If an application escapes firejail, apparmor profile for firejail can't restrict user-level access without making firejail useless.
Beta Was this translation helpful? Give feedback.
All reactions