I've given this some thought:

While firecfg handles symlinks well and per package hacks to create symlinks are no longer necessary, it still needs a way to make it seamless and automatically protect users. There is already precedent in Debian for automatic protection should a security application be installed:

"Please automatically enable AppArmor when the userspace tools are installed"
https://bugs.debian.org/702030

The only clean way to implement this is a dpkg trigger. Run firecfg - if some option is set in a .d config filder - each time something is installed to /usr/bin/, /sbin or perhaps best even / (therefore running it every time during apt-get). Otherwise there will always be inconsistencies about whether an installed firejail, and profile, and a "to be contained" binary is installed at the same time will result in using firejail. A state where sometimes things work for some users but not for all is quite horrible.

Manually running firecfg also does not work for software that has profiles but where the package gets installed by the user after firejail was installed. I speculate for reasons of cleanness, it does not be create symlinks for binaries that are not yet installed in preparation that it may one day be installed.

Reply via email to