Hi,

Sadly they have no effect, because a tmpfs is mounted on /home, masked
over /home/.fscrypt .
A case like this can usually be resolved by adding
> mkdir <path>
> whitelist <path>
in profiles, but unfortunately, "mkdir" only works in ${HOME} and /tmp, so
it seems to be still unsolvable under current version of firejail.

在 2020/1/25 下午7:48, Reiner Herrmann 写道:
> Hi,
>
> On Tue, Jan 21, 2020 at 04:42:16PM +0800, Mad Horse wrote:
>> In order to access unlocked files and directories encrypted with
>> fscrypt, their
>> protectors. which lies under /.fscrypt of root and each FS with this feature
>> deployed, should also be accessible.
>>
>> Inside firejail, /.fscrypt could be made accessible with "noblacklist"
>> statement in profile, but there seems no way to introduce /home/.fscrypt
>> into firejail, which cause all file and directory in separate /home
>> encrypted
>> with fscrypt inaccessible inside it.
> the fscrypt files are currently blocked via disable-common.inc:
>
> blacklist ${HOME}/.fscrypt
> blacklist /.fscrypt
> blacklist /home/.fscrypt
>
> (and also via the AppArmor firejail profile, if you use it)
>
> Can you add to your local override disable-common.local that
> these should be removed from the blacklist?
>
> noblacklist ${HOME}/.fscrypt
> noblacklist /.fscrypt
> noblacklist /home/.fscrypt
>
> Kind regards,
>   Reiner

Reply via email to