1SANDBOX(8) User Commands SANDBOX(8)
2
3
4
6 sandbox - Run cmd under an SELinux sandbox
7
9 sandbox [-C] [-s] [ -d DPI ] [-l level ] [[-M | -X] -H homedir -T tem‐
10 pdir ] [-I includefile ] [ -W windowmanager ] [ -w windowsize ] [[-i
11 file ]...] [ -t type ] cmd
12
13 sandbox [-C] [-s] [ -d DPI ] [-l level ] [[-M | -X] -H homedir -T tem‐
14 pdir ] [-I includefile ] [ -W windowmanager ] [ -w windowsize ] [[-i
15 file ]...] [ -t type ] -S
16
18 Run the cmd application within a tightly confined SELinux domain. The
19 default sandbox domain only allows applications the ability to read and
20 write stdin, stdout and any other file descriptors handed to it. It is
21 not allowed to open any other files. The -M option will mount an
22 alternate homedir and tmpdir to be used by the sandbox.
23
24 If you have the policycoreutils-sandbox package installed, you can use
25 the -X option and the -M option. sandbox -X allows you to run X appli‐
26 cations within a sandbox. These applications will start up their own X
27 Server and create a temporary home directory and /tmp. The default
28 SELinux policy does not allow any capabilities or network access. It
29 also prevents all access to the users other processes and files. Files
30 specified on the command that are in the home directory or /tmp will be
31 copied into the sandbox directories.
32
33 If directories are specified with -H or -T the directory will have its
34 context modified with chcon(1) unless a level is specified with -l. If
35 the MLS/MCS security level is specified, the user is responsible to set
36 the correct labels.
37
38 -h --help
39 display usage message
40
41 -H --homedir
42 Use alternate homedir to mount over your home directory.
43 Defaults to temporary. Requires -X or -M.
44
45 -i --include
46 Copy this file into the appropriate temporary sandbox directory.
47 Command can be repeated.
48
49 -I --includefile
50 Copy all files listed in inputfile into the appropriate tempo‐
51 rary sandbox directories.
52
53 -l --level
54 Specify the MLS/MCS Security Level to run the sandbox with.
55 Defaults to random.
56
57 -M --mount
58 Create a Sandbox with temporary files for $HOME and /tmp.
59
60 -s --shred
61 Shred temporary files created in $HOME and /tmp, before delet‐
62 ing.
63
64 -t --type
65 Use alternate sandbox type, defaults to sandbox_t or sandbox_x_t
66 for -X.
67
68 Examples:
69 sandbox_t - No X, No Network Access, No Open, read/write on
70 passed in file descriptors.
71 sandbox_min_t - No Network Access
72 sandbox_x_t - Ports for X applications to run locally
73 sandbox_web_t - Ports required for web browsing
74 sandbox_net_t - Network ports (for server software)
75 sandbox_net_client_t - All network ports
76
77
78 -T --tmpdir
79 Use alternate temporary directory to mount on /tmp. Defaults to
80 tmpfs. Requires -X or -M.
81
82 -S --session
83 Run a full desktop session, Requires level, and home and tmpdir.
84
85 -w --windowsize
86
87 Specifies the windowsize when creating an X based Sandbox. The
88 default windowsize is 1000x700.
89
90 -W --windowmanager
91 Select alternative window manager to run within sandbox -X.
92 Default to /usr/bin/matchbox-window-manager.
93
94 -X Create an X based Sandbox for gui apps, temporary files for
95 $HOME and /tmp, secondary Xserver, defaults to sandbox_x_t
96
97 -d --dpi
98 Set the DPI value for the sandbox X Server. Defaults to the cur‐
99 rent X Sever DPI.
100
101 -C --capabilities Use capabilities within the
102 sandbox. By default applications executed within the sandbox
103 will not be allowed to use capabilities (setuid apps), with the
104 -C flag, you can use programs requiring capabilities.
105
107 runcon(1), seunshare(8), selinux(8)
108
110 This manual page was written by Dan Walsh <dwalsh@redhat.com> and
111 Thomas Liu <tliu@fedoraproject.org>
112
113
114
115sandbox May 2010 SANDBOX(8)