diff --git a/content/FAQ.md b/content/FAQ.md index 8a49e32..5c71b17 100644 --- a/content/FAQ.md +++ b/content/FAQ.md @@ -45,6 +45,7 @@ permalink: /faq - [Why am I unable to start containers?](#container-userns) - [How do I allow a specific container to be run?](#container-policy) - [How do I enable userns for other apps?](#unconfined-userns) + - [How do I manage potentially dangerous files or attachments?](#safe-pdfs) - [Why are Bluetooth kernel modules disabled? How do I enable them?](#bluetooth) - [How do I provision signed Distroboxes?](#distrobox-assemble) - [How do I customize secureblue?](#customization) @@ -347,6 +348,17 @@ ujust set-unconfined-userns on Attempting to bubblewrap a program without first enabling the ability toggled by the ujust above will result in a `bwrap: Creating new namespace failed: Permission denied` error, but beware that enabling it results in a security degradation. Consult our [user namespaces article](/articles/userns) for more details. +### [How do I manage potentially dangerous files or attachments?](#safe-pdfs) +{: #safe-pdfs} + +The program [Dangerzone](https://dangerzone.rocks/) is designed to sanitize potentially dangerous PDFs, office documents, or images in a sandboxed environment. To install Dangerzone, run: + +``` +ujust install-dangerzone +``` + +Note that this comes with a security trade-off: it requires enabling [container-domain user namespaces](#container-userns) and "admin-only attach" ptrace (`ptrace_scope` is set to `2`), allowing privileged users to attach to or trace child processes. Dangerzone runs Podman under the hood, and requires [gVisor](https://gvisor.dev/) to run document processing workloads in an isolated sandbox, [which needs Linux's ptrace subsystem to intercept system calls](https://gvisor.dev/blog/2024/09/23/safe-ride-into-the-dangerzone/). + ### [Why are Bluetooth kernel modules disabled? How do I enable them?](#bluetooth) {: #bluetooth}