mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #1553] private-dev disables access for U2F #1034
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#1034
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @hlieberman on GitHub (Sep 15, 2017).
Original GitHub issue: https://github.com/netblue30/firejail/issues/1553
Because private-dev doesn't allow access to raw USB HID devices, it's currently not possible to use a firejailed version of a browser.
I think it makes a lot of sense for private-dev to restrict access to these devices in the general case, but perhaps a way to allow you to white-list additional devices would be a way to work around this issue? That way, browsers could opt-in to slightly increase their attack surface by just allowing usb HID access (/dev/usb/hiddev*), as opposed to disabling private-dev altogether.
@SkewedZeppelin commented on GitHub (Sep 15, 2017):
See #1176 and #1381
Duplicate of #1446
@hlieberman commented on GitHub (Sep 15, 2017):
@SpotComms, forgive me, but... #1446 doesn't seem to indicate you're able to mix whitelisting with private-dev.
When I try the simple thing of
It launches Firefox in a way that it can't write to the screen, and quickly crashes. I don't think you can whitelist devices inside of private-dev?
@SkewedZeppelin commented on GitHub (Sep 15, 2017):
Yes, #1446 was closed but the idea (fine-grained control of /dev) has still not been implemented.
private-devdoesn't take into accountwhitelist. For now the only option is just commentingprivate-dev.@smitsohu commented on GitHub (Sep 15, 2017):
It is actually possible to run without private-dev
and it will replicate what private-dev does, plus whitelisting the HID. It is possible you need to take out
whitelist /dev/log.Maybe it can serve as a workaround for you until we have something better.
@netblue30 commented on GitHub (Sep 18, 2017):
I think we should do it. What entries in /dev are these devices bringing in?
@hlieberman commented on GitHub (Sep 21, 2017):
/dev/usb/hiddev[0-9]+.
Both FF (nightly) and Chrome will need it.
@hlieberman commented on GitHub (Sep 21, 2017):
For the record, the whitelisting trick doesn't work. I'm not sure exactly why; I can see the device when I navigate to /dev/usb through the browser, but it doesn't work even on u2f demo pages. (https://demo.yubico.com/u2f).
@chiraag-nataraj commented on GitHub (Jun 11, 2018):
@hlieberman I had the same issue until I tried plugging in the Yubikey before starting firefox. That works perfectly fine. My guess is that the Yubikey gets confused for some reason and switches into OTP mode, thus not allowing U2F authentication. I'm opening a separate bug for that.
@chiraag-nataraj commented on GitHub (Jun 12, 2018):
Solved with
197bcc86c1(read the comments at #1990 if you're curious as to why the Yubikey doesn't work if you remove it and plug it back in while thefirejail'd program is running).