mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #1581] Authentication in Firefox does not work #1053
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#1053
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @derba on GitHub (Sep 29, 2017).
Original GitHub issue: https://github.com/netblue30/firejail/issues/1581
I visited a site (I am not allowed to give you exact name, unfortunately) where Firefox stops responding. When run Firefox without Firejail then the page works fine, makes a pop up authentication window appear. That window is a real window, not an HTML one. When I removed seccomp line from firefox.profile that page works fine in Firefox even with Firejail.
In Chromium that page works fine. Well, there is no seccomp in chromium.profile by default. Actually Chromium does not even start up with seccomp. That is a good reason to prefer Firefox.
This is not a bug, I think, just FYI.
@smitsohu commented on GitHub (Sep 29, 2017):
Which versions of Firefox and Firejail do you use? There was a problem with the default seccomp filter and Firefox Nightly that got fixed in Firejail 0.9.50.
Failing that, and without wanting to lure you into making sensitive information public, would it be possible to share some more information with us, like for example if there is a browser extension or a plugin involved?
Regarding your note about Chromium: It comes already with a built-in sandbox, and the Firejail seccomp filter prevents Chromium from setting it up. Thanks to its own sandbox, firejailed Chromium is
about asnot less safe than a firejailed Firefox. If you are interested in some more technical details, take a peek at #554.@curiosity-seeker commented on GitHub (Oct 1, 2017):
@smitsohu
As mentioned in #554 that depends on the distro and on how the kernel is configured. FWIW, on my Fedora 26 system it works with:
I disagree. As mentioned here, only the renderer processes are sandboxed in Chromium but the broker process is not. With Firejail it is, though, which means that Chromium is much better confined than it is out of the box.
@derba commented on GitHub (Oct 2, 2017):
Sorry, I forgot to add details. I use Fedora 26, and... I just tried to find my firejail version using rpm when I realized that I compiled it from git source back in April. I completely forgot about that, since I am used to get the latest version by upgrading. It is shocking that Fedora (unlike Ubuntu) does not ship such a very basic tool. I cannot imagine a desktop without it.
@SkewedZeppelin commented on GitHub (Oct 2, 2017):
@derba I was actually recently looking into what it would take to get Firejail in the official Fedora repos, but it seems to be quite a lot of work.
https://fedoraproject.org/wiki/Join_the_package_collection_maintainers
https://fedoraproject.org/wiki/Packaging:Guidelines
And you can thank @reinerh for Firejail being in Debian and its derivatives.
To confirm though assuming you've now updated to 0.9.50, is this still an issue?
@derba commented on GitHub (Oct 2, 2017):
I pulled the latest master, compiled and installed it.
Still, the issue seems to be reproducible. Is there any way I could help finding out what is going on?
@smitsohu commented on GitHub (Oct 2, 2017):
@derba Do you find something in your syslog? Instructions here in the syslog section.
@smitsohu commented on GitHub (Oct 2, 2017):
@curiosity-seeker You're right in all your points, but reading the OP it looks that Chromium is setting up SUID jails here, so important Firejail features are not available for the broker process, and the conclusion which browser has better confinement is not as straightforward as in your case.
But agreed that Chromium with Firejail is always better than Chromium without, even more so if you can install ipc- and network namespaces.
@curiosity-seeker commented on GitHub (Oct 3, 2017):
@derba : Since you're using Fedora you can simply execute
journalctl -e | grep syscallfollowed by
firejail --debug-syscalls | grep xxxwhere xxx is the syscall number shown in the journal.
Hint: As I'm a lazy bugger I've added those aliases to ~/.bashrc in order to simplify these things:
@curiosity-seeker commented on GitHub (Oct 3, 2017):
@smitsohu
@derba also uses Fedora 26 (like myself), and
chrome://sandbox/reports that SUID is not used but a namespace sandbox. So my settings above should also work for him.Btw., even with a SUID jail the filesystem container would still apply. This is probably what @netblue30 was referring to when he once wrote:
The last sentence obviously applies to the broker process.
@smitsohu commented on GitHub (Oct 4, 2017):
@curiosity-seeker all you write looks pretty uncontroversial to me, and if @derba can install a seccomp filter for Chromium, the better.
But one final question, you got me curious. Do we have disagreement on
when renderer processes run in SUID jails?
@curiosity-seeker commented on GitHub (Oct 4, 2017):
@smitsohu : No, we don't disagree here ;-)
@derba commented on GitHub (Oct 10, 2017):
journalctl printout:
Oct 10 17:05:47 localhost.localdomain audit[11912]: SECCOMP auid=1000 uid=1000 gid=1000 ses=2 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 pid=11912 comm=4C617A792049646C65 exe="/usr/lib64/firefox/firefox" sig=31 arch=c000003e syscall=250 compat=0 ip=0x7f67d7dfa559 code=0x0
$ firejail --debug-syscalls | grep 250
250 - keyctl
@smitsohu commented on GitHub (Oct 10, 2017):
Cool. Now it is easy. Just replace in firefox.profile
seccompwith the following long line:seccomp.drop @cpu-emulation,@debug,@obsolete,@privileged,@resources,add_key,fanotify_init,io_cancel,io_destroy,io_getevents,io_setup,io_submit,ioprio_set,kcmp,name_to_handle_at,ni_syscall,open_by_handle_at,personality,process_vm_readv,ptrace,remap_file_pages,request_key,syslog,umount,userfaultfd,vmsplicewhich blacklists all syscalls from the default filter but not keyctl, and you're ready to go.
@derba commented on GitHub (Oct 17, 2017):
@SpotComms I see that it would be a burden to be on official package maintainer. After all, Firejail missing makes Fedora as well as CentOS and RHEL inferior to Debian-based distros. So it is the job of RH to fix their distro to fit corporation desktop space.
Well, in that aspect Windows does not fit for commercial use either. BTW, I had a chance to speak to a renowned Windows security expert and I mentioned Firejail. He admitted that using Windows is a huge risk compared to Linux + Firejail. (Not to mention the hordes of outdated sw and horrible update services running as admin on Windows, compared to Linux package management.)
But what about RPM Fusion? Is their policy horrible, too?