mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #1972] [SOLVED] running chromium from snap in Firejail #1325
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#1325
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @omega3 on GitHub (May 31, 2018).
Original GitHub issue: https://github.com/netblue30/firejail/issues/1972
I need support. Please explain it to me:
firejail version 0.9.18-rc1
Linux distribution: Kubuntu 14.04
firejail --noprofile chromium
Error: invalid --noprofile command line option
So far I used chromium installed from deb (on Ubuntu 14.04) and snadboxed it fith firejail. Chromium is not available from repositories as deb anymore. So, I installed chromium snap package.
So far I used firejail profile:
firejail --profile=/media/data/backup/jailkonf/.config/jail.profile --seccomp --private=/media/data/backup/jail/ chromium-browserIt worked. But after installing chromium from snap package I noticed that it has a long entry in startmenu:
env BAMF_DESKTOP_FILE_HINT=/var/lib/snapd/desktop/applications/chromium_chromium.desktop /snap/bin/chromium %UCombining those two like that:
firejail --profile=/media/data/backup/jailkonf/.config/jail.profile --seccomp --private=/media/data/backup/jail/ env BAMF_DESKTOP_FILE_HINT=/var/lib/snapd/desktop/applications/chromium_chromium.desktop /snap/bin/chromium %Udoesn't work.
This also doesn't work:
I want to be able to use my old chromium profile with this snap version. How to do it?
How can I run chromium with firejail?
The second issue: isn't chromium as snap sandboxed anyway? Would running it with firejail make sense?
@SkewedZeppelin commented on GitHub (May 31, 2018):
First things first, please update your Firejail version, that is almost 4 years old (!) and has many known issues and vulnerabilities. Newer versions are available here. If possible I'd recommend upgrading your distribution as well, so you can use the packaged versions instead of ppas/snaps/etc.
Next you can try running it again, similar to what you used
however the profiles have changed dramatically since then and won't work, so try the following instead
Lastly, snaps/flatpaks do provide some sandboxing, however most do not take full advantage and are often not too strict, where as Firejail profiles are typically much stricter.
@omega3 commented on GitHub (May 31, 2018):
I updated firejail to the newest deb.
BAMF_DESKTOP_FILE_HINT=/var/lib/snapd/desktop/applications/chromium_chromium.desktop firejail --profile=/etc/firejail/chromium.profile --private=/media/data/backup/jail/ /snap/bin/chromiumreturns
/media/dane/backup/jailkonf/.config/jail.profile
This profile I have for non sudo user. So, it is second user account and it doesn't have sudo previliges.
Edit
After command
sudo snap connect chromium:removable-mediachromium can read / access other chromium profiles from /media/data
but error is still the same
Is it a bug that firejail cannot read profiles from /etc/firejail
@Vincent43 commented on GitHub (Jun 4, 2018):
Honestly, it's the opposite. Firejail can't match strictness and granularity of flatpak/snap sandboxing. The price for that is installing packages out of repos.
@omega3 Using firejail with snap/flatpak isn't what you want. Firejail will break their own sandboxes and decrease security. Don't do this. They're good on their own.