[GH-ISSUE #1980] firejail prevents id.fedoraproject.org redirection in firefox #1330

Closed
opened 2026-05-05 07:52:58 -06:00 by gitea-mirror · 14 comments
Owner

Originally created by @covex on GitHub (Jun 5, 2018).
Original GitHub issue: https://github.com/netblue30/firejail/issues/1980

Using firejail for a long time, the whole time it happens, that when I want to login to some site using id.fedoraproject.org the redirection freezes and on firefox (59) quit, it crashes.

For example, using http://pagure.io/ clicking on Login should redirect you to an id.fedoraproject.org but it does not. Without firejail it works as expected. I did not found anything using firejail debug mode. Not sure what could be causing this.

Originally created by @covex on GitHub (Jun 5, 2018). Original GitHub issue: https://github.com/netblue30/firejail/issues/1980 Using firejail for a long time, the whole time it happens, that when I want to login to some site using id.fedoraproject.org the redirection freezes and on firefox (59) quit, it crashes. For example, using http://pagure.io/ clicking on Login should redirect you to an id.fedoraproject.org but it does not. Without firejail it works as expected. I did not found anything using firejail debug mode. Not sure what could be causing this.
Author
Owner

@chiraag-nataraj commented on GitHub (Jun 5, 2018):

Huh. So I just tried this and it seems to be working with the profile I use. I'll give it a try with the default profile and report back.

<!-- gh-comment-id:394690585 --> @chiraag-nataraj commented on GitHub (Jun 5, 2018): Huh. So I just tried this and it seems to be working with the profile I use. I'll give it a try with the default profile and report back.
Author
Owner

@chiraag-nataraj commented on GitHub (Jun 5, 2018):

Okay, so it worked with the default profile as well. I'm also using Firefox 61b8 though, so idk if that is relevant.

Does anything appear in the syslog? It could be that some weird syscall is required (it sounds like the seccomp filter is kicking in and blocking something firefox needs, which forces it to crash).

<!-- gh-comment-id:394691227 --> @chiraag-nataraj commented on GitHub (Jun 5, 2018): Okay, so it worked with the default profile as well. I'm also using Firefox 61b8 though, so idk if that is relevant. Does anything appear in the syslog? It could be that some weird syscall is required (it sounds like the seccomp filter is kicking in and blocking something firefox needs, which forces it to crash).
Author
Owner

@covex commented on GitHub (Jun 5, 2018):

OK, here is what I found in the syslog when I clicked at Login:

Jun  5 16:14:34 me audit[8401]: SECCOMP auid=500 uid=500 gid=500 ses=6 pid=8401 comm=4C617A792049646C65 exe="/usr/lib64/firefox/firefox" sig=31 arch=c000003e syscall=250 compat=0 ip=0x7f442d2ffb99 code=0x0
Jun  5 16:14:34 me kernel: audit: type=1326 audit(1528208074.196:3753): auid=500 uid=500 gid=500 ses=6 pid=8401 comm=4C617A792049646C65 exe="/usr/lib64/firefox/firefox" sig=31 arch=c000003e syscall=250 compat=0 ip=0x7f442d2ffb99 code=0x0
<!-- gh-comment-id:394726465 --> @covex commented on GitHub (Jun 5, 2018): OK, here is what I found in the syslog when I clicked at Login: ``` Jun 5 16:14:34 me audit[8401]: SECCOMP auid=500 uid=500 gid=500 ses=6 pid=8401 comm=4C617A792049646C65 exe="/usr/lib64/firefox/firefox" sig=31 arch=c000003e syscall=250 compat=0 ip=0x7f442d2ffb99 code=0x0 Jun 5 16:14:34 me kernel: audit: type=1326 audit(1528208074.196:3753): auid=500 uid=500 gid=500 ses=6 pid=8401 comm=4C617A792049646C65 exe="/usr/lib64/firefox/firefox" sig=31 arch=c000003e syscall=250 compat=0 ip=0x7f442d2ffb99 code=0x0 ```
Author
Owner

@covex commented on GitHub (Jun 5, 2018):

Then when I try to quit firefox it crashes with core dump:

Jun  5 16:18:53 me audit[8953]: SECCOMP auid=500 uid=500 gid=500 ses=6 pid=8953 comm="Shutdow~minator" exe="/usr/lib64/firefox/firefox" sig=31 arch=c000003e syscall=101 compat=0 ip=0x7f442110f34f code=0x0
Jun  5 16:18:53 me kernel: audit: type=1326 audit(1528208333.342:3756): auid=500 uid=500 gid=500 ses=6 pid=8953 comm="Shutdow~minator" exe="/usr/lib64/firefox/firefox" sig=31 arch=c000003e syscall=101 compat=0 ip=0x7f442110f34f code=0x0
Jun  5 16:18:53 me kernel: audit: type=1701 audit(1528208333.342:3757): auid=500 uid=500 gid=500 ses=6 pid=8953 comm="Shutdow~minator" exe="/usr/lib64/firefox/firefox" sig=31 res=1
Jun  5 16:18:53 me audit[8953]: ANOM_ABEND auid=500 uid=500 gid=500 ses=6 pid=8953 comm="Shutdow~minator" exe="/usr/lib64/firefox/firefox" sig=31 res=1
Jun  5 16:18:53 me systemd[1]: Started Process Core Dump (PID 8954/UID 0).
Jun  5 16:18:53 me kernel: audit: type=1130 audit(1528208333.362:3758): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-coredump@5-8954-0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jun  5 16:18:53 me audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-coredump@5-8954-0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jun  5 16:18:55 me firejail[1]: monitoring pid 309#012
Jun  5 16:18:56 me systemd-coredump[8955]: Process 8953 (Shutdow~minator) of user 500 dumped core.#012#012Stack trace of thread 308:#012#0  0x00007f442110f34f _ZN15google_breakpad17LinuxPtraceDumper14ThreadsSuspendEv (libxul.so)#012#1  0x00007f4421117b72 _ZN12_GLOBAL__N_117WriteMinidumpImplEPKciliPKvmRKNSt7__cxx114listIN15google_breakpad12MappingEntryESaIS7_EEERKNS5_INS6_9AppMemoryESaISC_EEE (libxul.so)#012#2  0x00007f442111a0a4 _ZN15google_breakpad16ExceptionHandler6DoDumpEiPKvm (libxul.so)#012#3  0x00007f442111a100 _ZN15google_breakpad16ExceptionHandler11ThreadEntryEPv (libxul.so)#012#4  0x00007f4421110e7b _ZN15google_breakpad16ExceptionHandler12GenerateDumpEPNS0_12CrashContextE (libxul.so)
Jun  5 16:18:57 me audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-coredump@5-8954-0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jun  5 16:18:57 me kernel: audit: type=1131 audit(1528208337.019:3759): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-coredump@5-8954-0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jun  5 16:18:57 me firejail[8397]: exiting...
<!-- gh-comment-id:394728070 --> @covex commented on GitHub (Jun 5, 2018): Then when I try to quit firefox it crashes with core dump: ``` Jun 5 16:18:53 me audit[8953]: SECCOMP auid=500 uid=500 gid=500 ses=6 pid=8953 comm="Shutdow~minator" exe="/usr/lib64/firefox/firefox" sig=31 arch=c000003e syscall=101 compat=0 ip=0x7f442110f34f code=0x0 Jun 5 16:18:53 me kernel: audit: type=1326 audit(1528208333.342:3756): auid=500 uid=500 gid=500 ses=6 pid=8953 comm="Shutdow~minator" exe="/usr/lib64/firefox/firefox" sig=31 arch=c000003e syscall=101 compat=0 ip=0x7f442110f34f code=0x0 Jun 5 16:18:53 me kernel: audit: type=1701 audit(1528208333.342:3757): auid=500 uid=500 gid=500 ses=6 pid=8953 comm="Shutdow~minator" exe="/usr/lib64/firefox/firefox" sig=31 res=1 Jun 5 16:18:53 me audit[8953]: ANOM_ABEND auid=500 uid=500 gid=500 ses=6 pid=8953 comm="Shutdow~minator" exe="/usr/lib64/firefox/firefox" sig=31 res=1 Jun 5 16:18:53 me systemd[1]: Started Process Core Dump (PID 8954/UID 0). Jun 5 16:18:53 me kernel: audit: type=1130 audit(1528208333.362:3758): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-coredump@5-8954-0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 5 16:18:53 me audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-coredump@5-8954-0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 5 16:18:55 me firejail[1]: monitoring pid 309#012 Jun 5 16:18:56 me systemd-coredump[8955]: Process 8953 (Shutdow~minator) of user 500 dumped core.#012#012Stack trace of thread 308:#012#0 0x00007f442110f34f _ZN15google_breakpad17LinuxPtraceDumper14ThreadsSuspendEv (libxul.so)#012#1 0x00007f4421117b72 _ZN12_GLOBAL__N_117WriteMinidumpImplEPKciliPKvmRKNSt7__cxx114listIN15google_breakpad12MappingEntryESaIS7_EEERKNS5_INS6_9AppMemoryESaISC_EEE (libxul.so)#012#2 0x00007f442111a0a4 _ZN15google_breakpad16ExceptionHandler6DoDumpEiPKvm (libxul.so)#012#3 0x00007f442111a100 _ZN15google_breakpad16ExceptionHandler11ThreadEntryEPv (libxul.so)#012#4 0x00007f4421110e7b _ZN15google_breakpad16ExceptionHandler12GenerateDumpEPNS0_12CrashContextE (libxul.so) Jun 5 16:18:57 me audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-coredump@5-8954-0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 5 16:18:57 me kernel: audit: type=1131 audit(1528208337.019:3759): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-coredump@5-8954-0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 5 16:18:57 me firejail[8397]: exiting... ```
Author
Owner

@chiraag-nataraj commented on GitHub (Jun 5, 2018):

If you do a firejail --debug-syscalls | grep 250, does it give you keyctl? Does firejail --ignore=seccomp firefox work properly?

<!-- gh-comment-id:394730817 --> @chiraag-nataraj commented on GitHub (Jun 5, 2018): If you do a `firejail --debug-syscalls | grep 250`, does it give you `keyctl`? Does `firejail --ignore=seccomp firefox` work properly?
Author
Owner

@covex commented on GitHub (Jun 5, 2018):

$ firejail --debug-syscalls | grep 250
250     - keyctl

with --ignore=seccomp the redirection works, no crash.

<!-- gh-comment-id:394835612 --> @covex commented on GitHub (Jun 5, 2018): ``` $ firejail --debug-syscalls | grep 250 250 - keyctl ``` with --ignore=seccomp the redirection works, no crash.
Author
Owner

@chiraag-nataraj commented on GitHub (Jun 5, 2018):

Okay, so my suspicion was correct. This is really weird, though, since it means firefox is performing manipulations of the kernel's keyring... @netblue30, any idea why this could be happening?

<!-- gh-comment-id:394836541 --> @chiraag-nataraj commented on GitHub (Jun 5, 2018): Okay, so my suspicion was correct. This is really weird, though, since it means firefox is performing manipulations of the kernel's keyring... @netblue30, any idea why this could be happening?
Author
Owner

@covex commented on GitHub (Jun 5, 2018):

id.fedoraproject.org is a fedora OpenID site serving as a centralized authorization facility for fedora infrastructure. I could imagine it may be trying to search some keys via keyctl. I may ask on fedora lists.
So to solve this, should I add a seccomp.keep keyctl to my firefox profile?

<!-- gh-comment-id:394841464 --> @covex commented on GitHub (Jun 5, 2018): id.fedoraproject.org is a fedora OpenID site serving as a centralized authorization facility for fedora infrastructure. I could imagine it may be trying to search some keys via keyctl. I may ask on fedora lists. So to solve this, should I add a seccomp.keep keyctl to my firefox profile?
Author
Owner

@chiraag-nataraj commented on GitHub (Jun 5, 2018):

id.fedoraproject.org is a fedora OpenID site serving as a centralized authorization facility for fedora infrastructure. I could imagine it may be trying to search some keys via keyctl.

That doesn't make any sense, since it worked perfectly fine here on Debian (unless you're saying you weren't able to log in? I didn't try that, since I don't have Fedora credentials).

So to solve this, should I add a seccomp.keep keyctl to my firefox profile?

No, that would only allow keyctl 😜 The easiest is probably to edit /etc/firejail/firefox-common.profile to not include keyctl.

<!-- gh-comment-id:394846393 --> @chiraag-nataraj commented on GitHub (Jun 5, 2018): > id.fedoraproject.org is a fedora OpenID site serving as a centralized authorization facility for fedora infrastructure. I could imagine it may be trying to search some keys via keyctl. That doesn't make any sense, since it worked perfectly fine here on Debian (unless you're saying you weren't able to log in? I didn't try that, since I don't have Fedora credentials). > So to solve this, should I add a seccomp.keep keyctl to my firefox profile? No, that would _only_ allow `keyctl` :stuck_out_tongue_winking_eye: The easiest is probably to edit `/etc/firejail/firefox-common.profile` to not include `keyctl`.
Author
Owner

@chiraag-nataraj commented on GitHub (Jun 7, 2018):

@covex, did removing keyctl from the list of syscalls in /etc/firejail/firefox.profile work?

<!-- gh-comment-id:395565916 --> @chiraag-nataraj commented on GitHub (Jun 7, 2018): @covex, did removing `keyctl` from the list of syscalls in `/etc/firejail/firefox.profile` work?
Author
Owner

@covex commented on GitHub (Jun 8, 2018):

I am using an older version of firejail 0.9.48 there is nothing like this in any firefox config. I was trying to update to latest version 0.9.54, however there is a new feature to specify users that may use firejail in firejail.users, but even thou I configured it with firecfg and added username there, the user was not able to start the firejail. So I gave up and downgraded to 0.9.48, but there is no keyctl in the config. I do not have a solution ATM.

<!-- gh-comment-id:395673138 --> @covex commented on GitHub (Jun 8, 2018): I am using an older version of firejail 0.9.48 there is nothing like this in any firefox config. I was trying to update to latest version 0.9.54, however there is a new feature to specify users that may use firejail in firejail.users, but even thou I configured it with firecfg and added username there, the user was not able to start the firejail. So I gave up and downgraded to 0.9.48, but there is no keyctl in the config. I do not have a solution ATM.
Author
Owner

@chiraag-nataraj commented on GitHub (Jun 12, 2018):

Try this instead of the seccomp line:

seccomp.drop mount,umount2,ptrace,kexec_load,kexec_file_load,name_to_handle_at,open_by_handle_at,create_module,init_module,finit_module,delete_module,iopl,ioperm,ioprio_set,swapon,swapoff,syslog,process_vm_readv,process_vm_writev,sysfs,_sysctl,adjtimex,clock_adjtime,perf_event_open,fanotify_init,kcmp,add_key,request_key,uselib,acct,modify_ldt,pivot_root,io_setup,io_destroy,io_getevents,io_submit,io_cancel,remap_file_pages,mbind,get_mempolicy,set_mempolicy,migrate_pages,move_pages,vmsplice,chroot,tuxcall,reboot,mfsservctl,get_kernel_syms,bpf,clock_settime,personality,process_vm_writev,query_module,settimeofday,stime,umount,userfaultfd,ustat,vm86,vm86old
<!-- gh-comment-id:396558378 --> @chiraag-nataraj commented on GitHub (Jun 12, 2018): Try this instead of the `seccomp` line: ``` seccomp.drop mount,umount2,ptrace,kexec_load,kexec_file_load,name_to_handle_at,open_by_handle_at,create_module,init_module,finit_module,delete_module,iopl,ioperm,ioprio_set,swapon,swapoff,syslog,process_vm_readv,process_vm_writev,sysfs,_sysctl,adjtimex,clock_adjtime,perf_event_open,fanotify_init,kcmp,add_key,request_key,uselib,acct,modify_ldt,pivot_root,io_setup,io_destroy,io_getevents,io_submit,io_cancel,remap_file_pages,mbind,get_mempolicy,set_mempolicy,migrate_pages,move_pages,vmsplice,chroot,tuxcall,reboot,mfsservctl,get_kernel_syms,bpf,clock_settime,personality,process_vm_writev,query_module,settimeofday,stime,umount,userfaultfd,ustat,vm86,vm86old ```
Author
Owner

@chiraag-nataraj commented on GitHub (Jul 15, 2018):

@covex Did you try that seccomp line? Did it work?

<!-- gh-comment-id:405117380 --> @chiraag-nataraj commented on GitHub (Jul 15, 2018): @covex Did you try that `seccomp` line? Did it work?
Author
Owner

@chiraag-nataraj commented on GitHub (Jul 21, 2018):

Closing because of no response. @covex, feel free to re-open if you were able to try that seccomp line.

<!-- gh-comment-id:406821283 --> @chiraag-nataraj commented on GitHub (Jul 21, 2018): Closing because of no response. @covex, feel free to re-open if you were able to try that `seccomp` line.
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference: github-starred/firejail#1330
No description provided.