mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #2891] firefox access to gpg-agent-browser.socket #1805
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#1805
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @valoq on GitHub (Aug 6, 2019).
Original GitHub issue: https://github.com/netblue30/firejail/issues/2891
If I am not mistaken, the default firefox profile allows access to /etc
There is a browser specific socket file for the gpg-agent in the following path
/etc/systemd/user/sockets.target.wants/gpg-agent-browser.socket
The gpg-agent-browser.socket allows web browsers to access the gpg-agent daemon.
Worst case, if the user unlocked their gpg key, the browser can use the connection to the agent to sign or decrypt files with the users key without a password prompt (for a few minutes, depending on the config of gpg-agent)
Not sure how to test/use this access via browser.
Can someone please verify if this indeed the case?
@rusty-snake commented on GitHub (Aug 6, 2019):
Right, but you can use
private-etcin firefox and firefox-common.I doesn't have this file, this systemd socket-unit and it not in the repos (using Fedora), but I found this: https://wiki.archlinux.org/index.php/GnuPG
Probably we should add
blacklist /etc/systemd/user/sockets.target.wants/gpg-agent-browser.socketintodisable-common.inc.@Vincent43 commented on GitHub (Aug 7, 2019):
/etc/systemd/user/sockets.target.wants/gpg-agent-browser.socketis symlink to socket config file, not a socket itself. The socket is in/run/user/$UID/gnupg/S.gpg-agent.browser.