[GH-ISSUE #2945] Signal 1.27 Fails to Start #1839

Closed
opened 2026-05-05 08:30:23 -06:00 by gitea-mirror · 9 comments
Owner

Originally created by @ilikenwf on GitHub (Sep 6, 2019).
Original GitHub issue: https://github.com/netblue30/firejail/issues/2945

Seems to be some electron/SUID related thing?

Child process initialized in 192.25 ms
[8:0906/181049.449425:FATAL:setuid_sandbox_host.cc(157)] The SUID sandbox helper binary was found, but is not configured correctly. Rather than run without sandboxing I'm aborting now. You need to make sure that /usr/lib/electron/chrome-sandbox is owned by root and has mode 4755.
/usr/bin/signal-desktop: line 3:     8 Trace/breakpoint trap   (core dumped) electron /usr/lib/signal/resources/app.asar $@
Originally created by @ilikenwf on GitHub (Sep 6, 2019). Original GitHub issue: https://github.com/netblue30/firejail/issues/2945 Seems to be some electron/SUID related thing? ``` Child process initialized in 192.25 ms [8:0906/181049.449425:FATAL:setuid_sandbox_host.cc(157)] The SUID sandbox helper binary was found, but is not configured correctly. Rather than run without sandboxing I'm aborting now. You need to make sure that /usr/lib/electron/chrome-sandbox is owned by root and has mode 4755. /usr/bin/signal-desktop: line 3: 8 Trace/breakpoint trap (core dumped) electron /usr/lib/signal/resources/app.asar $@ ```
gitea-mirror 2026-05-05 08:30:23 -06:00
  • closed this issue
  • added the
    bug
    label
Author
Owner

@rusty-snake commented on GitHub (Sep 6, 2019):

At least chroot is requiered, firejail-git: seccomp !chroot.

@ilikenwf can you try this: firejail --ignore=nonewprivs --ignore=noroot --ignore=protocol --ignore=seccomp --ignore=caps.drop --caps.keep=sys_admin,sys_chroot signal (#2933)

<!-- gh-comment-id:529043771 --> @rusty-snake commented on GitHub (Sep 6, 2019): ~At least chroot is requiered, firejail-git: `seccomp !chroot`.~ @ilikenwf can you try this: `firejail --ignore=nonewprivs --ignore=noroot --ignore=protocol --ignore=seccomp --ignore=caps.drop --caps.keep=sys_admin,sys_chroot signal` (#2933)
Author
Owner

@ilikenwf commented on GitHub (Sep 6, 2019):

That did indeed work.

On 9/6/19 6:18 PM, rusty-snake wrote:

|firejail --ignore=nonewprivs --ignore=noroot --ignore=protocol
--ignore=seccomp --ignore=caps.drop --caps.keep=sys_admin,sys_chroot
signal|

<!-- gh-comment-id:529043949 --> @ilikenwf commented on GitHub (Sep 6, 2019): That did indeed work. On 9/6/19 6:18 PM, rusty-snake wrote: > |firejail --ignore=nonewprivs --ignore=noroot --ignore=protocol > --ignore=seccomp --ignore=caps.drop --caps.keep=sys_admin,sys_chroot > signal|
Author
Owner

@corecontingency commented on GitHub (Sep 7, 2019):

I don't think that signal has moved to the full chromium sandbox of skype yet, as it seemed to work fine on my system just replacing seccomp with seccomp !chroot. No errors showed up in journal or using firejail --debug signal-desktop.

I'm not sure how future proof this will be for future versions, if the signal devs do expand the sandbox, but for now I think just the seccomp !chroot will do, unless we want to do some future-proofing at the expense of security. (Disabling seccomp entirely should be a last resort, IMHO)

<!-- gh-comment-id:529054090 --> @corecontingency commented on GitHub (Sep 7, 2019): I don't think that signal has moved to the full chromium sandbox of skype yet, as it seemed to work fine on my system just replacing `seccomp` with `seccomp !chroot`. No errors showed up in journal or using `firejail --debug signal-desktop`. I'm not sure how future proof this will be for future versions, if the signal devs do expand the sandbox, but for now I think just the `seccomp !chroot` will do, unless we want to do some future-proofing at the expense of security. (Disabling seccomp entirely should be a last resort, IMHO)
Author
Owner

@rusty-snake commented on GitHub (Sep 7, 2019):

@ilikenwf can you confirm that addintg this to signal.local works.
firejail-git: seccomp !chroot
firejail 0.9.60 and previous:

ignore seccomp
seccomp.drop @clock,@cpu-emulation,@debug,@module,@obsolete,@raw-io,@reboot,@resources,@swap,acct,add_key,bpf,fanotify_init,io_cancel,io_destroy,io_getevents,ioprio_set,io_setup,io_submit,kcmp,keyctl,mincore,mount,name_to_handle_at,nfsservctl,ni_syscall,open_by_handle_at,pivot_root,remap_file_pages,request_key,setdomainname,sethostname,syslog,umount,umount2,userfaultfd,vhangup,vmsplice
<!-- gh-comment-id:529091988 --> @rusty-snake commented on GitHub (Sep 7, 2019): @ilikenwf can you confirm that addintg this to `signal.local` works. firejail-git: `seccomp !chroot` firejail 0.9.60 and previous: ``` ignore seccomp seccomp.drop @clock,@cpu-emulation,@debug,@module,@obsolete,@raw-io,@reboot,@resources,@swap,acct,add_key,bpf,fanotify_init,io_cancel,io_destroy,io_getevents,ioprio_set,io_setup,io_submit,kcmp,keyctl,mincore,mount,name_to_handle_at,nfsservctl,ni_syscall,open_by_handle_at,pivot_root,remap_file_pages,request_key,setdomainname,sethostname,syslog,umount,umount2,userfaultfd,vhangup,vmsplice ```
Author
Owner

@ilikenwf commented on GitHub (Sep 7, 2019):

That does not work.

On Sat, Sep 7, 2019 at 9:44 AM rusty-snake notifications@github.com wrote:

@ilikenwf https://github.com/ilikenwf can you confirm that addintg this
to signal.local works.
firejail-git: seccomp !chroot
firejail 0.9.60 and previous:

ignore seccomp
seccomp.drop @clock,@cpu-emulation,@debug,@module,@obsolete,@raw-io,@reboot,@resources,@swap,acct,add_key,bpf,fanotify_init,io_cancel,io_destroy,io_getevents,ioprio_set,io_setup,io_submit,kcmp,keyctl,mincore,mount,name_to_handle_at,nfsservctl,ni_syscall,open_by_handle_at,pivot_root,remap_file_pages,request_key,setdomainname,sethostname,syslog,umount,umount2,userfaultfd,vhangup,vmsplice


You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
https://github.com/netblue30/firejail/issues/2945?email_source=notifications&email_token=AADFIORRVRBVSGSKPTPKAA3QINZYFA5CNFSM4IUN33I2YY3PNVWWK3TUL52HS4DFVREXG43VMVBW63LNMVXHJKTDN5WW2ZLOORPWSZGOD6EU3FA#issuecomment-529091988,
or mute the thread
https://github.com/notifications/unsubscribe-auth/AADFIOXHN6PCAVEB4SHRCSTQINZYFANCNFSM4IUN33IQ
.

<!-- gh-comment-id:529131611 --> @ilikenwf commented on GitHub (Sep 7, 2019): That does not work. On Sat, Sep 7, 2019 at 9:44 AM rusty-snake <notifications@github.com> wrote: > @ilikenwf <https://github.com/ilikenwf> can you confirm that addintg this > to signal.local works. > firejail-git: seccomp !chroot > firejail 0.9.60 and previous: > > ignore seccomp > seccomp.drop @clock,@cpu-emulation,@debug,@module,@obsolete,@raw-io,@reboot,@resources,@swap,acct,add_key,bpf,fanotify_init,io_cancel,io_destroy,io_getevents,ioprio_set,io_setup,io_submit,kcmp,keyctl,mincore,mount,name_to_handle_at,nfsservctl,ni_syscall,open_by_handle_at,pivot_root,remap_file_pages,request_key,setdomainname,sethostname,syslog,umount,umount2,userfaultfd,vhangup,vmsplice > > — > You are receiving this because you were mentioned. > Reply to this email directly, view it on GitHub > <https://github.com/netblue30/firejail/issues/2945?email_source=notifications&email_token=AADFIORRVRBVSGSKPTPKAA3QINZYFA5CNFSM4IUN33I2YY3PNVWWK3TUL52HS4DFVREXG43VMVBW63LNMVXHJKTDN5WW2ZLOORPWSZGOD6EU3FA#issuecomment-529091988>, > or mute the thread > <https://github.com/notifications/unsubscribe-auth/AADFIOXHN6PCAVEB4SHRCSTQINZYFANCNFSM4IUN33IQ> > . >
Author
Owner

@corecontingency commented on GitHub (Sep 7, 2019):

@ilikenwf

You probably did, but just want to confirm: You named the new file signal-desktop.local, not signal.local, correct, putting it in either ~/.config/firejail/ or /etc/firejail/?

signal.local will not work.

<!-- gh-comment-id:529147635 --> @corecontingency commented on GitHub (Sep 7, 2019): @ilikenwf You probably did, but just want to confirm: You named the new file `signal-desktop.local`, not `signal.local`, correct, putting it in either `~/.config/firejail/` or `/etc/firejail/`? `signal.local` will not work.
Author
Owner

@reinerh commented on GitHub (Sep 8, 2019):

The issue is also known upstream. They updated electron, which now tries to start with a sandbox.
You can still start it with --no-sandbox.

See also: https://github.com/signalapp/Signal-Desktop/issues/3573

<!-- gh-comment-id:529202397 --> @reinerh commented on GitHub (Sep 8, 2019): The issue is also known upstream. They updated electron, which now tries to start with a sandbox. You can still start it with `--no-sandbox`. See also: https://github.com/signalapp/Signal-Desktop/issues/3573
Author
Owner

@Futureknows commented on GitHub (Jul 27, 2020):

I just updated to the new profile and Signal wouldn't launch:

Searching $PATH for signal-desktop trying #/home/user/.local/bin/signal-desktop# trying #/home/user/bin/signal-desktop# trying #/usr/local/bin/signal-desktop# Error getpwuid: main.c:325 init_cfg: No such file or directory
I passed the Signal location in the firejail command and now it launches as before.
firejail --noroot --caps.drop=all --cpu=1 /usr/bin/signal-desktop --use-tray-icon

Incidentally I include --noroot and --caps.drop=all without issue. I also limit it to one core as it's a CPU hog and this tames it.

<!-- gh-comment-id:664104936 --> @Futureknows commented on GitHub (Jul 27, 2020): I just updated to the new profile and Signal wouldn't launch: `Searching $PATH for signal-desktop trying #/home/user/.local/bin/signal-desktop# trying #/home/user/bin/signal-desktop# trying #/usr/local/bin/signal-desktop# Error getpwuid: main.c:325 init_cfg: No such file or directory ` I passed the Signal location in the firejail command and now it launches as before. `firejail --noroot --caps.drop=all --cpu=1 /usr/bin/signal-desktop --use-tray-icon` Incidentally I include --noroot and --caps.drop=all without issue. I also limit it to one core as it's a CPU hog and this tames it.
Author
Owner

@rusty-snake commented on GitHub (Jul 27, 2020):

Sounds like https://github.com/netblue30/firejail/issues/2877. Try to add private-etc passwd.

<!-- gh-comment-id:664180749 --> @rusty-snake commented on GitHub (Jul 27, 2020): Sounds like https://github.com/netblue30/firejail/issues/2877. Try to add `private-etc passwd`.
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference: github-starred/firejail#1839
No description provided.