mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #2970] ping broken #1858
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#1858
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @rusty-snake on GitHub (Sep 18, 2019).
Original GitHub issue: https://github.com/netblue30/firejail/issues/2970
Moved from #2969.
firejail: lastet git.
@rusty-snake commented on GitHub (Sep 18, 2019):
Fix:
force-nonewprivs noin firejail.config.@blinux45 can you confirm?
@blinux45 commented on GitHub (Sep 19, 2019):
Uncommenting
force-nonewprivs noin /etc/firejail/firejail.config did not resolve the ping issue.@blinux45 commented on GitHub (Sep 19, 2019):
I would like to clarify that for me ping worked within firejail until I used "private-bin ping,....".
@blinux45 commented on GitHub (Sep 19, 2019):
@smitsohu commented on GitHub (Sep 19, 2019):
@blinux45
Yes, without
private-binit is not nosuid.Did you try with
--noprofile? The default profile will prevent any raising of privileges.Edit: nevermind, there is a ping profile.
@blinux45 commented on GitHub (Sep 20, 2019):
To recap, there seems no way to get /bin/ping to work when private-bin is enabled even though ping is explicitly requested.
As in: "--private-bin ping"
Is there an absolute requirement for nosuid to be applied simultaneously with private-bin?
Could nosuid be applied independently (for example nosuid=/bin)?
Enabling/disabling specific commands within /bin seems a separate issue from nosuid.
This is breaking ping.
Regarding /home/myuser/firejail/ping, I use a custom profile --profile=myprofile.
The default profile shouldn't be used in this case. Or is it?
I don't see anything in the custom profile that would block ping from running in /home/myuser/firejail/ping.
In my test case scenario, I invoke a bash shell through firejail (using a custom profile).
if I call ping from within this shell, would the ping profile be used? I would assume a no answer, but it is better to be sure.
@Fred-Barclay commented on GitHub (Sep 20, 2019):
Does
--private-bin=sh,bash,pingwork for you? It's working for me on Arch.Of course I'm not sure that allowing shell access within private-bin defeats the whole purpose of private-bin... we have to do it sometimes for profiles (it seems especially on Arch this is needed) but I suspect this is a less-than-ideal scenario.
@topimiettinen commented on GitHub (Sep 21, 2019):
The problem with allowing setuid in general is that firejail also lets the unprivileged user to manipulate the file system and capabilities, and it could be possible use that to trick the setuid program to leak elevated privileges if there was no protection. It's not possible for firejail to know which changes to file system or capabilities is safe for a specific setuid program or to even know all possible setuid programs.
@Vincent43 commented on GitHub (Sep 21, 2019):
@topimiettinen as I understand this discussion,
nosuidis only used forprivate-binoption so problem with setuid bins is only mitigated in this specific case.@rusty-snake commented on GitHub (Oct 13, 2019):
Closing here. Future discussion about
nosuid+private-binin #2969.