mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #2983] SSH creates core dumps while using seccomp #1865
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#1865
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @Panzerfather on GitHub (Sep 30, 2019).
Original GitHub issue: https://github.com/netblue30/firejail/issues/2983
When running ssh (authenticated as a domain user) it creates coredumps. Virsh and other programs using ssh are also affected and create core dumps while seccomp is enabled like this one:
All other programs which had seccomp enabled but doesn't use ssh at all had no problem.
To make a more detailed analysis worse, some USER/IP combinations work for ssh with seccomp enabled, while others always create a core dump. It doesn't depend if the remote host is inside or outside the local network, it doesn't depend which user is given. Either the combination work or it don't.
@rusty-snake commented on GitHub (Sep 30, 2019):
Can you try to figure out which syscall is blocked.
Use https://github.com/netblue30/firejail/issues/2936#issuecomment-526850967 or
ee5ab63cfb/etc/templates/syscalls.txt (L90-L107)Maybe it is
keyctl(see backtrace). Try:firejail --seccomp="\!keyctl" ssh ….@rusty-snake commented on GitHub (Sep 30, 2019):
Found this: #1299
Or maybe more:
firejail --seccomp="!add_key,!keyctl,!request_key " ssh …3b32edbe2f/etc/templates/syscalls.txt (L42)For firejail before 0.9.61:
@rusty-snake commented on GitHub (Nov 10, 2019):
@Panzerfather
I'm closing here due to inactivity, please fell free to request reopen if you still have this issue.