mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #3043] --apparmor breaks ./configure scripts created by autotools #1911
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#1911
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @KOLANICH on GitHub (Nov 13, 2019).
Original GitHub issue: https://github.com/netblue30/firejail/issues/3043
The distro is Ubuntu Eoan.
@Vincent43 commented on GitHub (Nov 14, 2019):
Do you mean you can't compile software inside
firejail --apparmorsandbox? You can try adding in/etc/apparmor.d/local/firejail-{local,default}:/your/build/dir/** ix,then
systemctl restart apparmor.@KOLANICH commented on GitHub (Nov 14, 2019):
Thanks for the info. But I guess it is inacceptable to modify permanent apparmor rules. In fact I expected firejail generating apparmor profiles on the fly based on firejail profiles and CLI flags and loading them.
@Vincent43 commented on GitHub (Nov 15, 2019):
The purpose of
/etc/apparmor.d/local/*is to allow users override some vendor settings as they wish.No, firejail has only one global and static apparmor profile which is attached to every app when
--apparmorswitch was used.@KOLANICH commented on GitHub (Nov 15, 2019):
Yeah, I have already figured that out from the source. How about implementing the generation? To do that we need to split apparmor_parser into a shared lib and a CLI for it first.
@Vincent43 commented on GitHub (Nov 15, 2019):
I could see two problems with it:
AppArmor profile generator for docker.
@KOLANICH commented on GitHub (Nov 15, 2019):
Isn't firejail a suid app running from a privileged user?
Maybe. I am not familiar enough to apparmor yet.
@Vincent43 commented on GitHub (Nov 16, 2019):
Firejail is a suid app run by unprivileged users. This means non-root users can execute actions normally restricted to root user. There are concerns that firejail allows too much stuff already.
@KOLANICH commented on GitHub (Nov 16, 2019):
I guess we need a special page collecting links to all the ideas about how each subset of subsystems of firejail and linux kernel can be exploited to subvert isolation.
But as I have said, I don't know enough about apparmor yet. I have read in multiple places that apparmor tracks executables by their fs addresses, but if it were the case it would have been impossible to use apparmor for hardening a firejail because adding an apparmor profile to a sandboxed process would have meant adding it to all other processes using the same executable, including unsandboxed ones, which is a deeply undesired side effect.
@rusty-snake commented on GitHub (Dec 14, 2019):
still an issue?
@KOLANICH commented on GitHub (Dec 14, 2019):
Have anything been fixed? Current solution is to just disable apparmor for the builds using autotools.
@rusty-snake commented on GitHub (Dec 14, 2019):
There was some changes (#3075).
@KOLANICH commented on GitHub (Dec 14, 2019):
Probably no. This issue is not about firejail build scripts but about autotools-generated scripts in general run inside a firejail. I gonna sometime isolate them into a separate hw-virtualized VM, but it is not a top priority.
@Vincent43 commented on GitHub (Dec 15, 2019):
This is working as intended, apparmor is blocking execution in non-whitelisted dirs by default and user can add more dirs to whitelist. Nothing to do here.