mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #3048] Need help for Opera Firejail Profile #1913
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#1913
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @ghost on GitHub (Nov 20, 2019).
Original GitHub issue: https://github.com/netblue30/firejail/issues/3048
Hi again!
I need help for that to fix it:
[10:10:1120/170309.471623:FATAL:setuid_sandbox_host.cc(158)] The SUID sandbox helper binary was found, but is not configured correctly. Rather than run without sandboxing I'm aborting now. You need to make sure that /usr/lib/x86_64-linux-gnu/opera/opera_sandbox is owned by root and has mode 4755.
While handling crash: can't execute crash inspector.
The binary "opera_sandbox" is root.
I did:
chmod 4755 /usr/lib/x86_64-linux-gnu/opera/opera_sandbox
run opera with firejail profile again.
The error on top this post appears again.
I added to Opera Firejail profile:
whitelist /usr/lib/x86_64-linux-gnu/opera/opera_sandbox
Output in terminal:
Reading profile /etc/firejail/opera.profile
Reading profile /etc/firejail/disable-common.inc
Reading profile /etc/firejail/disable-devel.inc
Reading profile /etc/firejail/disable-interpreters.inc
Reading profile /etc/firejail/disable-passwdmgr.inc
Reading profile /etc/firejail/disable-programs.inc
Warning: networking feature is disabled in Firejail configuration file
Parent pid 23602, child pid 23603
DNS server 84.200.69.80
DNS server 84.200.70.40
Private /etc installed in 23.43 ms
Error: invalid whitelist path /usr/lib/x86_64-linux-gnu/opera/opera_sandbox
Error: proc 23602 cannot sync with peer: unexpected EOF
Peer 23603 unexpectedly exited with status 1
How can I whitelist the Opera sandbox?
@rusty-snake commented on GitHub (Nov 20, 2019):
Since this is caust by firejail you don't need to change anything on your host.
These are the profile files for opera on master (opera includes chromium-common).
https://github.com/netblue30/firejail/blob/master/etc/opera.profile
https://github.com/netblue30/firejail/blob/master/etc/chromium-common.profile
Sound for me like #2946. Can you try
firejail --ignore=nonewprivs --ignore=noroot --ignore=protocol --ignore=seccomp --ignore=caps.drop --caps.keep=sys_admin,sys_chroot.@ghost commented on GitHub (Nov 20, 2019):
Works with thiscommand:
firejail --ignore=caps.drop --caps.keep=sys_admin,sys_chroot
Opera.profile:
caps.drop all
machine-id
netfilter
nodvd
nogroups
#nonewprivs
#noroot
notv
#seccomp
private-dev
private-etc fonts
private-tmp
disable-mnt
noexec /tmp
Is it secure to run Opera with command:
firejail --ignore=nonewprivs --ignore=noroot --ignore=protocol --ignore=seccomp --ignore=caps.drop --caps.keep=sys_admin,sys_chroot
?
@rusty-snake commented on GitHub (Nov 20, 2019):
Replace
caps.drop allwithcaps.keep sys_admin,syschrootin your profileIt is necessary. See discussions in some linked issues in #2946.
@ghost commented on GitHub (Nov 21, 2019):
Ok, thanks!
Is it possible to start Opera without root rights with Sandbox?
When i add this to my Opera FireJail profile, Opera don't start:
nonewprivs
noroot
Can I disable the Sandbox feature in Opera because I start Opera with FireJail?
@rusty-snake commented on GitHub (Nov 21, 2019):
To setup a sandbox you need to have root rights.
IDK, try
opera --no-sandbox.