[GH-ISSUE #3092] firefox: u2f does not work if plugged in after launching (private-dev) #1938

Closed
opened 2026-05-05 08:36:17 -06:00 by gitea-mirror · 14 comments
Owner

Originally created by @ibahnasy on GitHub (Dec 22, 2019).
Original GitHub issue: https://github.com/netblue30/firejail/issues/3092

U2F doesn't work if Firefox is launched with firejail.
Even firejail --ignore=private-dev firefox didn't solve the issue.
There should be a permanent fix in the firejail profile file for Firefox.

Originally created by @ibahnasy on GitHub (Dec 22, 2019). Original GitHub issue: https://github.com/netblue30/firejail/issues/3092 U2F doesn't work if Firefox is launched with firejail. Even `firejail --ignore=private-dev firefox` didn't solve the issue. There should be a permanent fix in the firejail profile file for Firefox.
gitea-mirror 2026-05-05 08:36:17 -06:00
Author
Owner

@rusty-snake commented on GitHub (Dec 22, 2019):

grep "browser-disable-u2f" /etc/firejail/firejail.config #2531. Firejail version?

<!-- gh-comment-id:568264480 --> @rusty-snake commented on GitHub (Dec 22, 2019): `grep "browser-disable-u2f" /etc/firejail/firejail.config` #2531. Firejail version?
Author
Owner

@ibahnasy commented on GitHub (Dec 22, 2019):

I set it browser-disable-u2f to no and now it works.

Thanks a lot!

<!-- gh-comment-id:568267352 --> @ibahnasy commented on GitHub (Dec 22, 2019): I set it `browser-disable-u2f` to `no` and now it works. Thanks a lot!
Author
Owner

@ibahnasy commented on GitHub (Dec 22, 2019):

But the u2f key has to be plugged first before launching Firefox!
Any solution to this case?

<!-- gh-comment-id:568306408 --> @ibahnasy commented on GitHub (Dec 22, 2019): But the u2f key has to be plugged first before launching Firefox! Any solution to this case?
Author
Owner

@rusty-snake commented on GitHub (Dec 22, 2019):

What happens with

  • remove u2f key
  • start firefox with firejail --noprofile firefox
  • add u2f key
  • test u2f
<!-- gh-comment-id:568306836 --> @rusty-snake commented on GitHub (Dec 22, 2019): What happens with - remove u2f key - start firefox with `firejail --noprofile firefox` - add u2f key - test u2f
Author
Owner

@ibahnasy commented on GitHub (Dec 22, 2019):

In this scenario, the u2f works fine.

<!-- gh-comment-id:568307224 --> @ibahnasy commented on GitHub (Dec 22, 2019): In this scenario, the u2f works fine.
Author
Owner

@SkewedZeppelin commented on GitHub (Dec 22, 2019):

private-dev causes any devices attached after sandbox creation to not be available.

<!-- gh-comment-id:568313876 --> @SkewedZeppelin commented on GitHub (Dec 22, 2019): private-dev causes any devices attached after sandbox creation to not be available.
Author
Owner

@cockytrumpet commented on GitHub (Dec 23, 2019):

I found this issue trying to solve the same problem with my Yubikey, but firefox would crash when I press the button to authenticate even with browser-disable-u2f set to no.

The solution was to remove sys_name_to_handle_at from the seccomp list.

I’m sure there’s a better way to do that, but adding seccomp.keep sys_name_to_handle_at to firefox.local didn’t work.

<!-- gh-comment-id:568451011 --> @cockytrumpet commented on GitHub (Dec 23, 2019): I found this issue trying to solve the same problem with my Yubikey, but firefox would crash when I press the button to authenticate even with `browser-disable-u2f` set to no. The solution was to remove `sys_name_to_handle_at` from the seccomp list. I’m sure there’s a better way to do that, but adding `seccomp.keep sys_name_to_handle_at` to firefox.local didn’t work.
Author
Owner

@Vincent43 commented on GitHub (Dec 23, 2019):

Did you added some custom rules to firefox profile? This sounds similar to https://github.com/netblue30/firejail/issues/3074#issuecomment-563013316

<!-- gh-comment-id:568452774 --> @Vincent43 commented on GitHub (Dec 23, 2019): Did you added some custom rules to firefox profile? This sounds similar to https://github.com/netblue30/firejail/issues/3074#issuecomment-563013316
Author
Owner

@rusty-snake commented on GitHub (Dec 23, 2019):

I’m sure there’s a better way to do that, but adding seccomp.keep sys_name_to_handle_at to firefox.local didn’t work.

seccomp.keep "whitelist" syscall, this means every syscall not listed is blocked.

Replace seccomp with:
Firejail >=0.9.61: seccomp !name_to_handle_at
Firejail <=0.9.60: seccomp.drop @debug,@obsolete,@privileged,@resources,add_key,fanotify_init,i@cpu-emulation,io_cancel,io_destroy,io_getevents,io_setup,io_submit,ioprio_set,kcmp,keyctl,ni_syscall,open_by_handle_at,remap_file_pages,request_key,syslog,umount,userfaultfd,vmsplice

<!-- gh-comment-id:568454140 --> @rusty-snake commented on GitHub (Dec 23, 2019): > I’m sure there’s a better way to do that, but adding `seccomp.keep sys_name_to_handle_at` to firefox.local didn’t work. `seccomp.keep` "whitelist" syscall, this means every syscall not listed is blocked. Replace `seccomp` with: Firejail >=0.9.61: `seccomp !name_to_handle_at` Firejail <=0.9.60: `seccomp.drop @debug,@obsolete,@privileged,@resources,add_key,fanotify_init,i@cpu-emulation,io_cancel,io_destroy,io_getevents,io_setup,io_submit,ioprio_set,kcmp,keyctl,ni_syscall,open_by_handle_at,remap_file_pages,request_key,syslog,umount,userfaultfd,vmsplice`
Author
Owner

@cockytrumpet commented on GitHub (Dec 23, 2019):

@Vincent43 The only other change I made to the profile was commenting out ?BROWSER_DISABLE_U2F: nou2f which i saw in https://github.com/netblue30/firejail/issues/2531.

  • Gentoo kernel 5.4.6
  • firejail 0.9.60-r1
  • firefox 71.0-r1

@rusty-snake Thanks, I misunderstood what .keep was doing.

<!-- gh-comment-id:568573122 --> @cockytrumpet commented on GitHub (Dec 23, 2019): @Vincent43 The only other change I made to the profile was commenting out `?BROWSER_DISABLE_U2F: nou2f` which i saw in https://github.com/netblue30/firejail/issues/2531. - Gentoo kernel 5.4.6 - firejail 0.9.60-r1 - firefox 71.0-r1 @rusty-snake Thanks, I misunderstood what .keep was doing.
Author
Owner

@rusty-snake commented on GitHub (Jan 17, 2020):

@ibahnasy
I'm closing here due to inactivity, please fell free to reopen if you still have this issue.

<!-- gh-comment-id:575727309 --> @rusty-snake commented on GitHub (Jan 17, 2020): @ibahnasy I'm closing here due to inactivity, please fell free to reopen if you still have this issue.
Author
Owner

@ibahnasy commented on GitHub (Jan 20, 2020):

How does using no profile affects the security firejail --noprofile firefox?

<!-- gh-comment-id:576266629 --> @ibahnasy commented on GitHub (Jan 20, 2020): How does using no profile affects the security `firejail --noprofile firefox`?
Author
Owner

@rusty-snake commented on GitHub (Jan 20, 2020):

You have no seccomp, all caps, no disable-*, ...

<!-- gh-comment-id:576274522 --> @rusty-snake commented on GitHub (Jan 20, 2020): You have no seccomp, all caps, no disable-*, ...
Author
Owner

@Vincent43 commented on GitHub (Jan 20, 2020):

--noprofile is very close to not using firejail at all.

<!-- gh-comment-id:576336896 --> @Vincent43 commented on GitHub (Jan 20, 2020): `--noprofile` is very close to not using firejail at all.
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference: github-starred/firejail#1938
No description provided.