mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #3527] [Question] SkypeforLinux - or General .deb Security #2215
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#2215
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @svc88 on GitHub (Jul 19, 2020).
Original GitHub issue: https://github.com/netblue30/firejail/issues/3527
This might be considered a noob question here.
If i use firejail to secure skypeforlinux (or any proprietary .deb file), whats the point to secure it, if its already installed in your system?
Once you install that .deb file, isnt there a slight possibility that any one of those files can "self-execute" or rather skypeforlinux install a backdoor as a service or some other way that in essence firejail will not evidently help before even running the actual app?
How do you know its actually secured when app isnt running?
In this case, are appimages more secure than .deb files to be used with Firejail? (If yes, then i havent found any appimage files for skypeforlinux)
@rusty-snake commented on GitHub (Jul 19, 2020):
A .deb can execute scripts while (un)installing, override system binaries, install autostart and systemd-unit files, install suids, ...
TLTR: Do not install software you don't trust. Nothing (technical) can help.
@svc88 commented on GitHub (Jul 19, 2020):
@rusty-snake so would appimages be preferred to be used with Firejail if available (from a security standpoint) ?
@rusty-snake commented on GitHub (Jul 19, 2020):
Then the part with the installing is gone, but if you don't trust it it (i.e. you think it has a backdoor) it can escape the sandbox if it want.
@svc88 commented on GitHub (Jul 19, 2020):
If the appimage has a backdoor and you run it in a tight sandbox firejail profile, can it really escape the sandbox?
@rusty-snake commented on GitHub (Jul 19, 2020):
It can use
~/.bashrc(mitigation:include disable-common.inc, protection:whitelist ${HOME}/foo,read-only ${HOME},private-home foo,bar,private,private foobar)net none(break internet) ornet eth0(very unhandy)private-tmp)Or short: if the program you run in the sandbox wants to escape, it can escape.
If you don't trust the software you run, use a VM (and even a VM can be escaped).
@rusty-snake commented on GitHub (Jul 19, 2020):
Firejail can protect against a) a attack itself (e.g. the malware relies on the systems openssl binary) b) security hole (e.g an attacker can use execve remote, but with firejail's
private-binthere is no shell => execve is broken). It can not protect you against c) a skilled attacker who wants to hack you (not anyone in the internet, I mean you). In such a situation nobody/nothing can help. d) The software itself.EDIT: That's my opinion, others welcome. Let's have a discussion.
@topimiettinen commented on GitHub (Jul 20, 2020):
Firejail can minimize the kernel ABI, but there could still be 0-day exploits, CPU vulnerabilities like Spectre, hardware vulnerabilities like Rowhammer etc. Appimages and snaps only provide a sort of self-contained disk image so access to outside of the image can be limited. If the image contains malicious code, sandboxing can help but it's probably possible to circumvent it depending on the skills and resources of the adversary.
@rusty-snake small correction: execve() doesn't depend on shell, maybe you were thinking of system() which does.
@chiraag-nataraj commented on GitHub (Aug 20, 2020):
My personal opinion (and what I try to do for software I regularly use) is that whitelisted profiles should always be preferred and the principle of least privilege should apply.
Notes: