mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #4550] The SUID sandbox helper binary was found, but is not configured correctly. Rather than run without sandboxing I'm aborting now. You need to make sure that /run/firejail/appimage/.appimage-8934/chrome-sandbox is owned by root and has m… #2702
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#2702
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @deletedaccount00 on GitHub (Sep 15, 2021).
Original GitHub issue: https://github.com/netblue30/firejail/issues/4550
user@hdd:/Downloads$ firejail --appimage --noprofile ./Bitwarden-1.28.2-x86_64.AppImage
Mounting appimage type 2
Parent pid 8934, child pid 8937
** Warning: dropping all Linux capabilities **
Child process initialized in 54.55 ms
[2:0915/164221.230211:FATAL:setuid_sandbox_host.cc(158)] The SUID sandbox helper binary was found, but is not configured correctly. Rather than run without sandboxing I'm aborting now. You need to make sure that /run/firejail/appimage/.appimage-8934/chrome-sandbox is owned by root and has mode 4755.
Parent is shutting down, bye...
AppImage unmounted
" You need to make sure that /run/firejail/appimage/.appimage-8934/chrome-sandbox is owned by root and has mode 4755. "
BUT THERE'S NO " .appimage-8934 " IN " appimage " DIRECTORY.
@rusty-snake commented on GitHub (Sep 15, 2021):
THERE IS A
.appimage-xxxINappimageDIRECTORY WHEN YOU START THE APPIMAGE.You can not use an chrom* AI together with
firejail --appimage(at least on systems that do not support unprivileged_userns_clone, not sure about systems with support for unprivileged_userns_clone).You can
--appimage@deletedaccount00 commented on GitHub (Sep 15, 2021):
I tried without " --appimage " flag.
output navigates me to make some changes to chrome-sandbox but I end up not seeing the previous directory In my case it's " .mount_Bitwara7ohsq ".
@smitsohu commented on GitHub (Sep 16, 2021):
I think this will not work in an AppImage, no matter with or without Firejail. For security reasons the AppImage is always mounted with
nosuidflag. At the same time the Chromium sandbox helper cannot work without being root, hence the error your are seeing.Your best chance is to somehow enable unprivileged user namespaces (which has its own security implications).
Some commands which may or may not work (as root):
echo 1 > /proc/sys/kernel/unprivileged_userns_cloneecho 0 > /proc/sys/kernel/userns_restrictecho 10000 > /proc/sys/user/max_user_namespaces@ckorder commented on GitHub (Dec 3, 2021):
i can confirm that it's working but only if you are okay with increasing the attack surface as mentioned
which has its own security implicationshttps://www.realmicentral.com/2021/07/21/linux-leaks-kernel-security-vulnerabilities-unprivileged-users-can-gain-root-privileges/
https://security.stackexchange.com/questions/209529/what-does-enabling-kernel-unprivileged-userns-clone-do
i suggest using: firejail --parameter options someapp.AppImage --no-sandbox
which will disable the chromium sandbox feature instead of enabling dangerous kernel options.
any thoughts on this? otherwise can be closed again.
@rusty-snake commented on GitHub (Dec 4, 2021):
"which will disable the chromium sandbox feature" "which has its own security implications".
You have to work out what is more important in your thread models.
The chromium sandbox is a default enabled security feature, while userns is enabled by default and disabled as defense-in-depth.
@ckorder commented on GitHub (Dec 7, 2021):
@rusty-snake
You seem to be more experienced on the firejail source code.
I know every layer protection is valuable but does this mean "An remote attacker getting access to your system." that firejail shall be viewed as inefficient for protecting the access to our systems?
Shall I more likely enable a global security decrease in favor of the trusted google devs?
Until now, i would take my chance of running a single NodeJS app without third party connections in a private-home and a proper firejail profile rather than enabling these options within my kernel.
If I'm wrong, please change my mind and let others now as well since i think this issue is quite important because of the increase of popularity on chromium based apps.
Have been any efforts tried to communicate these issues with the dev's of chromium?
I think there are just a few people able to address the cause and the related problems properly relating towards the source of firejail and could suggest a different path how the chromium sandbox could be setup. e.g @rusty-snake || @netblue30 <3
But maybe I'm wrong here and there are good reasons for them handling it this way beside faster loading time since it does not need to be created for every use but why than not dropping it somewhere persistent ?
@rusty-snake commented on GitHub (Dec 7, 2021):
It depends.
Short story: An attacker who can execute arbitrary code inside the sandbox can (in the most cases) escape if he wants (wants=is aware of firejail and how to escape it).
Let's take chromium as an example:
Scenario 1: An attacker escaped chromium-sandbox => firejail shouldn't be barrier because chromium-sandbox has a much much tighter sandbox.
Scenario 2: chromium-sandbox is disable, chromium.profile is unmodified => 🤦
Scenario 3: chromium-sandbox is disable, chromium.profile is hardened => It depends on the attacker:
Are privileged escalation in your thread models? Or is this an "already lost scenario"?
See #4601.
My opinion:
user.max_user_namespaces=0disables userns entirely.sudo/suid.Not official (you can search thier issue tracker, maybe there are some reports regarding unprivileged_userns_clone=0 and NNP). However it would be a "won't fix".