mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #5277] qtox: audit log spam due to blocked netlink #2942
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#2942
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @JeremyMahieu on GitHub (Jul 28, 2022).
Original GitHub issue: https://github.com/netblue30/firejail/issues/5277
Is your feature request related to a problem? Please describe.
In the profile for qtox only protocols inet, inet6, and unix are enabled while qtox is confined with seccomp. This leads to generation of seccomp violation reports since qtox also needs AF_NETLINK sockets.
The reports look like this:
Describe the solution you'd like
This seemingly does not interfere with qtox's functionality but please consider adding netlink to permitted protocols in that profile.
Describe alternatives you've considered
Ignoring the seccomp violation messages, but they pollute the system journal and occur a few times every 10 seconds.
Additional context
The system should have Audit framework enabled and auditd running for logging to journal to happen. Systems configured otherwise will not see the same messages.
@ghost commented on GitHub (Jul 28, 2022):
One can always add netlink in a qtox.local override. But, IMO, when an application functions properly without it, and the issue is only journal spamming, users can add a rule to audit's configuration to silence these warnings. That way the sandbox is kept nicely tight and the irritating spamming is handled cleanly. Here's an example you can try in case of qtox:
$ cat /etc/audit/rules.d/20-dont-audit.rulesLet's wait a bit to let other people give their opinion on how to proceed here (adding a comment on how to silence these warnings, or adding netlink to protocol).
@rusty-snake commented on GitHub (Jul 28, 2022):
Journal spamming is already fixed (#5207).
If qtox works w/o netlink we should not weaken its profile for cosmetic reasons.
I would close as won't fix/duplicate.
@ghost commented on GitHub (Jul 28, 2022):
@JeremyMahieu So what the above comments boil down to is that the issue should be fixed in git already. Consult our wiki for instructions on how to build from git.
@kmk3 commented on GitHub (Jul 29, 2022):
(Re-closing as "not planned", since it was marked as duplicate)
Duplicate of #5207.
Edit: For some reason, GitHub is not creating the "marked this as a
duplicate" timeline event...
@rusty-snake commented on GitHub (Jul 29, 2022):
It only does so if
Duplicate of #1234is the only text in your comment. Even a.at the end stops it IIRC.@kmk3 commented on GitHub (Jul 29, 2022):
Duplicate of #5207
@kmk3 commented on GitHub (Jul 29, 2022):
@rusty-snake commented on Jul 29:
Thanks! I had a hunch that it could be due to that, but I refused to believe
that it would be so brittle hehe.
I mean, even GitHub's own dependabot puts a dot at the end on similar
comments[1]:
[1] https://github.com/kmk3/firejail/pull/15#issuecomment-1165379263