mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #463] Is "--noroot" implicitly at odds with "--chroot"? #329
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#329
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @ptoomey3 on GitHub (Apr 20, 2016).
Original GitHub issue: https://github.com/netblue30/firejail/issues/463
I noticed that the docs state that
--norootcan't be used when using--chroot. I am curious if there is something foundational that would prevent this from being implemented in the future? Using--chrootis nice in that is minimizes the amount of blacklisting/whitelisting that is necessary. But, it would be nice to prevent escalation to root inside the chroot as well.@netblue30 commented on GitHub (Apr 21, 2016):
I have to revisit this, a long time ago when --noroot was implemented there were some problems on chroots. I'll take a look, thanks.
@ptoomey3 commented on GitHub (Apr 22, 2016):
If it is still roughly the same code I sent you last year, I'm probably to blame 😄. I had never even tested that code with a chroot. Thanks for taking a look!
@netblue30 commented on GitHub (Apr 23, 2016):
I've found it! We have something like this:
unshare fails inside a chroot, and this is what they say in man 2 unshare:
My guess is somebody figured out a way to escape chroot using a user namespace, and they disabled it in the kernel.
@ptoomey3 commented on GitHub (Apr 23, 2016):
Maybe this: https://lwn.net/Articles/543273/. It seems there is some shared state with the parent process when you call
chrootthat would be at odds with running in a separate user namespace. So, I guess they just disabled it all together.@netblue30 commented on GitHub (Apr 24, 2016):
We'll keep an eye on it, maybe they change their mind a put a better fix in.
@ptoomey3 commented on GitHub (May 2, 2016):
😿 - But I understand it isn't in your control.