Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Session desktop on linux complains about sandbox and refuses to open #1418

Closed
Kreyren opened this issue Jan 4, 2021 · 6 comments
Closed
Labels
bug Something isn't working Discussion Needs to be discussed

Comments

@Kreyren
Copy link

Kreyren commented Jan 4, 2021

kreyren@leonid:~/Downloads$ ./session-desktop-linux-x86_64-1.4.4.AppImage 
[14361:0104/021934.369875:FATAL:setuid_sandbox_host.cc(157)] The SUID sandbox helper binary was found, but is not configured correctly. Rather than run without sandboxing I'm aborting now. You need to make sure that /tmp/.mount_sessiopQVxT7/chrome-sandbox is owned by root and has mode 4755.
Trace/breakpoint trap

Assuming it being relevant to electron/electron#17972

Steps to reproduce

  1. Download sessions from https://github.com/loki-project/session-desktop/releases/download/v1.4.4/session-desktop-linux-x86_64-1.4.4.AppImage
  2. Make it executable
  3. Try to run the AppImage

System info

OS: Devuan GNU/Linux 4 (chimaera/ceres) x86_64
Host: 20089 Lenovo G770 
Kernel: 5.9.0-5-amd64 
Shell: bash 5.1.0 
DE: Xfce 4.14 
WM: Xfwm4 
WM Theme: Clearlooks-Phenix-Cinnabar 
Theme: Clearlooks-Phenix-Cinnabar [GTK2], Adwaita [GTK3] 
Icons: Cinnabar [GTK2], Adwaita [GTK3] 
Terminal: xfce4-terminal 
Terminal Font: Monospace 12 
CPU: Intel i7-2620M (4) @ 3.400GHz 
GPU: AMD ATI Radeon HD 6630M/6650M/6750M/7670M/7690M 
GPU: Intel 2nd Generation Core Processor Family 
Memory: 4630MiB / 15958MiB 
@majestrate
Copy link

you want the session-desktop issue tracker instead: https://github.com/loki-project/session-desktop/issues

and for the record i think the flag to fix this is --no-sandbox

@Kreyren
Copy link
Author

Kreyren commented Jan 4, 2021

@majestrate can't you transfer the issue then?

@majestrate
Copy link

i don't seem to have permission to transfer the issue to that repo.

@KeeJef KeeJef transferred this issue from oxen-io/lokinet Jan 4, 2021
@majestrate majestrate reopened this Jan 4, 2021
@Kreyren
Copy link
Author

Kreyren commented Jan 4, 2021

Using the --no-sandbox makes the application to launch, but the sandbox is preferred.

@beantaco
Copy link

beantaco commented Jan 5, 2021

There was a similar issue with Signal Desktop. Signal introduced a hack by adding --no-sandbox argument when Signal Desktop is invoked disabling the client's sandbox.
signalapp#3536
signalapp@1ca0d82

This hack is not a solution, it is a hack that avoids the problem. Disabling the sandbox is a security concern, and Signal has yet to address the issue properly.
signalapp#3573

Session Desktop ships with setuid set on the sandbox (notice the s permission in the Session sandbox). Note: This is the .deb package of Session, not AppImage.

user$ ls -l /opt/Signal/chrome-sandbox 
-rwxr-xr-x 1 root root 6259104 [redacted] /opt/Signal/chrome-sandbox
user$ ls -l /opt/Session/chrome-sandbox
-rwsr-xr-x 1 root root 6259104 [redacted] /opt/Session/chrome-sandbox

Can the AppImage (or users) add setuid with something like the following?

root# chmod 4755 <path>/chrome-sandbox

However, from comments I have read, adding setuid has its own security issues. I'm not qualified to comment further about this.

Another workaround is to add another sandbox, like firejail with a suitably-configured profile:

user$ firejail /opt/Session/chrome-sandbox --no-sandbox

@majestrate
Copy link

does session even use any of the features provided by the chrome SUID sandbox?

@Bilb Bilb added bug Something isn't working Discussion Needs to be discussed labels Feb 3, 2021
@Bilb Bilb closed this as completed Sep 30, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working Discussion Needs to be discussed
Projects
None yet
Development

No branches or pull requests

4 participants