Talk here about security in general. Posting illegals software is prohibited. All stuffs in this forum must be considered as for "Educational purpose only".
-
Koss98
- White ninja

- Posts: 10
- Joined: 28 Apr 2017, 18:36
- Distribution: 3.2.2
- Location: Canada
Post#1
by Koss98 » 28 Apr 2017, 19:11
Hi, new here.
I installed the Chrome module but discovered that the sandbox isn't running properly...
Code: Select all
(about://sandbox)
Sandbox Status
SUID Sandbox Yes
Namespace Sandbox No
PID namespaces No
Network namespaces Nohttps://forum.porteus.org/posting.php?mode=post&f=113#
Seccomp-BPF sandbox Yes
Seccomp-BPF sandbox supports TSYNC Yes
Yama LSM enforcing No
You are not adequately sandboxed!
On Ubuntu this wasn't an issue. Google itself recommends using other browsers in case Chrome's sandbox feature isn't working, but I like Chrome and I want to fix this on Porteus if possible.
Koss98
-
francois
- Contributor

- Posts: 6499
- Joined: 28 Dec 2010, 14:25
- Distribution: xfce plank porteus nemesis
- Location: Le printemps, le printemps, le printemps... ... l'hiver s'essoufle.
Post#2
by francois » 29 Apr 2017, 00:46
Are you working guest or root mode? What version of porteus are you using? What desktop are you using? I am using google-chrome under kde5 (plasma) with no sandbox problem under porteus 3.2.2.
Prendre son temps, profiter de celui qui passe.
francois
-
Koss98
- White ninja

- Posts: 10
- Joined: 28 Apr 2017, 18:36
- Distribution: 3.2.2
- Location: Canada
Post#3
by Koss98 » 29 Apr 2017, 05:17
Chrome is run without admin privilege, so under guest. Porteus version is 3.2.2 running XFCE. Opera browser, which like Chrome is also based on Webkit, has this issue as well. Have you verified that your installation's sandbox is working using the chrome://sandbox command? because that's the readout I got.
Koss98
-
Evan
- Shogun

- Posts: 466
- Joined: 11 Apr 2016, 09:00
- Distribution: Distribution: *
Post#4
by Evan » 30 Apr 2017, 08:44
It might be worth searching each line that says <No> at google for some clues...
Namespace Sandbox No - for example comes back as chrome needing " user namespaces support " at kernel level , so i'm not sure how that would be enabled for Porteus.
Evan
-
Koss98
- White ninja

- Posts: 10
- Joined: 28 Apr 2017, 18:36
- Distribution: 3.2.2
- Location: Canada
Post#5
by Koss98 » 01 May 2017, 08:04
Oh... if sandboxing is kernel-dependent then there isn't much that I can do, being the amateur that I am. I saw a screenshot of Chrome running on Ubuntu, with Sandbox properly enabled, but the article mentioned that it doesn't work on every distribution. In any case I have the no-script extension which should prevent malicious scripts from being run.
On a side note, do the update-chrome/firefox/etc. commands utilize a secure network connection and/or perform file verifications? I'm pretty paranoid about security, since I'm usually on unsecured wifi networks throughout the day.
Koss98
-
francois
- Contributor

- Posts: 6499
- Joined: 28 Dec 2010, 14:25
- Distribution: xfce plank porteus nemesis
- Location: Le printemps, le printemps, le printemps... ... l'hiver s'essoufle.
Post#6
by francois » 02 May 2017, 17:56
Please try latest version of chrome:
http://forum.porteus.org/viewtopic.php?f=35&t=6520
Code: Select all
root@porteus:~# update-chromium
Starting checks ...
[OK] User is root.
[OK] Distro is Porteus
[OK] libbfd was found
[OK] libbfd was found
...
...
Would you like to download the porteus server version? [y/n]
n
Would you like to build the latest version? [y/n]
y
And report.
Prendre son temps, profiter de celui qui passe.
francois
-
Koss98
- White ninja

- Posts: 10
- Joined: 28 Apr 2017, 18:36
- Distribution: 3.2.2
- Location: Canada
Post#7
by Koss98 » 02 May 2017, 21:14
Nope, the output remained the same as before, and in any case I was already on the latest version. However, trying to build the package, as you seemed to have done, failed and produced errors, so I'm using the pre-built version from the server.
Here is the output, it's the same as before.
Code: Select all
Sandbox Status
SUID Sandbox Yes
Namespace Sandbox No
PID namespaces No
Network namespaces No
Seccomp-BPF sandbox Yes
Seccomp-BPF sandbox supports TSYNC Yes
Yama LSM enforcing No
You are not adequately sandboxed!
Koss98
-
Evan
- Shogun

- Posts: 466
- Joined: 11 Apr 2016, 09:00
- Distribution: Distribution: *
Post#8
by Evan » 02 May 2017, 23:09
Koss98 wrote:then there isn't much that I can do, being the amateur that I am..
Well you are doing better than a amateur like me as the last time i tried Chrome on Linux i couldn't even get it to start without using the no-sandbox command and as soon as i saw at google what was involved for Namespace i ran away .

Evan
-
francois
- Contributor

- Posts: 6499
- Joined: 28 Dec 2010, 14:25
- Distribution: xfce plank porteus nemesis
- Location: Le printemps, le printemps, le printemps... ... l'hiver s'essoufle.
Post#9
by francois » 03 May 2017, 01:08
@koss:
I have been able to build google-chrome under xfce guest mode:
Creating /tmp/google-chrome-58.0.3029.96-x86_64-1.xzm
It works for me.
Usually when sandox does not work it issues an error message for me, for example in root mode.
You gave outputs about sandbox. How do you get sandbox status?
Prendre son temps, profiter de celui qui passe.
francois
-
Koss98
- White ninja

- Posts: 10
- Joined: 28 Apr 2017, 18:36
- Distribution: 3.2.2
- Location: Canada
Post#10
by Koss98 » 03 May 2017, 02:29
Usually when sandox does not work it issues an error message for me, for example in root mode.
You gave outputs about sandbox. How do you get sandbox status?
Chrome's sandbox seems to work but not in its entirety, so maybe that's why I haven't seen any error messages. Sandbox status can be found by entering "about:sandbox" or "chrome://sandbox" into the address bar. It's not a deal breaker though since the issue doesn't affect performance or functionality. I'm just more cautious about which sites I visit and I've installed a script blocker extension as another precaution.
Koss98
-
francois
- Contributor

- Posts: 6499
- Joined: 28 Dec 2010, 14:25
- Distribution: xfce plank porteus nemesis
- Location: Le printemps, le printemps, le printemps... ... l'hiver s'essoufle.
Post#11
by francois » 03 May 2017, 23:41
@koss:
And what is the use of the sandbox? According to some theories it is related more to the indexing than to protecting you from dangerous websites. Itt seems that google does not want to reveal the role of the sandbox.
Sandbox effect
Maybe someone has a more accurate definition! 8)
If google does not want to explain the utility of the sandbox. How does someone get to know the use and the right set of the parameters of the sandbox? The answer is no one except some google employees.
It would be like you trying to guess the color of my girlfriend underpants on the 1rst of april.
I might be better placed than you to answer to the question, but some days not.

Prendre son temps, profiter de celui qui passe.
francois
-
wread
- Module Guard

- Posts: 1257
- Joined: 09 Jan 2011, 18:48
- Distribution: Porteus v5.0-kde-64 bits
- Location: Santo Domingo
-
Contact:
Post#12
by wread » 04 May 2017, 21:50
I do not like sandboxing because I do not know exactly how it works. I disable it with the --no-sandbox parameter.
I prefer using Tor with chromium instead. I know exactly how it works...Don't be afraid. This is linux.
Cheers
Porteus is proud of the FASTEST KDE ever made.....(take akonadi, nepomuk and soprano out and you will have a decent OS).
The Porteus Community never sleeps!
wread
-
Koss98
- White ninja

- Posts: 10
- Joined: 28 Apr 2017, 18:36
- Distribution: 3.2.2
- Location: Canada
Post#13
by Koss98 » 04 May 2017, 21:58
From what I could gather, "sandboxing" is a form of software compartmentalization for the purpose of containing the effects of malicious or otherwise harmful code executions, and every major modern operating system (and browsers) implements this technique to some degree. Maybe Chrome's sandbox is more refined and comprehensive? In any case, I read (Stackexchange I think) that the point is to have two layers of security, that of the browser itself and that of a discrete sandbox, so that malicious behavior can be safely confined within that isolated environment, and breaching both layers would be incredibly difficult. I don't know how well this works on Porteus, so I decided to just go with Firefox in the end.

Koss98
-
neko
- DEV Team

- Posts: 2113
- Joined: 09 Feb 2013, 09:55
- Distribution: APorteus-FVWM-ja-x86_64.iso
- Location: japan
Post#15
by neko » 05 May 2017, 05:14
@Koss98
If you need the kernel that was built on "CONFIG_NAMESPACES=y",
the kernel of Porteus ISO can be replaced easily with the "CONFIG_NAMESPACES=y" one.
http://forum.porteus.org/viewtopic.php? ... =60#p54605
Thanks.
neko