-
-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Browser integration: Custom sockets #1820
Comments
Linux uses QStandardPaths::RuntimeLocation (XDG_RUNTIME_DIR) if it's found. I wonder how this changes with firejail. I have no experience with it but I assume the runtime/temp location changes every time a program is used through firejail? Using custom sockets wouldn't help in this case. |
I've done a little testing, I think it's possible to make this work! :-) EDIT: Some more tuning on the profile
I've been able to reproduce this consistently. Which would mean that given that a jail shares a filesystem with 'the outside world' it should be possible to talk to it. But it would require manually configuring the browserplugin to talk to a specified socket. Are there any command's I can give to the socket using socat to try and see if it will talk back to me? |
Please notice that any message sent to socket must fill the following requirements:
You can try to see if the connection responds to a following random data test message:
One thing you could try is to download the sources, modify |
I have
And the browser integration started working. I still have to figure it out how to automate it without sacrificing |
@varjolintu : Hi! Sorry for the long wait, this kinda shifted to the back burner a bit... I've tried sending the command you proposed like so:
But apart from the window popping up, nothing happens.
EDIT: Speak of the devil, and it starts working again xD (plain firefox and keepassxc). Even with the lightest form of firejail it breaks again. I didn't even bother isolating anything except /home (giving it a isolated copy of my homedir). Running it in the same jail as the browser does work BTW, but that breaks the tray icon. |
Hi all, I have found the solution for the problem, or at least a source. In order for this to work with the default supplied profile for Firejail, you need to have the following things:
When these conditions are met, you can use the plugin! :-) |
Current Behavior
When running a browser (I've only tested Firefox, but I expect the same with other browsers) in a security sandbox such as Firejail, the plugin in the jailed browser is unable to talk to KeepassXC.
My Firefox has been configured to run in it's own Firejail, and from what I can see it doesn't detect the socket keepassxc creates in /tmp/keepassxc-$USER.socket (unless that is the wrong socket).
Expected Behavior
Is there a way in which I can 'force' the plugin to use a socket I specify, or better yet, to allow keepassxc-plugin to tell whether keepassxc is alive using that socket. This should open the way to run these applications completely separated from each other, whilst only sharing a piece of disk space.
Possible Solution
I think this could be solved if both KeepassXC and the browser plugin can have a socket hard configured to talk to.
Context
Currently I'm using KeepassX (not C, still checking it out before making the 'big move') only with Auto-Type macro's, but I wish to go to a bit more integrated solution :-), and this is stopping me from exploring and doing that.
Debug Info
KeePassXC - Version 2.3.1
Revision: 2fcaeea
Libraries:
Operating system: Debian GNU/Linux 9 (stretch)
CPU architecture: x86_64
Kernel: linux 4.9.0-6-amd64
Enabled extensions:
The text was updated successfully, but these errors were encountered: