> I suspect that won't update the Kerberos variable in the environment. Please
> check whether the value of
>
> < /proc/"$(pgrep firefox)"/environ xargs -0L1 | grep KRB
>
> reflects the updated or the old value. If the latter, simplest is to log out 
> and
> in again so the whole environment gets hold of the updated variable.

The command output is empty because no 'KRB' environment variables are
set.  I entered the namespace with 'sudo nsenter -a -t "$(pgrep
firefox)"' and see that the Kerberos configuration files
'/etc/krb5.conf' and '/etc/krb5.conf.d/*' are both available.  The same
was true after a restart.

>Yes in general, but /tmp is special, see [1]. Maybe you would be interested in
>this bypass[2].
>
>[1]https://ubuntu.com/core/docs/security-and-sandboxing
>[2]https://askubuntu.com/questions/1263843/how-to-allow-snap-applications-to-access-tmp-folder

Looks like I'd have to change the ccache location to the specific user's
home directory unless I can then remount the remounted global /tmp into
the Snap sandbox's /tmp.  I'm not sure if that's possible... or wise.

>> The kerberos is one, but the other one is the issue of snap packages not 
>> using the system certificate store, preventing secure use of organizational 
>> CAs.
>
>I wonder if that is part of what's going on here. For the Firefox Snap we use 
>the policy 'SecurityDevices' in order to point Firefox to 
>'/usr/lib/x86_64-linux-gnu/pkcs11/p11-kit-trust.so' which causes the Firefox 
>Snap to use the organizational CAs included in the system trust store. Based 
>on old code comments, this didn't appear to work in 20.04 (probably), but it 
>does work in 22.04 and 24.04.
>
>I'm not sure how the 'SecurityDevices' policy interacts with Kerberos. I'd 
>guess that the Firefox Snap and Kerberos libraries are separate in this 
>regard. Especially given that 'SecurityDevices' pointing to p11-kit is working 
>in 24.04 while Kerberos is not (at least for our set-up).

I tried to test whether or not our organization's CAs were being used in
the sandbox by running the 'klist' and 'kinit' tools in the Snap
sandbox, but they are not available.  I'm not sure how I can test this
further.

-- 
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to firefox in Ubuntu.
https://bugs.launchpad.net/bugs/1849346

Title:
  [snap] kerberos GSSAPI no longer works after deb->snap transition

Status in Mozilla Firefox:
  New
Status in snapd:
  New
Status in chromium-browser package in Ubuntu:
  In Progress
Status in firefox package in Ubuntu:
  In Progress

Bug description:
  Workaround
  ----------

  Add

    default_ccache_name = FILE:/run/user/%{euid}/krb5cc

  to the [libdefaults] section of /etc/krb5.conf so that the Kerberos
  credentials are stored in a file path a snapped application can read.

  Acknowledgement: For many that can't work for {different reasons}, as
  stated in multiple comments below. Nonetheless it is worth a mention.

  Original report
  ---------------

  I configure AuthServerWhitelist as documented:

  https://www.chromium.org/developers/design-documents/http-
  authentication

  and can see my whitelisted domains in chrome://policy/

  but websites that used to work with SPNEGO/GSSAPI/kerberos no longer
  work. I'm guessing the snap needs some sort of permission to use the
  kerberos ticket cache (or the plumbing to do so doesn't exist...).

  I can confirm that Chrome has the desired behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/firefox/+bug/1849346/+subscriptions


-- 
Mailing list: https://launchpad.net/~desktop-packages
Post to     : [email protected]
Unsubscribe : https://launchpad.net/~desktop-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to