Bug#965097: firejail: Firejail Disables U2F/WebAuthn By Default

2020-07-16 Thread Jeff Root
Package: firejail
Version: 0.9.58.2-2
Severity: normal

Dear Maintainer,

   * What led up to the situation?

   Upgraded from Debian 9 to Debian 10.

   * What exactly did you do (or not do) that was effective (or
 ineffective)?

   Kept fiddling with Yubikey libs, u2f libs.  Unistall, purge, reinstall.  Ran
firefox-esr with extensions disabled, ran with fresh profile.

   I also tried removing the Security Device configuration item from the
browser.  I re-loaded the Security Device into the browser.

   * What was the outcome of this action?

   WebAuthn/U2F failed.  Test site demo.yubico.com. would not enable U2F
registration.

   * What outcome did you expect instead?

   I expected to use demo.yubico.com to register, then authenticate with my
Yubikey4.

   * What fixed the problem?

   I discovered that /etc/firejail/firejail.conf had

# Disable U2F in browsers, default enabled.
# browser-disable-u2f yes

   I uncommented that line, and changed it to "no" to solve the problem.

  I believe there are two problems here.  First, I don't see any reason why
WebAuthn would be disabled by default.  I'm not aware of any reason that would
improve security or usability.  Second, it was very difficult to understand
this setting; the man page documents BROWSER_DISABLE_U2F, and explains how to
_disable_ U2F, but not how to ENable U2F.  As Debian/upstream has it disabled
by default, I think it would be better for the man page to show how to enable
it, or preferably show how to enable it.  The documentation (and this is likely
an upstream issue) doesn't really describe how the profiles are used, what the
config file is for, or how to override these settings.  (For example, there's a
command line argument to firejail, --nou2f, but no sign of how to _not_ disable
U2F.

  I would suggest that Debian change that default setting to "no" so that U2F
works out of the box.



-- System Information:
Debian Release: 10.4
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.19.0-9-amd64 (SMP w/4 CPU cores)
Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) (ignored: LC_ALL 
set to en_US.UTF-8), LANGUAGE=en_US.UTF-8 (charmap=UTF-8) (ignored: LC_ALL set 
to en_US.UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages firejail depends on:
ii  libapparmor1  2.13.2-10
ii  libc6 2.28-10

Versions of packages firejail recommends:
ii  firejail-profiles  0.9.58.2-2
ii  iproute2   4.20.0-2
ii  iptables   1.8.2-4
ii  xauth  1:1.0.10-1
ii  xserver-xephyr 2:1.20.4-1
ii  xvfb   2:1.20.4-1

firejail suggests no packages.

-- Configuration Files:
/etc/firejail/firejail.config changed [not included]

-- no debconf information



Bug#383554: 'pump' fails after receiving IP address, and card is disabled

2006-08-17 Thread Jeff Root
Package: pump
Version: 0.8.21-2
Severity: normal

Pump fails after obtaining an IP address from a DHCP
server.  It sends
a DHCPDISCOVER request, gets a DHCPOFFER reply, then
sends a second
DHCPDISCOVER request.  This gets a DHCPOFFER, which
sets my IP
address, then I get "failed to set default route",
which then stops
the interface and disables the card.

(See daemon.log snippet below.)

I replaced 'pump' with 'dhcp3-client', and it all
works.

I've swapped between dhcp3-client and pump several
times, and the
failure came and went with pump.

I've seen similar reports on the 'net, and it appears
to be a
combination of 'pump' and Prism2 cards.

Jeff Root

-- System Information:
My OS: Debian stable (Sarge), up-to-date.
Kernel: 2.4.27-2-386
My HW: Vaio 505TS, Microsoft MN-520 802.11b PCMCIA
wireless card


-  From daemon.log
-

Aug 17 13:45:15 localhost cardmgr[1060]: socket 0:
Microsoft Wireless Notebook Adapter MN-520
Aug 17 13:45:15 localhost cardmgr[1060]: executing:
'modprobe hostap'
Aug 17 13:45:16 localhost cardmgr[1060]: executing:
'modprobe hostap_cs'
Aug 17 13:45:17 localhost cardmgr[1060]: executing:
'./network start wlan0'
Aug 17 13:45:17 localhost pumpd[1994]: PUMP: sending
discover 
Aug 17 13:45:26 localhost pumpd[1994]: got dhcp offer 
Aug 17 13:45:26 localhost pumpd[1994]: PUMP: sending
second discover
Aug 17 13:45:26 localhost pumpd[1994]: PUMP: got an
offer
Aug 17 13:45:27 localhost pumpd[1994]: PUMP: got lease
Aug 17 13:45:27 localhost pumpd[1994]: intf: device:
wlan0
Aug 17 13:45:27 localhost pumpd[1994]: intf: set: 416
Aug 17 13:45:27 localhost pumpd[1994]: intf:
bootServer: 172.16.241.1
Aug 17 13:45:27 localhost pumpd[1994]: intf: reqLease:
43200
Aug 17 13:45:27 localhost pumpd[1994]: intf: ip:
172.16.8.149
Aug 17 13:45:27 localhost pumpd[1994]: intf: next
server: 172.16.241.1
Aug 17 13:45:27 localhost pumpd[1994]: intf: netmask:
255.255.252.0
Aug 17 13:45:27 localhost pumpd[1994]: intf:
gateways[0]: 172.16.8.254
Aug 17 13:45:27 localhost pumpd[1994]: intf:
numGateways: 1
Aug 17 13:45:27 localhost pumpd[1994]: intf:
dnsServers[0]: 172.16.89.1
Aug 17 13:45:27 localhost pumpd[1994]: intf:
dnsServers[1]: 172.16.32.10
Aug 17 13:45:27 localhost pumpd[1994]: intf: numDns: 2
Aug 17 13:45:27 localhost pumpd[1994]: intf:
broadcast: 172.16.11.255
Aug 17 13:45:27 localhost pumpd[1994]: intf: network:
172.16.8.0
Aug 17 13:45:32 localhost pumpd[1994]: configured
interface wlan0
Aug 17 13:45:32 localhost pumpd[1994]: failed to set
default route: Network is unreachable
Aug 17 13:45:39 localhost cardmgr[1060]: executing:
'./network stop wlan0'
Aug 17 13:45:39 localhost pumpd[1994]: terminating as
there are no more devices under management
Aug 17 13:45:39 localhost cardmgr[1060]: + Operation
failed.


__
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]