-
Notifications
You must be signed in to change notification settings - Fork 532
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Linux: The SUID sandbox helper binary was found, but is not configured correctly #1565
Comments
Happens on Debian buster. Add the following to /etc/sysctl.conf as workaround: |
I am experiencing this problem on Debian 10 (Buster). I initially downloaded the file, granted execute permissions, and it did nothing... no warning or error. After running on the command line I realized an error was being thrown.
using the --no-sandbox option is not a good option in my opinion as it eliminates the ability to easily run without having to drop to the command line just to open the tutanota app. |
For the AppImage package the |
Sorry, closed it by accident. We don't want to disable sandbox for everyone. |
Containerized package types (like Snap or AppImage) come with isolation capabilities which as far as I know makes it difficult to work well with built-in electron/chromium sandboxing. Advanced users could try firejail sandboxing utility that is supposed to work well with AppImage. |
@vladimiry I believe there's misunderstanding of sandboxing options. The sandbox which Electron uses is for sandboxing the renderer process from the main process. see https://electronjs.org/docs/api/sandbox-option |
I didn't use sandboxing term but isolation capabilities. Regarding sandboxing, firejail is mentioned there. |
Just also want to confirm this bug on Debian 10 (Buster): [2111:1223/094824.159565:FATAL:setuid_sandbox_host.cc(157)] The SUID sandbox helper binary was found, but is not configured correctly. Rather than run without sandboxing I'm aborting now. You need to make sure that /tmp/.mount_tutanoHpzPs6/chrome-sandbox is owned by root and has mode 4755. The workaround:
Mentioned by @mpfau gets you up and running again. Would prefer another way if possible, but thanks for this! |
Does it really solve the problem or make them more: Enable these privileges for the whole system. |
I can confirm this issue on my Debian Buster setup too. Also enabling those privileges for the whole system is a very bad idea. It is configured so in Debian so as prevent the vulnerabilities that arise by enabling it. There is however a way to edit the Hopefully, when the team makes the source code of the desktop available we can package it for various distributions. |
I have this problem on my Debian GNU/Lİnux with KDE Plasma machine. |
A way to avoid using the command line is to create a desktop launcher. This depends a bit on the desktop environmend you are using, but on most that support it, it should work somewhat like this:
Normally you can assign an Icon for the launcher also, not sure if there is a way to use the original Tutanota Icon, but that seems of little importance to me. At least this is a very simple way to not have to use the command line. |
By the way, electron-builder has recently merged the electron-userland/electron-builder#4496 PR so it will produce the appimage files with |
Thanks for the helpful info you all provided. I run all my appimages now with --no-sandbox option, however, does this enable a "security hole"? Sorry about the nomenclature but i'm not too savvy about the electron stuff, i was wondering because root privileges were mentioned in other comments. |
@avronr I thought basically all Tutanota's code was open-source. Anyways, I still need that --no-sandbox argument for it to open, so I guess the merge that @vladimiry mentioned doesn't apply to Debian. |
I have the same issue aswell on Ubuntu 24.04. It seems similar to this issue in Bitwarden : Please stop packaging the Desktop client with a setuid root chrome-sandbox Is it a secure workaround? |
installing fuse is the right solution |
Electron requires sandboxing now.
Non-paranoid distributions enable non-privileged containers but Debian does not. App tries to fall back to fall back to the included helper binary but this binary must have setuid root.
It's not clear if we can fix that, at least with AppImage. Maybe we should at least document that and
--no-sandbox
option.see electron/electron#17972
see electron/electron#17972 (comment)
The text was updated successfully, but these errors were encountered: