40
submitted 6 months ago by SolarPunker@slrpnk.net to c/linux@lemmy.ml

While other flatpak apps have no problems. Any suggestions?

top 50 comments
sorted by: hot top controversial new old
[-] BaalInvoker@lemmy.eco.br 14 points 6 months ago

Firefox is one of the few exceptions I suggest always use native version

[-] SolarPunker@slrpnk.net 2 points 6 months ago

If it is due to an inefficiency of Firefox it seems strange to me that no fork has solved the problem, other browsers like Brave work perfectly.

[-] BaalInvoker@lemmy.eco.br 9 points 6 months ago

Not only because of performance issues, but also because it's clunky sometimes. For example, I cannot use KeePassXC Browser extension on Flatpak Firefox cause this implementation is borked. However in native version works flawlessly

[-] CrumblyLiquid@lemmy.ml 6 points 6 months ago

The extension is probably not broken because of Firefox but because Flatpak's sandboxing prevents it from talking to KeePassXC.

[-] BaalInvoker@lemmy.eco.br 2 points 6 months ago

I know. That's why I'm using native Firefox version, which works flawlessly

[-] boredsquirrel@slrpnk.net 2 points 6 months ago

Flatpak Firefox and Chromium are very different. Note that Flatpak Firefox starts normally fast for me.

Use the native version, it is one of the best maintained software and has access to "user namespaces" for isolation.

Now search on the internet what that is XD

[-] SolarPunker@slrpnk.net 5 points 6 months ago

The only "Firefox" not presenting this start issue for me is Floorp but it's proprietary.

[-] boredsquirrel@slrpnk.net 1 points 6 months ago

Run it from the terminal to get more info.

Also run it through a profiler software like perf with the GUI hotspot.

Also, you are not by accident using secureblue, are you?

[-] SolarPunker@slrpnk.net 1 points 6 months ago

What is it? I'm on Bazzite.

[-] boredsquirrel@slrpnk.net 1 points 6 months ago

Dont mind then. Secureblue uses a strange hacky workaround for manking Flatpaks supposedly more secure.

So then try the other things I said.

load more comments (2 replies)
[-] fenndev@leminal.space 4 points 6 months ago

Any issues lately with your network? When DNS is down or having issues, Firefox and forks take forever to start up.

load more comments (5 replies)
[-] Para_lyzed@lemmy.world 4 points 6 months ago

Is this new, or has it been happening for a few days/weeks? I'm on Fedora Atomic (which Bazzite is based on) and have never experienced this (though I mostly use Mullvad browser, a fork of Firefox). I tried Bazzite a few weeks ago and also never experienced this with the Firefox flatpak. If it's been happening for awhile, it may be hardware-specific or a config thing. Out of curiosity (just to get a 1:1 comparison), do you experience the same thing with the Mullvad browser flatpak?

[-] SolarPunker@slrpnk.net 2 points 6 months ago

I'm on a fresh install. I experienced this with Firefox, LibreWolf and Waterfox.

[-] Para_lyzed@lemmy.world 3 points 6 months ago* (last edited 6 months ago)

Hm, it could be a new issue then. I'm not seeing it on the Bazzite issues page, perhaps you should open a new issue on it here, and provide your hardware specs. At the very least, you could see if this issue is reproducible on other installs, and someone there could help to obtain more useful debug info to determine the actual problem. You could also report it on the Mozilla Bugzilla page, as chances are this is a Firefox issue and not a Bazzite issue, but I admit that the interface for bug reports is less intuitive for non-developers there. Bazzite devs would likely direct you to there first anyway though.

All I can really say myself is that I don't experience this on Fedora Atomic KDE 40.20240607 with Mullvad Browser or the Firefox flatpak. I suspect it is either a hardware/config issue (on fresh install, I'd say a config issue is a distro issue if you haven't changed anything), or that this is Bazzite specific and not present in upstream Fedora Atomic. Regardless, it's a good idea to report this so that other users don't experience the same bug

[-] ColdWater@lemmy.ca 3 points 6 months ago

I have many flatpak apps bork down on me (steam, wine, emulators...) just install from your distro repo instead and only use flatpak if you don't have other choices

[-] ElectroLisa@lemmy.blahaj.zone 2 points 6 months ago
[-] SolarPunker@slrpnk.net 3 points 6 months ago

Bazzite should have wayland by default

[-] GolfNovemberUniform@lemmy.ml 2 points 6 months ago

I noticed this too on my slowest machine. I guess you should just use native packages or other formats to fix it (as the other person said). I'd stick with Flatpak if possible though. It's more secure

[-] SolarPunker@slrpnk.net 4 points 6 months ago

Anything else works fine, the only other problem I've noticed is that some GTK applications don't respect the KDE Plasma theme (in my case only Quod Libet).

[-] khorovodoved@lemm.ee 2 points 6 months ago
[-] SolarPunker@slrpnk.net 4 points 6 months ago

Sorry for what? I'm trying a fresh install of Bazzite so the distro prefers flatpaks.

[-] khorovodoved@lemm.ee 7 points 6 months ago

Sorry for giving a rather useless advice. Of cause, you know about native packages, but since you are asking about flatpak, you, probably, have a reason to chose it. So, my original message was mostly intended as a joke, for which I am sorry.

[-] boredsquirrel@slrpnk.net 6 points 6 months ago

Yeah that is a dumb decision of the uBlue folks. I really like their tooling but their Flatpak browser stuff (and a bit more) are annoying.

You also cant even layer Firefox, due to this rpm-ostree bug

https://github.com/coreos/rpm-ostree/issues/4554

Make some noise there if you want.

[-] Telorand@reddthat.com 6 points 6 months ago

Just curious why you think it's dumb. I think it's a great idea, since it gives more protection by containerizing the app.

Like I told OP, I haven't had any particularly long load times, but "long" is a subjective measure, after all.

[-] boredsquirrel@slrpnk.net 8 points 6 months ago

It is a great idea but the concept is flawed

This issue helps to understand it

seccomp background

libseccomp is a long established security "firewall for syscalls", it allows to restrict what actions programs can perform on the system.

I dont know what exactly these are, often low level stuff I guess, but one of these actions is "create an unprivileged user namespace".

Flatpak uses a single, "badness enumerating" seccomp filter, which means they block the syscalls "A", "B" and "C" for all programs. All others are allowed, and (see the issue) programs cannot define a more restrictive one.

user namespaces

A namespace is a virtual filesystem on top of the "real" one, where certain real system files are mounted to. This means unprivileged programs can suddenly do "OS stuff", needed to create this filesystem.

contra user namespaces

Many distros like Debian (and Arch) didnt enable this feature for a long time, because user namespaces mean that unprivileged userspace programs, like your browser, can suddenly access low level system components like the filesystem.

If there now is a bug in such a component, user namespaces allow the program to directly access a way more privileged area, escape here and thus have privilege escalation.

This would not be possible when not using user namespaces.

Flatpak has a seccomp filter that blocks the creation of user namespaces, to avoid this low level system access. Which is a very good thing, but the missing modularity doesnt allow anything else!

pro usernamespaces

Over time even slow pacing distros like Debian enabled user namespaces.

Today they are the core feature of bubblewrap, podman, docker, (and thus distrobox and toolbox)...

The concept is that a rootless binary, running in userspace, can access system components which would normally require root.

Firejail is the opposite example, it is a root binary and sandboxes apps also when user namespaces are disabled. Chromium has a fallback suid sandbox which also is a root, same with bubblewrap after the modification by 34N0 implemented in the "no userns" images of secureblue.

The problem is, a root binary has root access. If there is a flaw in it, which was the case with firejail, the "nice and secure isolated app" could now use the root binary to escalate its privileges to root level, more than what it could have done without it.

Browsers and Sandboxes

A browser is basically a platform to run "apps" on. Nearly all websites nowadays require executable code, which means browsers are the attack surface for malware. Scrap your verified Flathub or well maintained distro repository, a single website could use a weakness and break your system.

This was a thing back in the time... crazy huh?

Chromium (Chrome, Edge, Brave, Vivaldi, Opera, ...) has the said rootful sandbox as a fallback, I guess implemented back when user namespace sandboxes were not adopted enough.

But is normally uses a user namespace sandbox for process isolation, every tab runs in a different process, on Android too.

Firefox also uses user namespace sandboxes for tabs, but additionally uses seccomp-bpf to restrict the syscalls that the isolated tabs/processes can execute.

Flatpak and Chromium

Chromium relies exclusively on the ability to create sandboxes, with a root binary (the strange not really used fallback method) or with user namespaces.

So much that it straight up doesnt run if it cannot do that. The same goes for Electron apps, which are a browser platform running a single or very few processes.

This is why zypak was created. It redirects the calls of Chromium to flatpak, so it uses the builtin Flatpak sandbox instead.

As I said, all Flatpak apps (and thus all processes) use the same seccomp filter, so I assume that zypak is less secure than the native sandbox, which is battle tested by Google, Microsoft and more companies.

But it uses a sandbox, it is rootless and uses user namespaces. It just needs a little testing, a security audit, a bit of pentesting.

At the current stage I would honestly not trust it, so Flatpak Chromium browsers are not recommended for "production".

Flatpak and Firefox

The Firefox Flatpak is official.

What the heck?

Thats what I asked byself and created this issue but honestly, this issue thread is way more informative.

Right now we just fork(), so replacing that with flatpak-spawn would cause a massive increase in memory usage? You would no longer have CoW sharing of memory.

So Firefox would need big architectural changes to support a sandbox like Flatpak's. It uses copy-on-write to save Memory and be more efficient.

For some reason Chromium works just fine with zypak.

it's not clear to me the "Flatpak Sandbox" it's creating is comparable to what we have now (even with just seccomp-bpf). We launch our subprocesses with specific, nailed down sandboxes.

They should absolutely compare their seccomp filters. But this indicates the same issue as the one at the beginning, always using the same seccomp filter is not suited for an entire platform like a browser.

Fair usage in Flatpak

To sum it up:

Electron apps are likely fine to be ran as Flatpaks. The zypak sandbox may not isolate the processes from another as well as the normal one does, but they are controlled and known code.

Electron uses Chromium because of laziness, not because it needs the security of the platform. Daniel Micay, the creator of GrapheneOS, would also list a few very technical things why Electron has crippled security features of Chromium.

Thunderbird is using Firefox similar to Electron, just as a platform for known code, so this will be fair too.

Flatpak Firefox... is probably okay secure. If you use UBlock Origin with some filterlists, and an opt-in NoScript setup (which I highly recommend for privacy and security), the risk is even lower.

But the risk is literally getting malware, losing all your data, getting breached or intruded. So why leave out this security measurement.

But, its true, Flatpak isolates the browsers from the system, which is really nice. If there is a weakness in the browser platform, a process could not just escalate and access everything Firefox can.

Bubblejail

So isolating the browser from the system using Bubblewrap, a modern and rootless sandboxing tool, sounds like a good idea.

The only issue is the always-the-same seccomp filter. The best solution would be a fix for the issue at the beginning, but for now we can use bubblejail.

It is a tool that makes the creation of bubblewrap and seccomp filters easy, and adds Desktop entries to launch existing apps through that sandbox.

For some reason it doesnt work at all anymore for me... but it did in the past. It is certainly not ready, but with some helping hands it can fix all the gaps, where system apps are needed for certain abilities.

May that me a VPN app, Nextcloud-client adding icons to your task manager, an IDE like VSCodium, Zed, Lapce, Kate... or isolating all your system apps!


So currently I use Fedora Firefox, which is very well maintained and checked for security build flags.

I will continue making bubblejail work, which will be a good solution for this problem.

[-] Telorand@reddthat.com 4 points 6 months ago* (last edited 6 months ago)

Probably best that you do the same (installing packages in the FS overlay kind of starts to defeat the point of containerization). You could try installing it with a distrobox and then exporting the app—see if that fixes your loading issues.

I run Bazzite on a gaming laptop from 2015, and I haven't noticed any particularly long load times. Do you have some browser extension(s) that are maybe causing issues?

[-] SolarPunker@slrpnk.net 4 points 6 months ago

My only extension is uBlock Origin but it isn't the problem (I uninstalled it to test and nothing changed). Thanks for your suggestion, I'll try to play with distrobox (I'm new to Bazzite and immutable distros).

[-] khorovodoved@lemm.ee 3 points 6 months ago* (last edited 6 months ago)

Distrobox will introduce a startup lag of it's own. I would rather recommend (seriously this time) something like nix (it is officially supported for your distro) or junest.

[-] Telorand@reddthat.com 3 points 6 months ago

Nix might have been removed. I'll have to check, but I feel like the ujust command forv setting up nix went away a version or two ago.

But I think you can set distroboxes to run at startup, so you'd never know the difference when it came time to actually launch the program. Right (correct me if I'm wrong)?

[-] khorovodoved@lemm.ee 3 points 6 months ago

Maybe, I do not use bazzite and cannot check. But it used to be a feature. You can, of cause, start distrobox at startup, but literally running almost two operation systems might not be the best for performance and RAM usage.

[-] Telorand@reddthat.com 2 points 6 months ago

Could be a case for toolbox, which I admittedly know even less about. Either way, people here have offered several options to try!

[-] khorovodoved@lemm.ee 1 points 6 months ago

Toolbox is effectively the same thing as distrobox. It is a linux distro inside docker-like container. They even use the same images.

[-] SolarPunker@slrpnk.net 1 points 6 months ago

Are there any processes in particular that I should keep an eye on? At the moment I don't notice any new particularly high load.

[-] khorovodoved@lemm.ee 2 points 6 months ago

Fortunately, it does not usually cause high load, but it still exists. The only thing I can recomend here is to always check if the dependencies of any package you install in container require to run in the background and avoid those which do.

[-] SolarPunker@slrpnk.net 1 points 6 months ago

Ok I'm writing this thru Firefox (distrobox) and it works pretty well, no lag noticed.

[-] khorovodoved@lemm.ee 2 points 6 months ago

The lag would be noticeable when you launch Firefox with stopped container (for example after reboot or manual stop).

[-] SolarPunker@slrpnk.net 1 points 6 months ago

Ok, I've tested this, I've noticed a lag of a couple of seconds for the first time I launched a distroboxed app.

[-] Para_lyzed@lemmy.world 2 points 6 months ago

Sounds about in line with what I'd expect. If that works for you where the flatpak doesn't, then it at least makes a viable solution for the short term (though I don't know how much overhead would be introduced). A minute of delay is ridiculously long for startup, so I still don't know why you were having that issue with the flatpak

[-] Para_lyzed@lemmy.world 1 points 6 months ago

Is it? I was looking a few months ago at Nix support in Fedora Atomic (which Bazzite is based on), and it required some minor hacks to get the /nix folder and Nix itself working properly with rpm-ostree distros, as root is otherwise immutable. Plus, Nix isn't available by default in the Fedora repos it seems. I believe it required something along the lines of making a /var/nix folder and symlinking it, but I believe you'd also have to work around SELinux contexts on the folder and symlink. I've heard of people even having issues after that, so I wouldn't consider it "official" support. Here's an open issue thread about it

load more comments (1 replies)
load more comments (3 replies)
[-] Telorand@reddthat.com 2 points 6 months ago

You can try rpm-ostree to install in the lowest userspace layer, but Bazzite purposely switched to flatpak Firefox and discourages installing software using rpm-ostree, unless you absolutely have to.

load more comments (3 replies)
load more comments (4 replies)
load more comments
view more: next ›
this post was submitted on 07 Jun 2024
40 points (93.5% liked)

Linux

48717 readers
1109 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS