-
Notifications
You must be signed in to change notification settings - Fork 18
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Mount a FUSE filesystem without use of root or fusermount (suid) #71
Comments
For a trivial example, you can just use Maybe someone should experiment with launching AppImages from this shell environment to see how differently the applications behave before implementing anything in C |
For security reasons, user namespaces have been restricted resp. locked down more again on many OSes. I could imagine that this would cause issues with rootless FUSE. Plus, they've never been enabled on a lot of popular distros. |
Isn't Bubblewrap using this, too? Which would mean that at least all distributions that support Flatpak should have this enabled by default? |
As far as I know. I believe it also has an SUID version but normal bubblewrap uses unprivileged namespaces. Even with the distros that disable them (like Ubuntu), many distros still support them out of the box. Nix, Arch and LM right off the top of my head, so assuming we can actually get it to feel like there's no difference it's probably worth it I've started on making a new AppImage runtime in Zig and I'll try to implement mounting with namespaces |
I tested this with the nvtop appimage, it has an odd issue that I can no longer see the active processes, it also breaks the cpu-x daemon. |
As @mgord9518 pointed out:
#32 (comment)
VERY interesting @mgord9518. 💯 I think you are up to something. That suid helper binary always bothered be to begin with.
Does anyone know how to actually implement this, in code? Any help appreciated 👍
The text was updated successfully, but these errors were encountered: