Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

0.7.1 SBIE2214 Installer msi #600

Closed
bjm234 opened this issue Feb 21, 2021 · 15 comments
Closed

0.7.1 SBIE2214 Installer msi #600

bjm234 opened this issue Feb 21, 2021 · 15 comments
Labels
Status: Fixed in Next Build Fixed in the next Sandboxie version

Comments

@bjm234
Copy link

bjm234 commented Feb 21, 2021

image
image
image
[https://www.screentogif.com/] Installer msi
ScreenToGif.2.27.3.Setup.zip

@bjm234 bjm234 changed the title 0.7.1 msi installer SBIE2214 0.7.1 SBIE2214 installer msi Feb 21, 2021
@bjm234 bjm234 changed the title 0.7.1 SBIE2214 installer msi 0.7.1 SBIE2214 Installer msi Feb 21, 2021
@isaak654
Copy link
Collaborator

isaak654 commented Feb 22, 2021

I appreciate your continuous contribution here and I think you could be of greater help whether David invites you to test the releases internally (imho).

I can reproduce this issue too, for all msi installers with "FakeAdminRights=y" and "DropAdminRights=y" in my sandbox.

Another issue is that Sandboxie Plus 0.7.1 doesn't display the follow up message 2220, while in Classic 5.48.5 is correctly displayed and I can use it to disable drop rights (in this case, with a double click):

2220

@ImSpecial
Copy link

What's the issue? It's literally telling you that it's failing to start due to "dropped rights".

@isaak654
Copy link
Collaborator

It should work for all installers, according to the changelog of the latest version:

-- With "FakeAdminRights=y" and "DropAdminRights=y" installers should still work

@bjm234
Copy link
Author

bjm234 commented Feb 22, 2021

Chrome n' Edge don't like Drop Rights. And ScreenToGif msi doesn't like Drops Rights.
Since, 0.7.1 annotates Drop Rights (Recommended). Thought I'd try "DropAdminRights=y" & "FakeAdminRights=y" with exe & msi installer. Just to see what's what.

@isaak654
Copy link
Collaborator

No problem with .exe files here, it's just allergic to .msi installers.

@bjm234
Copy link
Author

bjm234 commented Feb 22, 2021

No problem with .exe files here, it's just allergic to .msi installers.

Yeah, exe feels okay.

@ImSpecial
Copy link

Key word is "should".

You're playing a compatibility game here, some things won't like a setting, and some are fine with them, you cannot have both an On & Off light switch, either have a hardened sandbox that will more often break compatibility, or a more laxed one without that setting. Or have both for different reasons.

@DavidXanatos
Copy link
Member

emm... what fails here is that with drop admin rights enabled you cant start services (like MSI installer) in the sandbox at all,
If you go for fake admin but not drop rights the installation will work and be similarly secure, as long as you don't clock ok on a UAC prompt, but that one shouldn't appear anyways.

With the new setting to (by default) not run services as system the aforementioned behavior can be changed though, i.e. allow service starts when drop rights is off and they are than started with a normal user token.
I may relax this for the next build just have to think if that's surely secure enough.

Also note that the problems with elevated processes were since since 3.0x to 4.x or even earlier present, just after fixing like half a dozed Security Vulnerabilities recently that all were caused by allowing to much to elevated processes, I thought screw it sandboxed processes should not have to be elevated in the first place. Hence the new feature and the recommendation.

@ImSpecial
Copy link

@DavidXanatos

You need to start leaning more on the side of compatibility, more then security for the default settings. Sandboxie was never meant to be some malware testing tool, its for running legitimate stuff while keeping your system clean, untouched, prevent win-rot, etc.

If people want a super-hardened box for malware/shady installers then they can tweak their own settings away from the defaults to do so and then can expect more breakage with software. All IMO of course, what are your thoughts?

@bjm234
Copy link
Author

bjm234 commented Feb 22, 2021

ImSpecial wrote:
@DavidXanatos
You need to start leaning more on the side of compatibility, more then security for the default settings. Sandboxie was never meant to be some malware testing tool, its for running legitimate stuff while keeping your system clean, untouched, prevent win-rot, etc.

If people want a super-hardened box for malware/shady installers then they can tweak their own settings away from the defaults to do so and then can expect more breakage with software. All IMO of course, what are your thoughts?

Regarding "default settings". Drop Rights is not default with 0.7.1 DefaultBox.
image
Since, 0.7.1 annotates Drop Rights (Recommended). I tried "DropAdminRights=y" & "FakeAdminRights=y" with DefaultBox. Just to see what's what. Just as test.

Drop Rights is default with 0.7.1 Hardened box.
image
Regards w Respect
Note: Chrome & Edge do not like Drop Rights.

@bjm234
Copy link
Author

bjm234 commented Feb 22, 2021

DavidXanatos wrote:
emm... what fails here is that with drop admin rights enabled you cant start services (like MSI installer) in the sandbox at all,
If you go for fake admin but not drop rights the installation will work and be similarly secure, as long as you don't clock ok on a UAC prompt, but that one shouldn't appear anyways.

@DavidXanatos
"Make applications think" without "Drop rights" is not doable via checkbox with my 0.7.1 Plus UI box's. "Make applications think" check'd + Apply does not retain "Make applications think" check'd. Just me?
I need to employ Edit ini to opt
image
image

Confirming with "FakeAdminRights=y" and "DropAdminRights=n" msi feels okay.
image
image

@DavidXanatos DavidXanatos added the ToDo To be done label Feb 23, 2021
@bjm234
Copy link
Author

bjm234 commented Feb 23, 2021

@DavidXanatos
Just now noticed Ask for UAC Elevation | Drop Admin Rights | Emulate Admin Rights with Sandbox Presets menu.
image
Sandbox Presets option appears to be accurately reflected with Elevation restrictions boxes.
Ask for UAC Elevation = no boxes | Drop Admin Rights = one box | Emulate Admin Rights = both boxes.
image
And Elevation restrictions option/s appears to be accurately reflected with Sandbox Presets.

So, IDK if "Make applications think" without "Drop rights" is/was intended designed option.

@DavidXanatos
Copy link
Member

My goal is to really only need the 3 options in the presets menu, but untill everything runs perfectly fine its intended to also be able to use the settings to set a more advanced preset by only checking the emulate admin option without checking the drop rights.

@bjm234
Copy link
Author

bjm234 commented Feb 23, 2021

Okay....I hear ya'. Thanks

@DavidXanatos DavidXanatos added Status: Fixed in Next Build Fixed in the next Sandboxie version and removed ToDo To be done labels Feb 25, 2021
@DavidXanatos
Copy link
Member

In the next build MSI server will be able to work correctly when DropAdminRights is in place :D

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Status: Fixed in Next Build Fixed in the next Sandboxie version
Projects
None yet
Development

No branches or pull requests

4 participants