- Bearbeitet
I got here by trying to set up the simplest possible implementation of SuRun on an XP SP3 system with a basic combination of SRP and NTFS access rights, using Sandboxie, Windows 7 Firewall Control, Microsoft Security Essentials, and FireFox as my security "suite." (I'm not a "systems" person and may need more hand-holding than most on this forum.)
My goal was VERY simple: Have just one program that won't run properly in a LUA start automatically with elevated rights (only when called, not at startup, nor in a Sandbox, nor anything else fancy) for just one Limited User. No additional rights are desired for this "SuRunner" (no changing SuRun settings, no ability to elevate rights of other programs, no tinkering with protected Windows settings). Also, no automatic checking for programs that need elevated rights and no additions to the context menus are desired.
I tried to achieve this simplicity by limiting most of the options in SuRun's Settings: No "Shell Integration;" the sole SuRunner cannot change SuRun's settings and can only run the predefined programs elevated; the only program listed to start automatically with elevated rights; on the "Execution Hooks" tab, do not try to detect if applications need elevated rights; on the "Advanced" tab, check all the "If a non "SuRunners..." boxes and un-check all of the "Convenience settings".... (I also tried un-checking the both of first two boxes on the "Execution Hooks" tab, "Install filter..." and "Set a Hook...", but I rapidly found that this prevented my program from running with elevated rights at all.)
First Question: Is the above a viable way to use SuRun for my limited purpose? Are there any other features that I can safely disabled?
So far so good with my one program, until I tried to run FireFox in a Sandbox. Then I got error messages, and Sandboxie wouldn't start FireFox at all (as others have reported here since about 2008). Initially I thought this might be a problem with the above very limited settings, but then I found discussion of the problem on this forum most recently here (http://forum.kay-bruns.de/thread/317). Subsequently, I have found another potentially simpler solution here (http://www.wilderssecurity.com/showpost.php?s=b00bee899fd0c7f9c7de97192fdfb964&p=1961712&postcount=20). This latter solution has also been advocated here (http://www.sandboxie.com/phpbb/viewtopic.php?t=9198&highlight=surun).
Second Question: Understanding that I will not be doing anything tricky like installing software from a LUA or otherwise running SuRun inside a Sandbox (or vice versa), which of these two proposed solutions is preferable and why?
1) From Kays's post:
"You need to set "full access" to the named pipe of SuRuns service (\Device\NamedPipe\SuperUserRun).
This ca be done in Sandboxie.ini:
OpenPipePath=\Device\NamedPipe\SuperUserRun"
2) From peterk62's post:
"...in the SuRun settings, go to the "Execution Hooks" tab and click the "Blacklist" button, then add the path to "Sandboxie\Start.exe" to the blacklist."
Thanks in advance for any clarification of these combined issues! -- jclarkw
My goal was VERY simple: Have just one program that won't run properly in a LUA start automatically with elevated rights (only when called, not at startup, nor in a Sandbox, nor anything else fancy) for just one Limited User. No additional rights are desired for this "SuRunner" (no changing SuRun settings, no ability to elevate rights of other programs, no tinkering with protected Windows settings). Also, no automatic checking for programs that need elevated rights and no additions to the context menus are desired.
I tried to achieve this simplicity by limiting most of the options in SuRun's Settings: No "Shell Integration;" the sole SuRunner cannot change SuRun's settings and can only run the predefined programs elevated; the only program listed to start automatically with elevated rights; on the "Execution Hooks" tab, do not try to detect if applications need elevated rights; on the "Advanced" tab, check all the "If a non "SuRunners..." boxes and un-check all of the "Convenience settings".... (I also tried un-checking the both of first two boxes on the "Execution Hooks" tab, "Install filter..." and "Set a Hook...", but I rapidly found that this prevented my program from running with elevated rights at all.)
First Question: Is the above a viable way to use SuRun for my limited purpose? Are there any other features that I can safely disabled?
So far so good with my one program, until I tried to run FireFox in a Sandbox. Then I got error messages, and Sandboxie wouldn't start FireFox at all (as others have reported here since about 2008). Initially I thought this might be a problem with the above very limited settings, but then I found discussion of the problem on this forum most recently here (http://forum.kay-bruns.de/thread/317). Subsequently, I have found another potentially simpler solution here (http://www.wilderssecurity.com/showpost.php?s=b00bee899fd0c7f9c7de97192fdfb964&p=1961712&postcount=20). This latter solution has also been advocated here (http://www.sandboxie.com/phpbb/viewtopic.php?t=9198&highlight=surun).
Second Question: Understanding that I will not be doing anything tricky like installing software from a LUA or otherwise running SuRun inside a Sandbox (or vice versa), which of these two proposed solutions is preferable and why?
1) From Kays's post:
"You need to set "full access" to the named pipe of SuRuns service (\Device\NamedPipe\SuperUserRun).
This ca be done in Sandboxie.ini:
OpenPipePath=\Device\NamedPipe\SuperUserRun"
2) From peterk62's post:
"...in the SuRun settings, go to the "Execution Hooks" tab and click the "Blacklist" button, then add the path to "Sandboxie\Start.exe" to the blacklist."
Thanks in advance for any clarification of these combined issues! -- jclarkw