-
-
Notifications
You must be signed in to change notification settings - Fork 1.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Custom] HTTP Toolkit compatibility for KernelSU - how to create app-visible mounts via ADB #1354
Comments
KernelSU will umount modifications to apps by default, if you don't want it to be umounted, you can set it by App Profile |
Thanks @tiann that's very helpful!
Ah, I see. This is the "umount modules by default" option described in that documentation you linked. I understand that changing the App Profile would work for a one off case. For me though, I'm trying to fix this for all HTTP Toolkit KernelSU users (these interception scripts are used to intercept 1000s+ of Android devices every day) and I'd really like to find a way to fully automate this so KernelSU works smoothly like the other rooting mechanisms. If changing the App Profile settings is the only way then I would need to manually detect KernelSU and then show extra prompts walking every user through an extra manual process, which is quite awkward (and probably results in lots of requests from users for support, which I don't want). I would like to find a way to fully automate this, when running a script against an arbitrary device (so I can't use the UI - just ADB). The scripts involved in HTTP Toolkit are run as root on all these devices though, so I think that's probably possible in a quite few different ways. I've done some digging through the code to understand this better. By the look of the umount code at the end of Do you know if it's possible to reliably create mounts within the 'real' non-overlay filesystem directly from a rooted ADB shell? That would solve this problem for me immediately. In that case, when the overlayfs is unmounted, the app would still see the mounts I've created on the underlying filesystem, so everything would work fine. Alternatively, I can see there's a fixme comment discussing specifically filtering this umounting, so it only applies to KernelSU module mounts. That would also fix this for me (at least for users using new KernelSU) and I suspect this issue will also affect many other similar tools (mostly reverse engineering & developer tools) that use custom mounts via ADB to manage rooted devices, so that would fix all those other cases as well. Are you interested in working on that soon? I'd be happy to help, although I don't have a KernelSU development setup currently (if you have a guide to emulator setup or a suggestion of a cheap compatible Android to buy for testing, I'm open to getting involved to make this happen). |
If you use KernelSU, you need to flash boot image, you can disable the "Unmount the modules by default" in settings when you install it, only do once is enough. I understand your usage scenario, but if you automate it, then we'll receive a lot of requests asking why i can't use XXX bank apps. I think making the people know what they are doing is important, simplify some steps may cause more issues. |
I don't want to automate the "Unmount the modules by default" option, if at all possible, I just want to automate injecting my mount. I agree that permanently enabling that setting for users automatically & unexpectedly would cause problems for everybody. However, I think a way to successfully add mounts for HTTP Toolkit only while HTTP Toolkit is running, in a temporary way (like it does right now) won't cause any problems. Even in cases where root detection causes issues, it'll be clear what's happening (while HTTP Toolkit is enabled there's a persistent notification at all times, for example, it's clear the device is in a changed state). That depends on a way to do this temporarily though, which depends on a way to use ADB to manage the mounts that non-rooted apps see. What do you think about fixing this fixme? That would solve this, for HTTP Toolkit and any others tools & users who want to be able to manage their own mounts via adb. Alternatively I think I can actually get 'underneath' the mounts anyway, by moving KernelSU's |
If you don't want to automate the "umount by default", you can umount overlayfs by KernelSU, and then mount your files, and remount it again. If you mount before KernelSU's mouonts, it will keep the mountpoint. we have |
This doesn't help. because KernelSU mount |
What's the easiest way to automate this from an ADB root shell, while making sure the system ends up back in the correct state afterwards? I was looking at |
I think |
You can refer this commit: 0c52f24#diff-8166f6d05dcb9a7f70e4b6aa3299c3f62bba3e870cd07f1f5d05051f52d90e1bL711 It enters the mount namespace of specific process and make mounts for it. |
Describe your problem.
Hi, I'm the maintainer of HTTP Toolkit. HTTP Toolkit is widely used for HTTP interception & debugging on Android, and has tools to automatically setup rooted Android devices via ADB to do so (installing a system CA certificate, and a VPN app to redirect traffic, and then passing various bits of config via intents).
This is compatible with Magisk and seemingly with the comfortable majority of real users' rooted setups that I've seen, but I have at least one KernelSU user (@ThePedroo - httptoolkit/httptoolkit-android#18) who seems to be reporting that KernelSU's approach to rooting doesn't work with HTTP Toolkit's automated setup - the injected system CA certificates are not trusted or visible to most apps.
I'd like to fix that! 😃
The likely fix is probably on the HTTP Toolkit side - presumably this isn't a KernelSU bug as such - but it would be useful to understand your internals a little to find the best way to integrate with those, so I'm here looking for more information & ideas.
There's more info about what's happening here in that issue linked above, but to summarize:
/system/etc/security/cacerts
and/apex/com.android.conscrypt/cacerts
.nsenter
with a bind mount)ps -P $ZYGOTE_PID
for each zygote)I'm opening this just in case you can share some background about why this might happen, and hopefully some suggestions for KernelSU-compatible ways to do this. I can't offer any more details about the specific device setup but hopefully @ThePedroo can answer any questions there.
My best guess is that you're hooking into how mount namespaces are visible directly as part of the app root-access process, which would explain this. A nice solution for me would be a way to access that via an ADB shell, so I can detect when this is happening and mount into the non-root namespace too, or similar.
If possible, I'd really like to have a single script that handles both KernelSU and other rooting mechanisms in the same way, with just extra branches for the small details of detected scenarios (rather than trying to build an entire KernelSU module, which would live totally separate to the existing approach). Of course that depends what's actually happening here and what's possible. Any info you can share very welcome, I'd love to hear your thoughts!
The text was updated successfully, but these errors were encountered: