Forum › Forums › New users › New Users and General Questions › [SOLVED] firefox 57 / firefox-esr 52
- This topic has 8 replies, 2 voices, and was last updated Jan 11-3:01 pm by Anonymous.
-
AuthorPosts
-
January 9, 2018 at 7:47 pm #4934
Anonymous
Howdy,
I’m using Antix 17 Heather Heyer 64bit (base version) and installed firefox 57 from control centre package installer. Will firefox and firefox-esr have any conflicts with each other.
Thanks
January 9, 2018 at 8:12 pm #4935Anonymous
::Conflicts? Yes.
Hopefully you created a backup of your mozilla profile directory prior to installing the newer version
and/or you launched the new version using -P option, to specify creation of a separate user profile.
https://support.mozilla.org/en-US/questions/974208
https://askubuntu.com/questions/904735/how-to-run-firefox-and-firefox-esr-simultaneouslyJanuary 9, 2018 at 9:06 pm #4936Anonymous
::Howdy skidoo,
Sounds as though it may be best to uninstall one or the other.
Of the 2 which would be your choice to use.
Thanks
January 9, 2018 at 10:44 pm #4940Anonymous
::I choose ff52-esr.
If you have already run ff57, it may have altered your existing profile in non-backward-compatible ways.
https://support.mozilla.org/en-US/questions/1192556January 10, 2018 at 4:16 am #4950Anonymous
::Howdy skidoo,
Yep I do believe I made a mistake and I believe you are right about screwing up my existing profile.
Removed firefox 57.
So I’ll see how firefox-esr does and if I have any issues I will reinstall my Antix 17 as this is a new install.
It’s true what is said “Learn by doing” and I have and now I know that some things are better left alone.
Thanks for your help and patience as I know I’m a PITA.
Thanks
January 10, 2018 at 5:46 am #4957Anonymous
::Is this normal.
@Dell-Optiplex-360:~
$ firejail firefox
Reading profile /etc/firejail/firefox.profile
Reading profile /etc/firejail/disable-common.inc
Reading profile /etc/firejail/disable-programs.inc
Reading profile /etc/firejail/disable-devel.inc
Reading profile /etc/firejail/whitelist-common.inc
Parent pid 3519, child pid 3520
Blacklist violations are logged to syslog
Child process initialized
console.error: PushService:
stateChangeProcessEnqueue: Error transitioning state
UnknownErrorJanuary 10, 2018 at 11:20 am #4968Anonymous
::These lines are typical (expected, with each launch):
$ firejail firefox
Reading profile /etc/firejail/firefox.profile
Reading profile /etc/firejail/disable-common.inc
Reading profile /etc/firejail/disable-programs.inc
Reading profile /etc/firejail/disable-devel.inc
Reading profile /etc/firejail/whitelist-common.inc
Parent pid 3519, child pid 3520
Blacklist violations are logged to syslog
Child process initializedThe following lines, you shouldn’t have encountered these while using ff52-esr
(b/c PushService is not implemented therein, or is set to disabled in the ESR default preferences)console.error: PushService:
stateChangeProcessEnqueue: Error transitioning state
UnknownErrorshort answer: Perhaps wrongly, I would consider that “error” as representing “a blessing, in disguise”
https://support.mozilla.org/en-US/kb/push-notifications-firefox
(If you understand what “PushService” is, and you care to allow ff to utilize it, you can probably avoid the “error” by tweaking your firejail profile.).
.
a longer (far from complete, yet at risk of spouting “waaaaay too much information”) answer:I regard “push” aka “server-side events” as one of the many anti-features present in recent browser versions.
You may (I don’t) surf sites which require ability to send continually-updated (or periodically-updated) data to a previously-loaded page ~~ e.g. a stock ticker, or trading dashboard ~~ but most sites can fallback to using XMLHttpRequest (ajax) in the absence of Push support. (Necessarily so, because Push support is still far from ubiquitous across web browser brands/versions.) The default, as-shipped, ff57 preferences (not so, for ff52-esr) have push support enabled… and ff is hardcoded to whitelist (without user notification+ opt-in) any pushes issued from *mozilla. servers. As a consequence, it serves as a ready conduit for potentially unwelcome use (unwelcomed by me, by you) .Consider: In the wake of the recent Mr.Robot brouhaha, across online discussions you’ll notice that many affected users adamantly insisted “I was NOT opted-in to TestPilot” or “I had checked, and had intentionally disabled via preferences!”
regarding the “surreptitious injection of Mr.Robot addon”,
this video covers the tip of the iceberg in a clear non-technical manner.video segment (7:13 thru 24:15): https://www.youtube.com/embed/qMALm1VthGY?start=432&end=1473

Although probably unrelated to the “Push” mechanism, specifically… this example underscores the point that inbuilt “features” can be, and already have been, put to use as anti-features
================
Within the “Web Browsers” topic , I’ve embedded links to several “educate yourself” references. We haven’t yet broached “firejail merits, and howto” in our tiny forum. I’m not qualified to coach others in the use of firejail and have noticed that tweaking the per-app firejail profiles to suit (my) individual usage has been “quite a rabbit hole” so… YMMV, and “ifns ya break it, ya get to keep both pieces”.
Among my (literally) hundreds of “changed, away from default” firefox preferences, the following are relevant to “Push”.
I’m sharing this pref:value info as a “peek over my shoulder” not as a “recommendation”.
It’s up to the reader to learn what each pref is/does, and to use discretion when altering their values.dom.server-events.enabled………false
network.http.spdy.allow-push ………false
dom.push.serverURL ………wss://push.services.moooofuzilla.com/
dom.push.requestTimeout ………1
dom.push.pingInterval ………1800009
dom.push.http2.reset_retry_count_after_ms ………60009
dom.push.http2.maxRetries ………1
dom.push.adaptive.upperLimit………1
dom.server-events.default-reconnection-time………50000
services.notifications.serverURL………https://notifications.mooooooooozozilla.org/
toolkit.telemetry.server………https://data.mooooozooooooozilla.comJanuary 10, 2018 at 3:20 pm #4978Anonymous
::Howdy skidoo,
I believe the output of firejail is due to the fact that I installed firefox 57 unknowingly that conflicts would arise so totally on me.
As you stated I broke it so I now have to fix it or reinstall and leave a working install alone.
I’m going to research all of your information and see what I can learn from my mistake as the worst that can happen is I have to reinstall everything a gain.
I’m learning by doing and that ain’t a bad thing as I now know what not to do.
Thanks for the information and the education and your patience.
Home work time for me.
Thanks.
PoorGuy
January 11, 2018 at 3:01 pm #5029Anonymous
::Well here is my new firejail output and it appears to be good.
@dell-optiplex-360:~ $ firejail firefox Reading profile /etc/firejail/firefox.profile Reading profile /etc/firejail/disable-common.inc Reading profile /etc/firejail/disable-programs.inc Reading profile /etc/firejail/disable-devel.inc Reading profile /etc/firejail/whitelist-common.inc Parent pid 7944, child pid 7945 Blacklist violations are logged to syslog Child process initialized @dell-optiplex-360:~ $ firejail --tree 7944:thomas:firejail firefox 7945:thomas:firejail firefox 7951:thomas:firefox-esr 8013:thomas:/usr/lib/firefox-esr/plugin-container -greomni /usr/lib/firefox-esr/omnI’m really uncertain exactly what I did as I copied and pasted so much and I’m confused as hell.
What an education and learning experience.
I couldn’t write software / code as I would burn out as this is some heavy stuff that you who are developers do.
Thanks for all of the info and links skidoo.
The confused PoorGuy.
-
AuthorPosts
- You must be logged in to reply to this topic.