[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-bugs] #20879 [Applications/Tor Browser Sandbox]: Set rlimits in the containers.



#20879: Set rlimits in the containers.
--------------------------------------------------+---------------------
     Reporter:  yawning                           |      Owner:  yawning
         Type:  enhancement                       |     Status:  new
     Priority:  Medium                            |  Milestone:
    Component:  Applications/Tor Browser Sandbox  |    Version:
     Severity:  Normal                            |   Keywords:
Actual Points:                                    |  Parent ID:
       Points:                                    |   Reviewer:
      Sponsor:                                    |
--------------------------------------------------+---------------------
 The containers should have rlimits set to prevent runaway resource use,
 though some of these (eg: address space) are tricky and require thought.

 After discussion on IRC, sensible defaults that could be applied to
 everything as a first pass would be something like:

 RLIMIT_STACK: 8192
 RLIMIT_RSS: 0 (No effect as of Linux 2.6.x)
 RLIMIT_CORE: 0
 RLIMIT_NPROC: 512
 RLIMIT_NOFILE: 1024 (512?, lower?)
 RLIMIT_MEMLOCK: 64 (KiB)
 RLIMIT_LOCKS: (check how much firefox/tor uses flock, set to something
 low)
 RLIMIT_SIGPENDING: 64
 RLIMIT_MSGQUEUE: 0 (assuming nothing uses this)
 RLIMIT_NICE: 0
 RLIMIT_RTPRIO: 0
 RLIMIT_RTTIME: 0

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/20879>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs