[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #10943 [Tor Messenger]: Sandboxing Instantbird



#10943: Sandboxing Instantbird
-------------------------------+------------------------------------------
     Reporter:  sukhbir        |      Owner:  ioerror
         Type:  task           |     Status:  new
     Priority:  normal         |  Milestone:
    Component:  Tor Messenger  |    Version:
   Resolution:                 |   Keywords:  SponsorO, TorMessengerPublic
Actual Points:                 |  Parent ID:
       Points:                 |
-------------------------------+------------------------------------------

Comment (by ioerror):

 If OZ isn't available for GNU/Linux (eg: not SubgraphOS) - we should
 probably just stick to packaging and using two basic techniques for
 sandboxing (eg: AppArmor and seccomp) at first.

 Ideally, if we do it properly - Tor can be sandboxed with seccomp by
 default (it is already in Tor) and then InstantBird components can be
 sandboxed with seccomp (which we need to add). Then all of this should be
 sandboxed in AppArmor or SELinux policies. With proper isolation, I can
 see a way to totally ensure Tor has very limited abilities (eg: TCP is
 allowed, a single set of directories for read/write, nothing else), while
 InstantBird could even be forbidden from using TCP/IP (by using Socks5
 over Tor's UnixSocket).

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/10943#comment:9>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs