[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #29819 [Core Tor/Tor]: Seccomp: sandbox crash on rt_sigaction with libseccomp 0.2.4



#29819: Seccomp: sandbox crash on rt_sigaction with libseccomp 0.2.4
-----------------------------------+------------------------------------
 Reporter:  toralf                 |          Owner:  nickm
     Type:  defect                 |         Status:  assigned
 Priority:  Medium                 |      Milestone:  Tor: 0.4.0.x-final
Component:  Core Tor/Tor           |        Version:  Tor: unspecified
 Severity:  Normal                 |     Resolution:
 Keywords:  crash, linux, sandbox  |  Actual Points:
Parent ID:                         |         Points:  2-10
 Reviewer:                         |        Sponsor:
-----------------------------------+------------------------------------
Changes (by nickm):

 * points:  0.2 => 2-10


Comment:

 pege -- the EPERM idea seems plausible, if it works.  Do you have time to
 try it out?

 Otherwise, the only workable idea I can think of is to rearchitect how we
 handle filesystem interactions in the sandbox.  We should really have an
 trusted unsandboxed process whose job it is to open files for the main
 process, and pass them back over a pipe.  This would let us support more
 sandboxing techniques, and allow us to throw out our immutable-string
 hacks.  It would be a lot of work though, and I don't see where we have
 time to do it in our current roadmap.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/29819#comment:21>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs