[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-commits] [sandboxed-tor-browser/master] Bug #20773: Don't mount /proc in the tor container even with PTs.



commit db09c0bb793c705a13e275dc6d52eed70ca95c80
Author: Yawning Angel <yawning@xxxxxxxxxxxxxxx>
Date:   Sat Nov 26 18:22:10 2016 +0000

    Bug #20773: Don't mount /proc in the tor container even with PTs.
    
    Looking at the Go 1.7.3 source code, all of the usages of `/proc` by
    obfs4proxy either shouldn't get called, or have graceful failure modes.
---
 .../internal/sandbox/application.go                 | 21 +++++++++++++--------
 1 file changed, 13 insertions(+), 8 deletions(-)

diff --git a/src/cmd/sandboxed-tor-browser/internal/sandbox/application.go b/src/cmd/sandboxed-tor-browser/internal/sandbox/application.go
index 1e38adc..0908af1 100644
--- a/src/cmd/sandboxed-tor-browser/internal/sandbox/application.go
+++ b/src/cmd/sandboxed-tor-browser/internal/sandbox/application.go
@@ -458,19 +458,24 @@ func RunTor(cfg *config.Config, torrc []byte) (cmd *exec.Cmd, err error) {
 	h.stderr = logger
 	if !cfg.Tor.UseBridges {
 		h.seccompFn = installTorSeccompProfile
-
-		// The tor daemon only uses this to calculate MaxMemInQueues,
-		// which is a relay thing, so this can safely be disabled.
-		//
-		// Not sure about what to do wrt pluggable transports yet,
-		// obfs4proxy seems to function fine, and the reads it does
-		// look innocent enough, but more investigation is needed.
-		h.mountProc = false
 	} else {
 		h.seccompFn = installBasicSeccompBlacklist
 	}
 	h.unshare.net = false // Tor needs host network access.
 
+	// Regarding `/proc`...
+	//
+	// `/proc/meminfo` - tor dameon, used to calculate `MaxMemInQueues`,
+	//    fails gracefully.
+	// `/proc/sys/kernel/hostname` - obfs4proxy, Go runtime uses this to
+	//    determine hostname, 99% sure this is in the binary but not used
+	//    due to the `log` package's syslog target.
+	// `/proc/sys/net/core/somaxconn` - obfs4proxy, Go runtime uses this to
+	//    determine listener backlog, but will default to `128` on errors.
+	//
+	// See: https://bugs.torproject.org/20773
+	h.mountProc = false
+
 	if err = os.MkdirAll(cfg.TorDataDir, DirMode); err != nil {
 		return
 	}

_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits