[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] torjail - run programs in tor network namespace



On 07/23/2018 09:51 AM, bic wrote:
Hello,

I want to share a project made in _to hacklab.

https://github.com/torjail/torjail


Hi there!

I wrote something similar a few years back, but didn't publicize it widely:
https://github.com/squeed/orbox
It does the same basic thing, but uses golang instead of bash. It also uses the tor API port, rather than spinning up a new daemon. Some advantages, some disadvantages.

Ultimately, something makes me uncomfortable about the iptables rules that redirect traffic from the container's interface. I just don't somehow trust their ability to block everything. I'd really like a way to do this without a bunch of annoying iptables work.

I've been looking at two new ways that might be able to avoid this.

Have you looked in to flatpak's portals? On the one hand, Flatpak can do rootless / unpriveleged isolation. On the other hand, it relies on unprivileged user namespaces, which have been huge sources of nasty kernel exploits. grsecurity and debian disable them, and with good reason.

In the containerization world, the crazy people at Cilium have written a cool bpf program that connects two TCP sockets directly, without ever needing to be routed. They're doing it for performance reasons, but I think it would be even more useful for doing tor-style isolation.

Given that you can now attach bpf programs to individual cgroups, I feel like this might finally be the way forward.

Thoughts?

--cdc.


--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk