[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #10943 [Tor Messenger]: Sandboxing Instantbird
#10943: Sandboxing Instantbird
-------------------------------+------------------------------------------
Reporter: sukhbir | Owner: ioerror
Type: task | Status: new
Priority: normal | Milestone:
Component: Tor Messenger | Version:
Resolution: | Keywords: SponsorO, TorMessengerPublic
Actual Points: | Parent ID:
Points: |
-------------------------------+------------------------------------------
Comment (by ioerror):
If OZ isn't available for GNU/Linux (eg: not SubgraphOS) - we should
probably just stick to packaging and using two basic techniques for
sandboxing (eg: AppArmor and seccomp) at first.
Ideally, if we do it properly - Tor can be sandboxed with seccomp by
default (it is already in Tor) and then InstantBird components can be
sandboxed with seccomp (which we need to add). Then all of this should be
sandboxed in AppArmor or SELinux policies. With proper isolation, I can
see a way to totally ensure Tor has very limited abilities (eg: TCP is
allowed, a single set of directories for read/write, nothing else), while
InstantBird could even be forbidden from using TCP/IP (by using Socks5
over Tor's UnixSocket).
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/10943#comment:9>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs