[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-bugs] #23002 [Applications/Tor Browser Sandbox]: Determine if Tor browser bundle sandbox has been compromised
#23002: Determine if Tor browser bundle sandbox has been compromised
-------------------------------------------------+-------------------------
Reporter: Dbryrtfbcbhgf | Owner: yawning
Type: enhancement | Status: new
Priority: Medium | Milestone: Tor:
Component: Applications/Tor Browser | 0.3.2.x-final
Sandbox | Version:
Severity: Normal | Keywords:
Actual Points: | Parent ID:
Points: | Reviewer:
Sponsor: |
-------------------------------------------------+-------------------------
Every time tor browser bundle sandbox launcher opens Tor browser bundle,
it should take a Sha2 hash of Firefox ESR and other internal files and
compere it to a predetermined hash, taken during the initial launch to
tell whether it's been compromise, the hash should be saved somewhere
where a compromise Firefox cannot edit it. If the hash does not match the
initial hash then it should give a warning to users that it needs to
delete tor browser bundle and re-download/reinstall tor browser bundle.
The hash should only be taken of Firefox ESR and other components that the
user would not be able to change under normal operations.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/23002>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs