[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #24037 [Core Tor/Torsocks]: Use syscall blacklist rather than whitelist for torsocks
#24037: Use syscall blacklist rather than whitelist for torsocks
-------------------------------+------------------------------
Reporter: cypherpunks | Owner: dgoulet
Type: enhancement | Status: needs_review
Priority: Medium | Milestone:
Component: Core Tor/Torsocks | Version:
Severity: Normal | Resolution:
Keywords: | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
-------------------------------+------------------------------
Comment (by cypherpunks):
Replying to [comment:5 Hello71]:
> consider that file descriptors can be transferred between processes as
well. we assume that torsocks applications are not actively malicious, but
perhaps there is some scenario involving dbus where a torsocks application
can be tricked into using a un-torified socket opened somewhere else.
Which is why seccomp would prevent closing the UNIX socket file
descriptor, and networking-related syscalls would be made to only use that
file descriptor number.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/24037#comment:6>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs