[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-bugs] #20337 [Core Tor]: Support abstract namespace AF_UNIX sockets.
#20337: Support abstract namespace AF_UNIX sockets.
-----------------------------+------------------------------
Reporter: yawning | Owner:
Type: enhancement | Status: new
Priority: Low | Milestone: Tor: unspecified
Component: Core Tor | Version: Tor: unspecified
Severity: Normal | Keywords:
Actual Points: | Parent ID:
Points: | Reviewer:
Sponsor: |
-----------------------------+------------------------------
Linux has a notion of `abstract` AF_UNIX sockets. This should be
supported both for the control and socks port, as they are convenient and
useful, as long as they are used correctly.
Benefits:
* Easier to bundle. `sun_path` length limitations are dumb, being able
to use an abstract identifier is simpler.
* No need to mess around with creating a directory, arguing over what
permissions the directory and the socket file has.
* The socket goes away when the last reference to the socekt is closed,
removing the need to unlink it.
Downsides:
* There is no access control, at all. Primarily relevant for the
ControlPort, but that has separate mechanisms for restricting access.
* Not wildly useful for sandboxes, since most sandboxing approaches will
unshare/create a new IPC namespace.
* Non-portable.
(0.2.0.3-alpha was the first time we supported AF_UNIX at all)
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/20337>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs