Want to help test 'Sandbox 1'? (Linux only)

Hi, I'm aiming to enable tor's 'Sandbox' feature by default on Debian based relays starting with the next release of ansible-relayor [1]. Before doing so I'd like to collect some feedback from tor relay operators willing to test this feature. If you - run tor 0.3.0.x >= 0.3.0.8 - are on Linux - willing to report proplems it would be greate if you could add the following line to your torrc configuration file: Sandbox 1 Ideally you have also a system monitoring in place that tells you whether this config change has any impact (i.e. on CPU or bandwidth). [1] https://github.com/nusenu/ansible-relayor -- https://mastodon.social/@nusenu https://twitter.com/nusenu_

I will shortly. All of my relays or just one?
On Jun 25, 2017, at 13:21, nusenu <nusenu-lists@riseup.net> wrote:
Hi,
I'm aiming to enable tor's 'Sandbox' feature by default on Debian based relays starting with the next release of ansible-relayor [1].
Before doing so I'd like to collect some feedback from tor relay operators willing to test this feature.
If you - run tor 0.3.0.x >= 0.3.0.8 - are on Linux - willing to report proplems
it would be greate if you could add the following line to your torrc configuration file:
Sandbox 1
Ideally you have also a system monitoring in place that tells you whether this config change has any impact (i.e. on CPU or bandwidth).
[1] https://github.com/nusenu/ansible-relayor
-- https://mastodon.social/@nusenu https://twitter.com/nusenu_
_______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

John Ricketts:
I will shortly. All of my relays or just one?
Maybe start with one and if it runs without any issues or negative impact for a week proceed with the rest, but whatever you feel comfortable with. thanks! -- https://mastodon.social/@nusenu https://twitter.com/nusenu_

On Sun, 25 Jun 2017 18:25:00 +0000 nusenu <nusenu-lists@riseup.net> wrote:
I'm aiming to enable tor's 'Sandbox' feature by default on Debian based relays starting with the next release of ansible-relayor [1].
Before doing so I'd like to collect some feedback from tor relay operators willing to test this feature.
If you - run tor 0.3.0.x >= 0.3.0.8 - are on Linux - willing to report proplems
it would be greate if you could add the following line to your torrc configuration file:
Sandbox 1
Ideally you have also a system monitoring in place that tells you whether this config change has any impact (i.e. on CPU or bandwidth).
FWIW I haven't noticed any impact, bad or good, after enabling this on a couple of relays since the date you asked. -- With respect, Roman

On Sun, 25 Jun 2017 18:25:00 +0000 nusenu <nusenu-lists@riseup.net> wrote:
I'm aiming to enable tor's 'Sandbox' feature by default on Debian based relays starting with the next release of ansible-relayor [1].
Before doing so I'd like to collect some feedback from tor relay operators willing to test this feature.
If you - run tor 0.3.0.x >= 0.3.0.8 - are on Linux - willing to report proplems
it would be greate if you could add the following line to your torrc configuration file:
Sandbox 1
Ideally you have also a system monitoring in place that tells you whether this config change has any impact (i.e. on CPU or bandwidth).
FWIW I haven't noticed any impact, bad or good, after enabling this on a couple of relays since the date you asked.
thank you for testing it -- https://mastodon.social/@nusenu https://twitter.com/nusenu_

I haven't noticed any performance impact, but I picked up a recent version of ansible-relayor that enables the sandbox by default and it broke two of my relays running Debian 8.9 under OpenVZ with kernel version 2.6.32. Given the old kernel version I'm not exactly surprised, but enabling the sandbox by default does cause those two relays to fail to start. If anyone is interested, the relevant log lines (with debug enabled) look like this: sandbox_getaddrinfo(): (Sandbox) getaddrinfo succeeded. sandbox_getaddrinfo(): (Sandbox) getaddrinfo failed. sandbox_getaddrinfo(): (Sandbox) getaddrinfo succeeded. install_syscall_filter(): Bug: (Sandbox) failed to load: -22 (Invalid argument)! (on Tor 0.3.0.9 ) tor_main(): Bug: Failed to create syscall sandbox filter (on Tor 0.3.0.9 ) main process exited, code=exited, status=1/FAILURE On Tue, Jul 4, 2017 at 11:35 PM, Roman Mamedov <rm@romanrm.net> wrote:
On Sun, 25 Jun 2017 18:25:00 +0000 nusenu <nusenu-lists@riseup.net> wrote:
I'm aiming to enable tor's 'Sandbox' feature by default on Debian based relays starting with the next release of ansible-relayor [1].
Before doing so I'd like to collect some feedback from tor relay operators willing to test this feature.
If you - run tor 0.3.0.x >= 0.3.0.8 - are on Linux - willing to report proplems
it would be greate if you could add the following line to your torrc configuration file:
Sandbox 1
Ideally you have also a system monitoring in place that tells you whether this config change has any impact (i.e. on CPU or bandwidth).
FWIW I haven't noticed any impact, bad or good, after enabling this on a couple of relays since the date you asked.
-- With respect, Roman _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

On 2 Aug 2017, at 13:32, Kevin Beranek <kevin@kberanek.com> wrote:
I haven't noticed any performance impact, but I picked up a recent version of ansible-relayor that enables the sandbox by default and it broke two of my relays running Debian 8.9 under OpenVZ with kernel version 2.6.32. Given the old kernel version I'm not exactly surprised, but enabling the sandbox by default does cause those two relays to fail to start.
If anyone is interested, the relevant log lines (with debug enabled) look like this:
sandbox_getaddrinfo(): (Sandbox) getaddrinfo succeeded. sandbox_getaddrinfo(): (Sandbox) getaddrinfo failed. sandbox_getaddrinfo(): (Sandbox) getaddrinfo succeeded. install_syscall_filter(): Bug: (Sandbox) failed to load: -22 (Invalid argument)! (on Tor 0.3.0.9 ) tor_main(): Bug: Failed to create syscall sandbox filter (on Tor 0.3.0.9 ) main process exited, code=exited, status=1/FAILURE
I logged this on the tor bug tracker: https://trac.torproject.org/projects/tor/ticket/23090 T -- Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968F 094B ricochet:ekmygaiu4rzgsk6n xmpp: teor at torproject dot org ------------------------------------------------------------------------
participants (5)
-
John Ricketts
-
Kevin Beranek
-
nusenu
-
Roman Mamedov
-
teor