[tor-bugs] #5756 [Tor Relay]: Seccomp system call whitelisting on Linux

Tor Bug Tracker & Wiki torproject-admin at torproject.org
Sat Sep 22 21:49:15 UTC 2012


#5756: Seccomp system call whitelisting on Linux
--------------------------------------+-------------------------------------
 Reporter:  bugmenot                  |          Owner:                    
     Type:  enhancement               |         Status:  new               
 Priority:  normal                    |      Milestone:  Tor: 0.2.4.x-final
Component:  Tor Relay                 |        Version:                    
 Keywords:  seccomp security sandbox  |         Parent:  #5791             
   Points:                            |   Actualpoints:                    
--------------------------------------+-------------------------------------
Changes (by nickm):

  * milestone:  => Tor: 0.2.4.x-final


Comment:

 I think we could do a decent job here without refactoring the rest of Tor
 too much.

 The tricky part would be that, when seccomp was in use, we'd want to
 restrict the places we can open() and restrict the stuff we can exec().
 But we could say for now that enabling seccomp means that Tor restricts
 these things immediately after it reads its configuration file, and you
 can't (for example) add new pluggable transports once seccomp is enabled.

 (Refactoring Tor could let us compartmentalize stuff even better, and
 could be helpful/needful  for better security on other platforms, but it's
 possibly a good idea to do what we can now.)

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5756#comment:9>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list