[tor-bugs] #10943 [Tor Messenger]: Sandboxing Instantbird

Tor Bug Tracker & Wiki blackhole at torproject.org
Tue Jul 21 21:35:35 UTC 2015


#10943: Sandboxing Instantbird
-------------------------------+------------------------------------------
     Reporter:  sukhbir        |      Owner:  ioerror
         Type:  task           |     Status:  new
     Priority:  normal         |  Milestone:
    Component:  Tor Messenger  |    Version:
   Resolution:                 |   Keywords:  SponsorO, TorMessengerPublic
Actual Points:                 |  Parent ID:
       Points:                 |
-------------------------------+------------------------------------------

Comment (by ioerror):

 If OZ isn't available for GNU/Linux (eg: not SubgraphOS) - we should
 probably just stick to packaging and using two basic techniques for
 sandboxing (eg: AppArmor and seccomp) at first.

 Ideally, if we do it properly - Tor can be sandboxed with seccomp by
 default (it is already in Tor) and then InstantBird components can be
 sandboxed with seccomp (which we need to add). Then all of this should be
 sandboxed in AppArmor or SELinux policies. With proper isolation, I can
 see a way to totally ensure Tor has very limited abilities (eg: TCP is
 allowed, a single set of directories for read/write, nothing else), while
 InstantBird could even be forbidden from using TCP/IP (by using Socks5
 over Tor's UnixSocket).

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/10943#comment:9>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list