[tor-bugs] #15220 [Tor]: Allow SocksSockets writable by arbitrary user

Tor Bug Tracker & Wiki blackhole at torproject.org
Wed Mar 11 12:37:21 UTC 2015


#15220: Allow SocksSockets writable by arbitrary user
-----------------------------+--------------------------------
     Reporter:  sysrqb       |      Owner:
         Type:  enhancement  |     Status:  new
     Priority:  normal       |  Milestone:  Tor: 0.2.7.x-final
    Component:  Tor          |    Version:
   Resolution:               |   Keywords:
Actual Points:               |  Parent ID:
       Points:               |
-----------------------------+--------------------------------

Comment (by dgoulet):

 Replying to [comment:6 nickm]:
 > I think this is 0.2.7 material by default; It's neither a security hole
 nor a regression.

 Adding torrc options to set the user/group for the unix socket is out of
 the question for 0.2.6 for sure. However, right now without a change from
 660 to 666 (world open), this feature is unusable unless the user puts
 itself in the tor system group (ex: debian-tor) or chmod the socket. This
 means that anyone using torsocks out of the box won't be able to use this
 feature nor people using nginx Unix socket support for instance.

 Isn't the point of SocksPort to be world usable (like an inet socket)? If
 you really want it not world open, set the socket path to be in a
 directory you only control. Would that be a middle ground for inclusion in
 0.2.6?

 If we don't get this in 0.2.6, I would advocate for an extra documentation
 somewhere explaining how to access the socket else that feature is dead
 until 0.2.7 imo.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/15220#comment:7>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list