[tor-bugs] #20879 [Applications/Tor Browser Sandbox]: Set rlimits in the containers.

Tor Bug Tracker & Wiki blackhole at torproject.org
Mon Dec 5 10:43:37 UTC 2016


#20879: Set rlimits in the containers.
----------------------------------------------+-------------------------
 Reporter:  yawning                           |          Owner:  yawning
     Type:  enhancement                       |         Status:  new
 Priority:  Medium                            |      Milestone:
Component:  Applications/Tor Browser Sandbox  |        Version:
 Severity:  Normal                            |     Resolution:
 Keywords:                                    |  Actual Points:
Parent ID:                                    |         Points:
 Reviewer:                                    |        Sponsor:
----------------------------------------------+-------------------------

Comment (by yawning):

 First pass: https://gitweb.torproject.org/tor-browser/sandboxed-tor-
 browser.git/commit/?id=82fcc3247c878cff63bbf34fe0c397638a232bde

 I lower the soft/hard limits to:
 {{{
   RLIMIT_STACK = 512 * 1024
   RLIMIT_RSS = 0
   RLIMIT_NPROC = 512
   RLIMIT_NOFILE = 1024
   RLIMIT_MLOCK = 0  // Now proscribed via seccomp() as well.
   RLIMIT_LOCKS = 32
   RLIMIT_SIGPENDING = 64
   RLIMIT_MSGQUEUE = 0
   RLIMIT_NICE = 0
   RLIMIT_RTPRIO = 0
   RLIMIT_RTTIME = 0
 }}}

 I can probably go lower with NPROC/NOFILE, but erred on the side of
 setting hte limits somewhat conservatively.

 As far as `AS`, `DATA`, and `FSIZE` go, I agree that they should be set
 *somehow* and I like your idea of applying soft limits, with UI
 integration.  In general the sandbox needs more UI feedback (#20844), but
 I really need to think about all of this, so the initial release probably
 won't ship with them set, sorry.

 At least things can only improve from here...

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/20879#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list