[tor-bugs] #20782 [Applications/Tor Browser Sandbox]: Use a seccomp whitelist when the tor daemon is configured to use Bridges.
Tor Bug Tracker & Wiki
blackhole at torproject.org
Mon Nov 28 19:35:48 UTC 2016
#20782: Use a seccomp whitelist when the tor daemon is configured to use Bridges.
----------------------------------------------+-------------------------
Reporter: yawning | Owner: yawning
Type: enhancement | Status: closed
Priority: High | Milestone:
Component: Applications/Tor Browser Sandbox | Version:
Severity: Normal | Resolution: fixed
Keywords: | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
----------------------------------------------+-------------------------
Changes (by yawning):
* status: new => closed
* resolution: => fixed
Comment:
https://gitweb.torproject.org/tor-browser/sandboxed-tor-
browser.git/commit/?id=7cf5fba78a7641043454f7f7d24edce4ed938197
For now use a combined tor + obfs4prxy whitelist. Seems to work in my
test envs. I'm going to tag this as fixed for now, and deal with
decoupling the two later.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/20782#comment:5>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list