[tor-bugs] #10943 [Tor Messenger]: Sandboxing Instantbird
Tor Bug Tracker & Wiki
blackhole at torproject.org
Tue Jul 21 21:35:35 UTC 2015
#10943: Sandboxing Instantbird
-------------------------------+------------------------------------------
Reporter: sukhbir | Owner: ioerror
Type: task | Status: new
Priority: normal | Milestone:
Component: Tor Messenger | Version:
Resolution: | Keywords: SponsorO, TorMessengerPublic
Actual Points: | Parent ID:
Points: |
-------------------------------+------------------------------------------
Comment (by ioerror):
If OZ isn't available for GNU/Linux (eg: not SubgraphOS) - we should
probably just stick to packaging and using two basic techniques for
sandboxing (eg: AppArmor and seccomp) at first.
Ideally, if we do it properly - Tor can be sandboxed with seccomp by
default (it is already in Tor) and then InstantBird components can be
sandboxed with seccomp (which we need to add). Then all of this should be
sandboxed in AppArmor or SELinux policies. With proper isolation, I can
see a way to totally ensure Tor has very limited abilities (eg: TCP is
allowed, a single set of directories for read/write, nothing else), while
InstantBird could even be forbidden from using TCP/IP (by using Socks5
over Tor's UnixSocket).
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/10943#comment:9>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list