[tor-bugs] #28358 [Core Tor/Tor]: Nyx forces Tor error: sandbox_getaddrinfo(): Bug: (Sandbox) failed to get address
Tor Bug Tracker & Wiki
blackhole at torproject.org
Fri Dec 14 22:26:45 UTC 2018
#28358: Nyx forces Tor error: sandbox_getaddrinfo(): Bug: (Sandbox) failed to get
address
--------------------------+------------------------------------
Reporter: wagon | Owner: (none)
Type: defect | Status: closed
Priority: Medium | Milestone: Tor: 0.4.0.x-final
Component: Core Tor/Tor | Version: Tor: 0.3.4.9
Severity: Normal | Resolution: fixed
Keywords: sandbox | Actual Points:
Parent ID: | Points:
Reviewer: dgoulet | Sponsor:
--------------------------+------------------------------------
Comment (by wagon):
> Did some modification to make it work
Let me ask more. As I see it
[[https://gitweb.torproject.org/tor.git/tree/doc/tor.1.txt|here]],
> When the `Sandbox` is 1, the following options can not be changed when
tor is running:
> ...
> `ClientOnionAuthDir` (and any files in it won't reload on HUP signal).
> Launching new Onion Services through the control port is not supported
with current syscall sandboxing implementation.
Does it mean that onionshare-like utilities will not work with sandboxed
Tor? So, users have to choose to either (1) run Tor in insecure way with
working secure file sharing or (2) run Tor in a secure way without file
sharing at all. Sounds not good.
What are the exact restrictions on v3 onions? So, on the fly:
1. Auth for already existing onion services (added via filesystem) cannot
be added, deleted or changed through `ControlPort` or through files (both
on client side and on server side).
3. New onion service (server side) cannot be added by either method:
through files or through `Controlport`.
4. No any means to deactivate already running onion service (on server
side).
Is it correct? In other words, no any change to configuration of onion
service can be done on the fly (both on client side and on server side).
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/28358#comment:11>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list