Damian Johnson commited on 2015-02-11 17:14:01
Zeige 1 geänderte Dateien mit 1 Einfügungen und 67 Löschungen.
Nick and David both say this is done.
... | ... |
@@ -405,8 +405,7 @@ meetings around the world.</li> |
405 | 405 |
<i><a href="#improveTorTestCoverage">Improve test coverage in Tor</a></i><br /> |
406 | 406 |
<i><a href="#useMoreCores">Have the Tor daemon use more cores</a></i><br /> |
407 | 407 |
<i><a href="#improveHiddenServices">Help improve Tor hidden services</a></i><br /> |
408 |
- <i><a href="#improvedDnsSupport">Improved DNS support for Tor</a></i><br /> |
|
409 |
- <i><a href="#torSandboxing">Help improve Tor sandboxing</a></i> |
|
408 |
+ <i><a href="#improvedDnsSupport">Improved DNS support for Tor</a></i> |
|
410 | 409 |
</p> |
411 | 410 |
|
412 | 411 |
<a id="project-torbrowser"></a> |
... | ... |
@@ -1433,71 +1432,6 @@ the codebase that you want to work on. |
1433 | 1432 |
</p> |
1434 | 1433 |
</li> |
1435 | 1434 |
|
1436 |
- <a id="torSandboxing"></a> |
|
1437 |
- <li> |
|
1438 |
- <b>Help improve Tor sandboxing</b> |
|
1439 |
- <br> |
|
1440 |
- Effort Level: <i>Medium</i> |
|
1441 |
- <br> |
|
1442 |
- Skill Level: <i>Medium</i> |
|
1443 |
- <br> |
|
1444 |
- Likely Mentors: <i>David (dgoulet)</i> |
|
1445 |
- <p> |
|
1446 |
-The seccomp2 mechanism on Linux lets programs improve their robustness |
|
1447 |
-against unforseen bugs by running with restrictions on which system |
|
1448 |
-calls they can invoke and how they can call them. This can help |
|
1449 |
-security a lot. |
|
1450 |
- </p> |
|
1451 |
- |
|
1452 |
- <p> |
|
1453 |
-Thanks to a GSOC student from last year, we now have seccomp2 support on |
|
1454 |
-Linux, which we use to restrict the capabilities of the entire Tor |
|
1455 |
-process. (For implementation details, see src/commmon/sandbox.c in the |
|
1456 |
-Tor source.) |
|
1457 |
- </p> |
|
1458 |
- |
|
1459 |
- <p> |
|
1460 |
-But since the restrictions are done over the whole process, all pieces |
|
1461 |
-of the Tor code have permission to do things that only small parts of |
|
1462 |
-the Tor program need to do. Also, since we use seccomp2, these |
|
1463 |
-restrictions only work on Linux. |
|
1464 |
- </p> |
|
1465 |
- |
|
1466 |
- <p> |
|
1467 |
-It would be great to instead divide the main Tor program into multiple |
|
1468 |
-processes with a robust IPC mechanism and assign each process its own |
|
1469 |
-minimal set of privileges; and to have this work (as best we can) on |
|
1470 |
-systems that don't have seccomp2 (eg Windows, Mac). |
|
1471 |
- </p> |
|
1472 |
- |
|
1473 |
- <p> |
|
1474 |
-Either of these could be a whole GSOC project. |
|
1475 |
- </p> |
|
1476 |
- |
|
1477 |
- <p> |
|
1478 |
-To get started, make sure you understand the existing sandboxing code. |
|
1479 |
-If you're interested in splitting Tor into multiple processes, think |
|
1480 |
-about the architecture, and think about how we could reach this |
|
1481 |
-architecture without completely rewriting the codebase. (Remember that |
|
1482 |
-even if you're focusing on Linux, Tor still needs to work on other |
|
1483 |
-operating systems.) |
|
1484 |
- </p> |
|
1485 |
- |
|
1486 |
- <p> |
|
1487 |
-If you're interested in supporting more platforms, make sure you |
|
1488 |
-understand and can explain what sandboxing mechansisms you want to use, |
|
1489 |
-and what they're capable of. (You might want to investigate the way |
|
1490 |
-that other open-source programs, like the Chrome web browser, do their |
|
1491 |
-sandboxing on different platforms.) |
|
1492 |
- </p> |
|
1493 |
- |
|
1494 |
- <p> |
|
1495 |
-As part of the application process for this project, please contribute a |
|
1496 |
-nontrivial patch to Tor -- ideally, one that will affect some part of |
|
1497 |
-the codebase that you want to work on. |
|
1498 |
- </p> |
|
1499 |
- </li> |
|
1500 |
- |
|
1501 | 1435 |
<a id="panopticlick"></a> |
1502 | 1436 |
<li> |
1503 | 1437 |
<b>Panopticlick</b> |
1504 | 1438 |