Drop the 'Help improve Tor sandboxing' project idea
Damian Johnson

Damian Johnson commited on 2015-02-11 17:14:01
Zeige 1 geänderte Dateien mit 1 Einfügungen und 67 Löschungen.


Nick and David both say this is done.
... ...
@@ -405,8 +405,7 @@ meetings around the world.</li>
405 405
     <i><a href="#improveTorTestCoverage">Improve test coverage in Tor</a></i><br />
406 406
     <i><a href="#useMoreCores">Have the Tor daemon use more cores</a></i><br />
407 407
     <i><a href="#improveHiddenServices">Help improve Tor hidden services</a></i><br />
408
-    <i><a href="#improvedDnsSupport">Improved DNS support for Tor</a></i><br />
409
-    <i><a href="#torSandboxing">Help improve Tor sandboxing</a></i>
408
+    <i><a href="#improvedDnsSupport">Improved DNS support for Tor</a></i>
410 409
     </p>
411 410
 
412 411
     <a id="project-torbrowser"></a>
... ...
@@ -1433,71 +1432,6 @@ the codebase that you want to work on.
1433 1432
     </p>
1434 1433
     </li>
1435 1434
 
1436
-    <a id="torSandboxing"></a>
1437
-    <li>
1438
-    <b>Help improve Tor sandboxing</b>
1439
-    <br>
1440
-    Effort Level: <i>Medium</i>
1441
-    <br>
1442
-    Skill Level: <i>Medium</i>
1443
-    <br>
1444
-    Likely Mentors: <i>David (dgoulet)</i>
1445
-    <p>
1446
-The seccomp2 mechanism on Linux lets programs improve their robustness
1447
-against unforseen bugs by running with restrictions on which system
1448
-calls they can invoke and how they can call them.  This can help
1449
-security a lot.
1450
-    </p>
1451
-
1452
-    <p>
1453
-Thanks to a GSOC student from last year, we now have seccomp2 support on
1454
-Linux, which we use to restrict the capabilities of the entire Tor
1455
-process.  (For implementation details, see src/commmon/sandbox.c in the
1456
-Tor source.)
1457
-    </p>
1458
-
1459
-    <p>
1460
-But since the restrictions are done over the whole process, all pieces
1461
-of the Tor code have permission to do things that only small parts of
1462
-the Tor program need to do.  Also, since we use seccomp2, these
1463
-restrictions only work on Linux.
1464
-    </p>
1465
-
1466
-    <p>
1467
-It would be great to instead divide the main Tor program into multiple
1468
-processes with a robust IPC mechanism and assign each process its own
1469
-minimal set of privileges; and to have this work (as best we can) on
1470
-systems that don't have seccomp2 (eg Windows, Mac).
1471
-    </p>
1472
-
1473
-    <p>
1474
-Either of these could be a whole GSOC project.
1475
-    </p>
1476
-
1477
-    <p>
1478
-To get started, make sure you understand the existing sandboxing code.
1479
-If you're interested in splitting Tor into multiple processes, think
1480
-about the architecture, and think about how we could reach this
1481
-architecture without completely rewriting the codebase.  (Remember that
1482
-even if you're focusing on Linux, Tor still needs to work on other
1483
-operating systems.)
1484
-    </p>
1485
-
1486
-    <p>
1487
-If you're interested in supporting more platforms, make sure you
1488
-understand and can explain what sandboxing mechansisms you want to use,
1489
-and what they're capable of.  (You might want to investigate the way
1490
-that other open-source programs, like the Chrome web browser, do their
1491
-sandboxing on different platforms.)
1492
-    </p>
1493
-
1494
-    <p>
1495
-As part of the application process for this project, please contribute a
1496
-nontrivial patch to Tor -- ideally, one that will affect some part of
1497
-the codebase that you want to work on.
1498
-    </p>
1499
-    </li>
1500
-
1501 1435
     <a id="panopticlick"></a>
1502 1436
     <li>
1503 1437
     <b>Panopticlick</b>
1504 1438