- Oct 06, 2016
-
-
anonym authored
-
anonym authored
Sometimes the executable path just isn't enough. For instance, for the tor-launcher filter the executable is the unconfined firefox executable, also used by our chroot browsers. So let's be a bit more restrictive. While we're at it, make it possible for a single client to match multiple filters -- otherwise the rules for which single filter will be selected in case multiple matches will just complicate things. So, if we want, we can now refactor common parts of filters. :)
-
anonym authored
-
anonym authored
128 bytes is not enough for e.g. "SETCONF Bridge=..." when using obfs4.
-
anonym authored
-
anonym authored
And refactor some code while we're at it.
-
anonym authored
-
anonym authored
-
anonym authored
-
anonym authored
-
anonym authored
But they will not be able to do anything except PROTOCOLINFO, AUTHENTICATE and QUIT, which is not very interesting.
-
anonym authored
This simplifies client configurations and assumptions made in many applications that use Tor's ControlPort. It's the exception that we connect to the unfiltered version, so this seems like the more sane approach.
-
anonym authored
This is just much less complex code-wise, and the procfs API is likely more stable than the output of aa-status any way.
-
- Oct 05, 2016
-
-
anonym authored
They're still in complain mode, cause enforcing them breaks the applications (when they read from tor-controlport-filter's socket, they get empty data and fail). And there are still some audit log entries generated for onionshare-gui, for reasons I do not yet understand. There are a few other questions in comments. However, this is actually solving the blocking issue we have with the stub AppArmor profiles flooding the journal. Fixing these AppArmor profiles so we then can enable them is more like a bonus.
-
anonym authored
-
anonym authored
-
anonym authored
-
- Oct 04, 2016
-
-
anonym authored
Using /proc/pid/cmdline is not secure since it can be trivially set with, for instance: exec -a "pwned" sh -c 'cat /proc/$$/cmdline' The /proc/pid/exe symlink is not good enough for scripts (since it will point to the interpreter, not the script) so let's instead use AppArmor's in-kernel solution for determining executable paths. We fallback to /proc/pid/exe for unconfined processes, which leaves us with only unconfined scripts not being supported by tor-controlport-filter. However, profiles in complain mode is still good enough, so a trivial stub profile in complain mode is enough, which is exactly what we do for onionshare and onioncircuits.
-
bertagaz authored
-
bertagaz authored
-
bertagaz authored
-
bertagaz authored
-
bertagaz authored
-
bertagaz authored
-
bertagaz authored
Conflicts: debian/changelog
-
bertagaz authored
-
- Oct 03, 2016
- Oct 01, 2016