Skip to content
GitLab
  • Menu
Projects Groups Snippets
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in / Register
  • T tails
  • Project information
    • Project information
    • Activity
    • Labels
    • Members
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributors
    • Graph
    • Compare
  • Issues 920
    • Issues 920
    • List
    • Boards
    • Service Desk
    • Milestones
  • Merge requests 21
    • Merge requests 21
  • CI/CD
    • CI/CD
    • Pipelines
    • Jobs
    • Schedules
  • Deployments
    • Deployments
    • Environments
    • Releases
  • Monitor
    • Monitor
    • Incidents
  • Analytics
    • Analytics
    • Value stream
    • CI/CD
    • Repository
  • Activity
  • Graph
  • Create a new issue
  • Jobs
  • Commits
  • Issue Boards
Collapse sidebar
  • tails
  • tails
  • Issues
  • #7724
Closed
Open
Created Aug 02, 2014 by intrigeri@intrigeriMaintainer4 of 7 tasks completed4/7 tasks

Sandbox I2P

Originally created by @intrigeri on #7724 (Redmine)

We want to mitigate the impact of security vulnerabilities that I2P may have. The goals would be:

  • make privilege escalation from the i2psvc user harder
  • make it harder to read identifiers of the local system, user, etc.

Most likely, we’ll want to use AppArmor to do so. Now, it may be hard to confine a Java application in a useful way with AppArmor.

Feature Branch: kytv:feature/7724-sandbox-i2p

Subtasks

  • #10572 (closed)
  • #10573 (closed)
  • #10924 (closed)
  • #10925 (closed)

Related issues

  • Related to #5370 (closed)
  • Related to #9949 (closed)
  • Blocked by #9229 (closed)
  • Blocked by #9830 (closed)
  • Blocked by #12264 (closed)
Edited May 15, 2020 by intrigeri
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Assignee
Assign to
Time tracking