Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Security Enforcement of Daemon (uid/gid+chroot) #43

Open
fpietrosanti opened this issue Jul 31, 2012 · 1 comment
Open

Security Enforcement of Daemon (uid/gid+chroot) #43

fpietrosanti opened this issue Jul 31, 2012 · 1 comment
Assignees
Labels

Comments

@fpietrosanti
Copy link
Contributor

fpietrosanti commented Jul 31, 2012

In order to properly enforce security of the tor2web proxy, it must run with a dedicated uid/gid and automatically chroot into it's own directory.

Implementing this kind of feature require taking care of:

  • fixing installation procedures
  • handling location and permission of configuration files, digital certificates and of log files

Twisted support by default chroot by command line, it must be evaluated whenever it's better to chroot by twistd command line or from within the application.

Twisted support the following cmdline switch http://linux.die.net/man/1/twistd :

  • --chroot
    Chroot to a supplied directory before running (default: don't chroot). Chrooting is done before changing the current directory.
  • -u, --uid
    The uid to run as. (default: don't change)
  • -g, --gid
    The gid to run as. (default: don't change)

Some good info on that are available on http://www.tsheffler.com/blog/?p=526

--- Want to back this issue? **[Post a bounty on it!](https://www.bountysource.com/issues/14807251-security-enforcement-of-daemon-uid-gid-chroot?utm_campaign=plugin&utm_content=tracker%2F318575&utm_medium=issues&utm_source=github)** We accept bounties via [Bountysource](https://www.bountysource.com/?utm_campaign=plugin&utm_content=tracker%2F318575&utm_medium=issues&utm_source=github).
@ghost ghost assigned evilaliv3 Aug 12, 2012
@fpietrosanti
Copy link
Contributor Author

Partially implemented (root privileges dropping)

@evilaliv3 evilaliv3 removed this from the Tor2web 3.0 Beta2 milestone Oct 10, 2014
@fpietrosanti fpietrosanti removed this from the Tor2web 3.0 Beta2 milestone Oct 10, 2014
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

2 participants