Re: [tor-dev] Further sandboxing Tor Browser (aka Tor + Firejail redux).

2016-07-22 Thread Yawning Angel
On Fri, 22 Jul 2016 15:20:00 + Patrick Schleizer wrote: > I think this could be wrong: > > TOR_CONTROL_COOKIE_AUTH_FILE=/var/run/tor/control_auth_cookie That block was supposed to be in a bunch of if statements. Fixed. The default path that gets set is unchanged. > Debian /usr/share/tor/t

Re: [tor-dev] Further sandboxing Tor Browser (aka Tor + Firejail redux).

2016-07-22 Thread Patrick Schleizer
I think this could be wrong: TOR_CONTROL_COOKIE_AUTH_FILE=/var/run/tor/control_auth_cookie Debian /usr/share/tor/tor-service-defaults-torrc uses: CookieAuthFile /var/run/tor/control.authcookie Common paths are: - /var/run/tor/control.authcookie - /var/lib/tor/control_auth_cookie I suggested to

[tor-dev] Further sandboxing Tor Browser (aka Tor + Firejail redux).

2016-07-21 Thread Yawning Angel
I felt randomly inspired, so I spent some time poking at my firejail Tor Browser sandboxing effort, and made progress towards something more robust. In particular, I switched to using AF_LOCAL (aka AF_UNIX) sockets, via a brute force-ish approach, which seems to be working well, despite some cavea