reopen 800385
thanks

Le 04/01/17 à 08:15, Peter Palfrader a écrit :
Thanks for your help!

On Wed, 04 Jan 2017, Laurent Bigonville wrote:

I just tried with the following hardening features, and the daemon is
starting (I kept the old value in comment):

# Hardening
AppArmorProfile=system_tor
NoNewPrivileges=yes
PrivateTmp=yes
PrivateDevices=yes
ProtectHome=yes
ProtectControlGroups=yes #added
ProtectKernelTunables=yes #added
Maybe.

#ProtectSystem=full
ProtectSystem=strict
Maybe.  That's new in sid/testing.

#ReadOnlyDirectories=/

I understand better why you choose the ReadOnlyDirectories=/ instead of ProtectSystem=strict now

#ReadWriteDirectories=-/proc
Maybe.

ReadWriteDirectories=-/var/lib/tor
ReadWriteDirectories=-/var/log/tor
#ReadWriteDirectories=-/var/run
ReadWriteDirectories=-/var/run/tor
Can we still create the directory if it isn't there yet?

Yes it's working, if I'm commenting it out completely the daemon fails. I think that it only apply to the main process and not the Pre one (maybe?)


#CapabilityBoundingSet=CAP_SETUID CAP_SETGID CAP_NET_BIND_SERVICE 
CAP_DAC_OVERRIDE
CapabilityBoundingSet=CAP_SETUID CAP_SETGID CAP_NET_BIND_SERVICE
No, that breaks hidden services.  See https://bugs.debian.org/847598

I see. Do you know what were the owner/group of /var/lib/tor/hidden_service/ in that bug?

torify wget http://www.perdu.com returns the expected content
I think other useful tests would be
  - can Tor start when a hidden service is configured?
  - can Hidden services read/write to backend sockets in
    /var/lib/tor-onion-sockets/?
  - does transparent proxying still work (TransPort)?
  - can we log to syslog?

I'll try to see when I can test that. Don't expect a reply tomorrow though.

For the syslog part, I see stuffs being logged in journald, so it's OK I guess.

Laurent Bigonville

Reply via email to