Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Apparmor: adjust profile for Tor Browser 7.0.1, support multiprocess Firefox, and various small maintenance changes #277

Merged
merged 5 commits into from
Jun 20, 2017

Conversation

intrigeri
Copy link
Collaborator

Here, I'm doing a first update & cleanup so I have a good starting point to work on sandboxing Tor Browser's content renderer processes more strictly: with this branch, we confine these processes in exactly the same way as the parent Firefox process. I'm pretty sure they could be confined much more strictly, without impacting UX whatsoever. And while we're at it, maybe some permissions we currently grant to the parent Firefox process are not needed anymore, as it does less work.

As of Tor Browser 7.0.1:

 * /dev/dri/: we block access to the DRI nodes, so listing
   them would be useless
 * net/route: seems risky as it can leak information about IPs used on the LAN;
   Tor Browser seems to works perfectly without such access, so let's not
   grant it to be on the safe side
 * CPU maximum frequency:only used to optimize VP8/VP9 encoding
 * CPU cache size: seems unused
This is consistent with how we handle similar files so far.
abstractions/base allows access to /proc/meminfo already, so this doesn't leak
much more information. I can't be sure by looking at the code, but I would
not be surprised if Firefox needed more info about available memory
to manage it pool of content rendering processes, when e10s is enabled.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
2 participants