Re: [tor-bugs] #20337 [Core Tor]: Support abstract namespace AF_UNIX sockets.

2016-11-14 Thread Tor Bug Tracker & Wiki
#20337: Support abstract namespace AF_UNIX sockets.
-+--
 Reporter:  yawning  |  Owner:
 Type:  enhancement  | Status:  new
 Priority:  Low  |  Milestone:  Tor: unspecified
Component:  Core Tor |Version:  Tor: unspecified
 Severity:  Normal   | Resolution:
 Keywords:   |  Actual Points:
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+--

Comment (by arma):

 I'm a fan! Looks like it should be easy to support in Tor, and then the
 external applications can decide for themselves if it's the right answer
 for them.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #20337 [Core Tor]: Support abstract namespace AF_UNIX sockets.

2016-10-27 Thread Tor Bug Tracker & Wiki
#20337: Support abstract namespace AF_UNIX sockets.
-+--
 Reporter:  yawning  |  Owner:
 Type:  enhancement  | Status:  new
 Priority:  Low  |  Milestone:  Tor: unspecified
Component:  Core Tor |Version:  Tor: unspecified
 Severity:  Normal   | Resolution:
 Keywords:   |  Actual Points:
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+--
Changes (by mcs):

 * cc: brade, mcs (added)


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

[tor-bugs] #20337 [Core Tor]: Support abstract namespace AF_UNIX sockets.

2016-10-10 Thread Tor Bug Tracker & Wiki
#20337: Support abstract namespace AF_UNIX sockets.
-+--
 Reporter:  yawning  |  Owner:
 Type:  enhancement  | Status:  new
 Priority:  Low  |  Milestone:  Tor: unspecified
Component:  Core Tor |Version:  Tor: unspecified
 Severity:  Normal   |   Keywords:
Actual Points:   |  Parent ID:
   Points:   |   Reviewer:
  Sponsor:   |
-+--
 Linux has a notion of `abstract` AF_UNIX sockets.  This should be
 supported both for the control and socks port, as they are convenient and
 useful, as long as they are used correctly.

 Benefits:
  * Easier to bundle.  `sun_path` length limitations are dumb, being able
 to use an abstract identifier is simpler.
  * No need to mess around with creating a directory, arguing over what
 permissions the directory and the socket file has.
  * The socket goes away when the last reference to the socekt is closed,
 removing the need to unlink it.

 Downsides:
  * There is no access control, at all.  Primarily relevant for the
 ControlPort, but that has separate mechanisms for restricting access.
  * Not wildly useful for sandboxes, since most sandboxing approaches will
 unshare/create a new IPC namespace.
  * Non-portable.

 (0.2.0.3-alpha was the first time we supported AF_UNIX at all)

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs