public inbox for development@lists.ipfire.org
 help / color / mirror / Atom feed
* [PATCH 1/4] Tor: Enable syscall sandbox
@ 2021-09-25  7:07 Peter Müller
  2021-09-25  7:08 ` [PATCH 2/4] Tor: Use crypto hardware acceleration if available Peter Müller
  0 siblings, 1 reply; 7+ messages in thread
From: Peter Müller @ 2021-09-25  7:07 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 862 bytes --]

This makes post-exploitation activities harder, in case the local Tor
instance has been compromised. It is worth noticing that Tor won't
respond to a "GETINFO address" command on the control port if sandboxed,
but our CGI does not make use of it, and neither is any legitimate
service on IPFire doing so.

Tested on a small middle relay running on an IPFire machine.

Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org>
---
 html/cgi-bin/tor.cgi | 1 +
 1 file changed, 1 insertion(+)

diff --git a/html/cgi-bin/tor.cgi b/html/cgi-bin/tor.cgi
index 3349336ae..ce579aec1 100644
--- a/html/cgi-bin/tor.cgi
+++ b/html/cgi-bin/tor.cgi
@@ -730,6 +730,7 @@ sub BuildConfiguration() {
 	open(FILE, ">$torrc");
 
 	# Global settings.
+	print FILE "Sandbox 1\n";
 	print FILE "ControlPort $TOR_CONTROL_PORT\n";
 
 	if ($settings{'TOR_ENABLED'} eq 'on') {
-- 
2.26.2

^ permalink raw reply	[flat|nested] 7+ messages in thread

* [PATCH 2/4] Tor: Use crypto hardware acceleration if available
  2021-09-25  7:07 [PATCH 1/4] Tor: Enable syscall sandbox Peter Müller
@ 2021-09-25  7:08 ` Peter Müller
  2021-09-25  7:08   ` [PATCH 3/4] Tor: Do not try to support IPv6 for Directory and OR ports Peter Müller
  2021-09-27 18:46   ` [PATCH 2/4] Tor: Use crypto hardware acceleration if available Michael Tremer
  0 siblings, 2 replies; 7+ messages in thread
From: Peter Müller @ 2021-09-25  7:08 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 503 bytes --]

Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org>
---
 html/cgi-bin/tor.cgi | 1 +
 1 file changed, 1 insertion(+)

diff --git a/html/cgi-bin/tor.cgi b/html/cgi-bin/tor.cgi
index ce579aec1..2b0d93336 100644
--- a/html/cgi-bin/tor.cgi
+++ b/html/cgi-bin/tor.cgi
@@ -731,6 +731,7 @@ sub BuildConfiguration() {
 
 	# Global settings.
 	print FILE "Sandbox 1\n";
+	print FILE "HardwareAccel 1\n";
 	print FILE "ControlPort $TOR_CONTROL_PORT\n";
 
 	if ($settings{'TOR_ENABLED'} eq 'on') {
-- 
2.26.2

^ permalink raw reply	[flat|nested] 7+ messages in thread

* [PATCH 3/4] Tor: Do not try to support IPv6 for Directory and OR ports
  2021-09-25  7:08 ` [PATCH 2/4] Tor: Use crypto hardware acceleration if available Peter Müller
@ 2021-09-25  7:08   ` Peter Müller
  2021-09-25  7:09     ` [PATCH 4/4] Tor: Bump package version Peter Müller
  2021-09-27 18:46   ` [PATCH 2/4] Tor: Use crypto hardware acceleration if available Michael Tremer
  1 sibling, 1 reply; 7+ messages in thread
From: Peter Müller @ 2021-09-25  7:08 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 920 bytes --]

We currently don't have IPv6 in vanilla IPFire 2.x installations, hence
there is no sense in letting Tor finding out IPv6 connectivity.

Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org>
---
 html/cgi-bin/tor.cgi | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/html/cgi-bin/tor.cgi b/html/cgi-bin/tor.cgi
index 2b0d93336..8ecef5d9c 100644
--- a/html/cgi-bin/tor.cgi
+++ b/html/cgi-bin/tor.cgi
@@ -802,10 +802,10 @@ sub BuildConfiguration() {
 		# Reject access to private networks.
 		print FILE "ExitPolicyRejectPrivate 1\n";
 
-		print FILE "ORPort $settings{'TOR_RELAY_PORT'}\n";
+		print FILE "ORPort $settings{'TOR_RELAY_PORT'} IPv4Only\n";
 
 		if ($settings{'TOR_RELAY_DIRPORT'} ne '0') {
-			print FILE "DirPort $settings{'TOR_RELAY_DIRPORT'}\n";
+			print FILE "DirPort $settings{'TOR_RELAY_DIRPORT'} IPv4Only\n";
 		}
 
 		if ($settings{'TOR_RELAY_ADDRESS'} ne '') {
-- 
2.26.2

^ permalink raw reply	[flat|nested] 7+ messages in thread

* [PATCH 4/4] Tor: Bump package version
  2021-09-25  7:08   ` [PATCH 3/4] Tor: Do not try to support IPv6 for Directory and OR ports Peter Müller
@ 2021-09-25  7:09     ` Peter Müller
  0 siblings, 0 replies; 7+ messages in thread
From: Peter Müller @ 2021-09-25  7:09 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 1321 bytes --]

Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org>
---
 html/cgi-bin/tor.cgi | 2 +-
 lfs/tor              | 2 +-
 2 files changed, 2 insertions(+), 2 deletions(-)

diff --git a/html/cgi-bin/tor.cgi b/html/cgi-bin/tor.cgi
index 8ecef5d9c..539a74343 100644
--- a/html/cgi-bin/tor.cgi
+++ b/html/cgi-bin/tor.cgi
@@ -2,7 +2,7 @@
 ###############################################################################
 #                                                                             #
 # IPFire.org - A linux based firewall                                         #
-# Copyright (C) 2007-2020  IPFire Team  <info(a)ipfire.org>                     #
+# Copyright (C) 2007-2021  IPFire Team  <info(a)ipfire.org>                     #
 #                                                                             #
 # This program is free software: you can redistribute it and/or modify        #
 # it under the terms of the GNU General Public License as published by        #
diff --git a/lfs/tor b/lfs/tor
index 56280b936..7aaad07d3 100644
--- a/lfs/tor
+++ b/lfs/tor
@@ -32,7 +32,7 @@ DL_FROM    = $(URL_IPFIRE)
 DIR_APP    = $(DIR_SRC)/$(THISAPP)
 TARGET     = $(DIR_INFO)/$(THISAPP)
 PROG       = tor
-PAK_VER    = 63
+PAK_VER    = 64
 
 DEPS       = libseccomp
 
-- 
2.26.2

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [PATCH 2/4] Tor: Use crypto hardware acceleration if available
  2021-09-25  7:08 ` [PATCH 2/4] Tor: Use crypto hardware acceleration if available Peter Müller
  2021-09-25  7:08   ` [PATCH 3/4] Tor: Do not try to support IPv6 for Directory and OR ports Peter Müller
@ 2021-09-27 18:46   ` Michael Tremer
  2021-10-04 10:49     ` Peter Müller
  1 sibling, 1 reply; 7+ messages in thread
From: Michael Tremer @ 2021-09-27 18:46 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 834 bytes --]

Hello,

Can you elaborate a little bit more on this?

Tor is using OpenSSL which by default should use RDRAND, AES-NI (if applicable) and so on.

What does this option change?

-Michael

> On 25 Sep 2021, at 08:08, Peter Müller <peter.mueller(a)ipfire.org> wrote:
> 
> Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org>
> ---
> html/cgi-bin/tor.cgi | 1 +
> 1 file changed, 1 insertion(+)
> 
> diff --git a/html/cgi-bin/tor.cgi b/html/cgi-bin/tor.cgi
> index ce579aec1..2b0d93336 100644
> --- a/html/cgi-bin/tor.cgi
> +++ b/html/cgi-bin/tor.cgi
> @@ -731,6 +731,7 @@ sub BuildConfiguration() {
> 
> 	# Global settings.
> 	print FILE "Sandbox 1\n";
> +	print FILE "HardwareAccel 1\n";
> 	print FILE "ControlPort $TOR_CONTROL_PORT\n";
> 
> 	if ($settings{'TOR_ENABLED'} eq 'on') {
> -- 
> 2.26.2


^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [PATCH 2/4] Tor: Use crypto hardware acceleration if available
  2021-09-27 18:46   ` [PATCH 2/4] Tor: Use crypto hardware acceleration if available Michael Tremer
@ 2021-10-04 10:49     ` Peter Müller
  2021-10-04 13:59       ` Michael Tremer
  0 siblings, 1 reply; 7+ messages in thread
From: Peter Müller @ 2021-10-04 10:49 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 1752 bytes --]

Hello Michael,

thanks for your reply.

To quote from Tor's manpage (see https://2019.www.torproject.org/docs/tor-manual.html.en#HardwareAccel
for an online version of it):

>        HardwareAccel 0|1
>            If non-zero, try to use built-in (static) crypto hardware
>            acceleration when available. Can not be changed while tor is
>            running. (Default: 0)

Even if it is available, Tor does not use hardware crypto acceleration by default. While I consider
this a reasonable default for Tor users not trusting their hardware, we agreed on doing so a while
ago (https://git.ipfire.org/?p=ipfire-2.x.git;a=commit;h=13eab1060d0474ddf413386de0361e32113f8cb7).

Therefore, this needs to be enabled explicitly, which is what this patch is good for. :-)

I hope to have your question answered.

Thanks, and best regards,
Peter Müller


> Hello,
> 
> Can you elaborate a little bit more on this?
> 
> Tor is using OpenSSL which by default should use RDRAND, AES-NI (if applicable) and so on.
> 
> What does this option change?
> 
> -Michael
> 
>> On 25 Sep 2021, at 08:08, Peter Müller <peter.mueller(a)ipfire.org> wrote:
>>
>> Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org>
>> ---
>> html/cgi-bin/tor.cgi | 1 +
>> 1 file changed, 1 insertion(+)
>>
>> diff --git a/html/cgi-bin/tor.cgi b/html/cgi-bin/tor.cgi
>> index ce579aec1..2b0d93336 100644
>> --- a/html/cgi-bin/tor.cgi
>> +++ b/html/cgi-bin/tor.cgi
>> @@ -731,6 +731,7 @@ sub BuildConfiguration() {
>>
>> 	# Global settings.
>> 	print FILE "Sandbox 1\n";
>> +	print FILE "HardwareAccel 1\n";
>> 	print FILE "ControlPort $TOR_CONTROL_PORT\n";
>>
>> 	if ($settings{'TOR_ENABLED'} eq 'on') {
>> -- 
>> 2.26.2
> 

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [PATCH 2/4] Tor: Use crypto hardware acceleration if available
  2021-10-04 10:49     ` Peter Müller
@ 2021-10-04 13:59       ` Michael Tremer
  0 siblings, 0 replies; 7+ messages in thread
From: Michael Tremer @ 2021-10-04 13:59 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 1936 bytes --]

Thank you for clearing this up for me.

-Michael

> On 4 Oct 2021, at 11:49, Peter Müller <peter.mueller(a)ipfire.org> wrote:
> 
> Hello Michael,
> 
> thanks for your reply.
> 
> To quote from Tor's manpage (see https://2019.www.torproject.org/docs/tor-manual.html.en#HardwareAccel
> for an online version of it):
> 
>>       HardwareAccel 0|1
>>           If non-zero, try to use built-in (static) crypto hardware
>>           acceleration when available. Can not be changed while tor is
>>           running. (Default: 0)
> 
> Even if it is available, Tor does not use hardware crypto acceleration by default. While I consider
> this a reasonable default for Tor users not trusting their hardware, we agreed on doing so a while
> ago (https://git.ipfire.org/?p=ipfire-2.x.git;a=commit;h=13eab1060d0474ddf413386de0361e32113f8cb7).
> 
> Therefore, this needs to be enabled explicitly, which is what this patch is good for. :-)
> 
> I hope to have your question answered.
> 
> Thanks, and best regards,
> Peter Müller
> 
> 
>> Hello,
>> Can you elaborate a little bit more on this?
>> Tor is using OpenSSL which by default should use RDRAND, AES-NI (if applicable) and so on.
>> What does this option change?
>> -Michael
>>> On 25 Sep 2021, at 08:08, Peter Müller <peter.mueller(a)ipfire.org> wrote:
>>> 
>>> Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org>
>>> ---
>>> html/cgi-bin/tor.cgi | 1 +
>>> 1 file changed, 1 insertion(+)
>>> 
>>> diff --git a/html/cgi-bin/tor.cgi b/html/cgi-bin/tor.cgi
>>> index ce579aec1..2b0d93336 100644
>>> --- a/html/cgi-bin/tor.cgi
>>> +++ b/html/cgi-bin/tor.cgi
>>> @@ -731,6 +731,7 @@ sub BuildConfiguration() {
>>> 
>>> 	# Global settings.
>>> 	print FILE "Sandbox 1\n";
>>> +	print FILE "HardwareAccel 1\n";
>>> 	print FILE "ControlPort $TOR_CONTROL_PORT\n";
>>> 
>>> 	if ($settings{'TOR_ENABLED'} eq 'on') {
>>> -- 
>>> 2.26.2


^ permalink raw reply	[flat|nested] 7+ messages in thread

end of thread, other threads:[~2021-10-04 13:59 UTC | newest]

Thread overview: 7+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2021-09-25  7:07 [PATCH 1/4] Tor: Enable syscall sandbox Peter Müller
2021-09-25  7:08 ` [PATCH 2/4] Tor: Use crypto hardware acceleration if available Peter Müller
2021-09-25  7:08   ` [PATCH 3/4] Tor: Do not try to support IPv6 for Directory and OR ports Peter Müller
2021-09-25  7:09     ` [PATCH 4/4] Tor: Bump package version Peter Müller
2021-09-27 18:46   ` [PATCH 2/4] Tor: Use crypto hardware acceleration if available Michael Tremer
2021-10-04 10:49     ` Peter Müller
2021-10-04 13:59       ` Michael Tremer

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox