Re: Running Tor Browser Bundle in a sandbox / creating a (modified) copy of sandbox_net_t

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, 2013-08-29 at 12:01 +0000, fedorauser wrote:
> >> What avc messages are you seeing?
> > 
> > As Dominick anticipated I got:
> > 
> > avc: denied { name_bind } for pid=23725 comm="tor" src=9150 
> > scontext=unconfined_u:unconfined_r:sandbox_net_client_t:s0:c353,c458
> >
> > 
> tcontext=system_u:object_r:tor_port_t:s0 tclass=tcp_socket
> 
> The quickest (but dirty) fix seams to be to configure TBB to bind to
> another port (I used 9152 instead of tcp/9150).
> Changing the SocksPort in TBB's torrc + nis_enabled works for me, but I
> will build a new sandbox domain anyway.
> 
> In the end I'd like to have sandbox type that is able to run TBB out
> of the box without nis_enabled.
> 
> (Why is 9150 in tor_port_t anyway? Tor uses 9050 by default. Are there
> other common configurations that use 9150 for tor?)
> 
> I tried to create a copy of sandbox_net_t (with different name) by
> copying the "sandbox_net_client_t local policy" section from
> sandboxX.te [1] and the "sandbox_x_domain_template(sandbox_net)" -
> line, but failed (typeattribute line).
> 
> What would be *the* way to create a (renamed) copy of sandbox_net_t?
> (I'd prefer just to create an exact copy instead of approximating the
> domain via audit2allow runs.)

I showed you in the video how to create custom sandboxes.

sandbox_net_t is just another sandbox with full network access as far as
i know

So the procedure is pretty much the same as my video

to grant full network access you would do probably something like this:

policy_module(mysandbox, 1.0.0)

sandbox_x_domain_template(mysandbox)

# the below grants pretty much full access to the tcp/udp network

gen_require(`
	attribute port_type;
')

allow mysandbox_t self:tcp_socket create_stream_socket_perms;
allow mysandbox_t self:udp_socket create_stream_socket_perms;

allow mysandbox_t port_type:tcp_socket { name_connect name_bind };
allow mysandbox_t port_type:udp_socket name_bind;

#EOF

After that its pretty much the same procedure as i demonstrated in my
video


--
selinux mailing list
selinux@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/selinux





[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux