A copy of the torrc.sample file has been put in the case
directory.

-Wyllys


Wyllys Ingersoll wrote:
> Template Version: @(#)sac_nextcase 1.68 02/23/09 SMI
> This information is Copyright 2009 Sun Microsystems
> 1. Introduction
>     1.1. Project/Component Working Name:
>        Tor
>     1.2. Name of Document Author/Supplier:
>        Author:  Wyllys Ingersoll
>     1.3  Date of This Document:
>       12 March, 2009
> 4. Technical Description
> 
> Description
> -----------
> This case proposes to deliver packages containing the Tor project 
> sofware.  Tor (https://www.torproject.org) is software lets
> one to participate in a network of virtual tunnels that allow people
> and groups to improve their privacy and security on the internet.
> Tor provides the foundation for a range of applications that allow 
> organizations and individuals to share information over public
> networks without compromising their privacy.
> 
> See this page for more details: https://www.torproject.org/overview.html.en
> 
> Notes:
> * Currently we are planning to deliver version 0.2.0.34
> * Tor uses only TCP streams and can be used by any application with SOCKS
>   support.
> * Tor does NOT support IPv6 yet 
> (https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#IPv6)
> * Tor uses OpenSSL for key generation and for encrypting the data
>   between relays.  As it works fine with the OpenSSL currently in Solaris, 
> there are
>   no plans to change it to use PKCS11 or KMF.
> 
> Least Privilege/RBAC
> --------------------
> This project will deliver new authorizations to /etc/security/auth_attr
> for managing the SMF services for starting and stopping the relay server:
>       solaris.smf.value.tor:::Change tor value properties::
>       solaris.smf.manage.tor:::Manage tor service states::
> 
> The following rights profile will be added to /etc/security/prof_attr:
>       Tor Administration::::auths=solaris.smf.manage.tor,solaris.smf.value.tor
> 
> The following will be added to /etc/security/exec_attr:
>       Tor 
> Administration:solaris:cmd:::/usr/bin/tor:uid=daemon,gid=daemon,privs=basic
>       Tor 
> Administration:solaris:cmd:::/usr/bin/tor-gencert:uid=daemon,gid=daemon,privs=basic
>       Tor 
> Administration:solaris:cmd:::/usr/bin/tor-resolve:uid=daemon,gid=daemon,privs=basic
> 
> tor will run as uid/gid "daemon/daemon".  It does not require special 
> privileges,
> it does not listen on privileged ports or access privileged data or 
> directories
> on the system.
> 
> SMF
> ---
> This project will deliver an SMF manifest and script that will allow
> the tor relay daemon to be restarted via SMF.  The SMF service will be:
>       svc:/application/security/tor:default (Tor Relay Daemon)
> 
> Zones
> -----
> Tor can (and probably should) be run in a local zone with no restrictions
> other than the fact that it needs a working network interface.  There
> is no technical reason why it would NOT work in a TX zone, though
> that configuration has not been tested.
> 
> Auditing
> --------
> Tor does not make access control decisions and is not an administrative
> tool that requires BSM auditing.
> 
> Configuration
> -------------
> Tor is an open source project and has an existing configuration system
> that relies on a text based configuration file.  An example config file 
> will be delivered in /etc/security/torrc.sample.  We do not plan to put 
> any of the Tor configuration settings into SMF because we do not want to 
> deviate from the upstream provider if at all possible.
> 
> The configuration file contains a long list of options for configuring
> the ports and interfaces that the relay will listen to as well as other
> details such as logging levels, configuring "hidden" services (see 
> https://www.torproject.org/hidden-services.html.en for a detailed description
> of the hidden service protocol), and limiting the bandwidth that the relay 
> will use.
> 
> The sample configuration file must be manually edited by the administrator
> and copied to the /etc/security/torrc in order to be used.  This forces
> the administrator to know and acknowlege the features that are being enabled
> rather than just blindly turning it on.
> 
> The upstream Tor community is fairly active and releases updates several times
> each year.  Making Solaris-specific changes (such as putting config options 
> in an
> SMF profile) will make it harder to keep up with the community and resync
> with the current releases.
> 
> Packing Modifications
> ---------------------
> SUNWtor               Tor software for userland
> SUNWtor-root  Tor software for Root filesystem
> 
> Deliverables
> ------------
> /usr/bin/tor                  SFW     Uncommitted
> /usr/bin/tor-resolve          SFW     Uncommitted
> /usr/bin/tor-gencert          SFW     Uncommitted
> 
> /etc/security/torrc.sample    SFW     Uncommitted
> /usr/share/tor/geoip          SFW     Uncommitted
> 
> /usr/man/man1/tor.1           SFW     Uncommitted
> /usr/man/man1/tor-resolve.1   SFW     Uncommitted
> /usr/man/man1/tor-gencert.1   SFW     Uncommitted
> 
> Details
> -------
> tor is the main daemon process that is started by the "tor" SMF profile.
> 
> tor-resolve is a script to connect to a SOCKS proxy that knows about the 
> SOCKS RESOLVE        
>     command, hand it a hostname, and return an IP address.
> 
> tor-gencert generates certificates and private keys for  use
>      by  Tor  directory  authorities running the v3 Tor directory
>      protocol, as used by Tor 0.2.0 and later.  If  you  are  not
>      running  a  directory  authority, you don't need to use tor-
>      gencert. tor-gencert generates 3 files that the user must then copy
>      to the "keys" subdirectory (/var/lib/tor/keys) - 
> "authority_identity_key", 
>      "authority_signing_key" and "authority_certificate".
> 
> geoip is an ASCII based database of IP-to-Country name mappings.  It is not 
> intended
>      to be edited by users.
> 
> 
> OpenSource
> ----------
> OSR Review: 9954  (approved - Tor version 0.2.0.30)
>             11364 (pending expedited review - Tor version 0.2.0.34)
> 
> Tor Project:  https://www.torproject.org
> Tor Wiki: https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ
> 
> 
> Release Taxonomy:  Micro/Patch
> 
> 6. Resources and Schedule
>     6.4. Steering Committee requested information
>       6.4.1. Consolidation C-team Name:
>               SFW
>     6.5. ARC review type: FastTrack
>     6.6. ARC Exposure: open


Reply via email to