Re: [tor-relays] serious gap in 'chroot' documentation

2013-10-18 Thread Konrad Neitzel
On Fri, 2013-10-18 at 08:29 -0400, krishna e bera wrote: > Problem: does "chroot" mean anything in a Windows environment? There is no real chroot solution on windows that I know of. What exist is an application virtualisation (which of course has other targets) but I would say that it also includ

Re: [tor-relays] serious gap in 'chroot' documentation

2013-10-18 Thread krishna e bera
On 13-10-18 03:34 AM, Fabio Pietrosanti (naif) wrote: > I think that Tor should implement natively support for self-chrooting > and that those kind of approach are dirty, unmaintainable, hacks. > > Most security software does support chrooting natively, simply by > opening the relevant filesystem

Re: [tor-relays] serious gap in 'chroot' documentation

2013-10-18 Thread Fabio Pietrosanti (naif)
I think that Tor should implement natively support for self-chrooting and that those kind of approach are dirty, unmaintainable, hacks. Most security software does support chrooting natively, simply by opening the relevant filesystem filedescriptor before chrooting, and then operating over it from

Re: [tor-relays] serious gap in 'chroot' documentation

2013-10-17 Thread starlight . 2013q4
At 23:13 10/16/2013 -0400, starlight.201...@binnacle.cx wrote: >Newer versions of 'openssl' require access to > > /proc/sys/kernel/random > Got this wrong, in part due to the difficulty of debugging 'chroot'. 'libevent' does make use of /proc/sys/kernel/random/uuid if it's available but toler

Re: [tor-relays] serious gap in 'chroot' documentation

2013-10-16 Thread starlight . 2013q4
At 23:13 10/16/2013 -0400, starlight.201...@binnacle.cx wrote: >Newer versions of 'openssl' require access to With the assistance of 'strings' it was determined that it is /usr/local/lib64/libevent-2.0.so.5.1.9 that is actually responsible for accessing /proc/sys/kernel/random/uuid durin

[tor-relays] serious gap in 'chroot' documentation

2013-10-16 Thread starlight . 2013q4
Newer versions of 'openssl' require access to /proc/sys/kernel/random and so the line /proc/sys/kernel/random /chroot_tor/proc/sys/kernel/random auto bind 0 0 must be added to the /etc/fstab file or the command mount -o bind /proc/sys/kernel/random /chroot_tor/proc/sys/kernel/ra