#16010: Get a working content process sandbox for Tor Browser on Windows -------------------------------------------------+------------------------- Reporter: gk | Owner: tbb- | team Type: task | Status: new Priority: Very High | Milestone: Component: Applications/Tor Browser | Version: Severity: Major | Resolution: Keywords: ff52-esr, tbb-e10s, tbb-gitian, | Actual Points: tbb-security, TorBrowserTeam201706, | GeorgKoppen201706 | Parent ID: | Points: Reviewer: | Sponsor: | Sponsor4 -------------------------------------------------+-------------------------
Comment (by cypherpunks): Replying to [comment:38 gk]: > Replying to [comment:37 cypherpunks]: > > Georg, which way did you decide to go? > > Not sure yet. I ripped out all the problematic parts and got it compiled and running without exploding in my face. You've removed sandbox protections, right? :) > I'll post a build for others to test tomorrow probably. I hope to find cases where that build is exploding while normal Firefox works fine to fill then the missing gaps with something smart. :) Then you'll need to attack the chrome process through IPC, see https://dxr.mozilla.org/mozilla- esr52/source/security/sandbox/chromium/sandbox/win/src/crosscall_server.cc#131 > > GCC's attempts seem to be finished with https://gcc.gnu.org/wiki/WindowsGCCImprovementsGSoC2008 > > Well, thanks for this page but looking at the SEH Suppport section it seems there was still a bunch of stuff to do back at that time. Yes, this page is about that they have a lot of things partially completed/investigated. -- Ticket URL: <https://trac.torproject.org/projects/tor/ticket/16010#comment:39> Tor Bug Tracker & Wiki <https://trac.torproject.org/> The Tor Project: anonymity online _______________________________________________ tor-bugs mailing list tor-bugs@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs