From 299e8c0292f324b3c39f1ffae9792fd4fcafe773 Mon Sep 17 00:00:00 2001 From: Roger Dingledine Date: Tue, 1 Oct 2013 20:41:46 -0400 Subject: first draft of an 0.2.5.1-alpha changelog --- changes/seccomp2_sandbox | 12 ------------ 1 file changed, 12 deletions(-) delete mode 100644 changes/seccomp2_sandbox (limited to 'changes/seccomp2_sandbox') diff --git a/changes/seccomp2_sandbox b/changes/seccomp2_sandbox deleted file mode 100644 index 73b3a8d5e..000000000 --- a/changes/seccomp2_sandbox +++ /dev/null @@ -1,12 +0,0 @@ - o Major features (security): - - Use the seccomp2 syscall filtering facility on Linux to limit - which system calls Tor can invoke. This is an experimental, - Linux-only feature to provide defense-in-depth against unknown - attacks. To try turning it on, set "Sandbox 1" in your torrc - file. This is an experimental feature, however, and some things - may break, so please be ready to report bugs. We hope to add - support for better sandboxing in the future, - including more fine-grained filters, better division of - responsibility, and support for more platforms. This work has - been done by Cristian-Matei Toader for Google Summer of Code. - -- cgit v1.2.3