Skip to content

GitLab

  • Projects
  • Groups
  • Snippets
  • Help
    • Loading...
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in
T
Tor
  • Project overview
    • Project overview
    • Details
    • Activity
    • Releases
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributors
    • Graph
    • Compare
  • Issues 1,067
    • Issues 1,067
    • List
    • Boards
    • Labels
    • Service Desk
    • Milestones
  • Merge Requests 17
    • Merge Requests 17
  • CI / CD
    • CI / CD
    • Pipelines
    • Jobs
    • Schedules
  • Operations
    • Operations
    • Incidents
    • Environments
  • Analytics
    • Analytics
    • CI / CD
    • Repository
    • Value Stream
  • Members
    • Members
  • Activity
  • Graph
  • Create a new issue
  • Jobs
  • Commits
  • Issue Boards
Collapse sidebar

GitLab is used only for code review, issue tracking and project management. Canonical locations for source code are still https://gitweb.torproject.org/ https://git.torproject.org/ and git-rw.torproject.org.

  • The Tor Project
  • Core
  • Tor
  • Issues
  • #19759

Closed
Open
Opened Jul 27, 2016 by Trac@tracbot

systemd tor.service hardening: add MemoryDenyWriteExecute=true

In systemd 231, the MemoryDenyWriteExecute option was added:

      A new service setting MemoryDenyWriteExecute= has been added, taking
      a boolean value. If turned on, a service may no longer create memory
      mappings that are writable and executable at the same time. This
      enhances security for services where this is enabled as it becomes
      harder to dynamically write and then execute memory in exploited
      service processes. This option has been enabled for all of systemd's
      own long-running services.

https://lists.freedesktop.org/archives/systemd-devel/2016-July/037220.html

Can you please add:

MemoryDenyWriteExecute=true

to https://gitweb.torproject.org/tor.git/tree/contrib/dist/tor.service.in in the [Service] section?

Note that systemd < 231 will simply ignore this unknown option so there is no backwards compatibility concern.

Trac:
Username: candrews

To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Assignee
Assign to
Tor: unspecified
Milestone
Tor: unspecified
Assign milestone
Time tracking
None
Due date
None
Reference: tpo/core/tor#19759