[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-talk] Tor transparent proxy leaks?



After setting up my computer (Debian Squeeze 6.0) to transparently proxy
all my traffic over tor, I decided to verify it by visiting
check.torproject.org with chromium. It told me that I was using tor, so
I thought everything was good. After that, just to be sure, I checked my
connections with lsof, and got the following results:

root@black-wind:/home/magus/# lsof -i -n -P
COMMAND    PID       USER   FD   TYPE DEVICE SIZE/OFF NODE NAME
rpcbind   1984       root    6u  IPv4   4993      0t0  UDP *:111
rpcbind   1984       root    7u  IPv4   4996      0t0  UDP *:887
rpcbind   1984       root    8u  IPv4   4997      0t0  TCP *:111 (LISTEN)
rpcbind   1984       root    9u  IPv6   5000      0t0  UDP *:111
rpcbind   1984       root   10u  IPv6   5003      0t0  UDP *:887
rpcbind   1984       root   11u  IPv6   5004      0t0  TCP *:111 (LISTEN)
polipo    2274      proxy    0u  IPv4   6276      0t0  TCP
127.0.0.1:8118 (LISTEN)
polipo    2274      proxy    1u  IPv4 516635      0t0  TCP
127.0.0.1:55414->127.0.0.1:9050 (CLOSE_WAIT)
polipo    2274      proxy    5u  IPv4 202157      0t0  TCP
127.0.0.1:53717->127.0.0.1:9050 (CLOSE_WAIT)
avahi-dae 2580      avahi   13u  IPv4   7394      0t0  UDP *:5353
avahi-dae 2580      avahi   14u  IPv6   7395      0t0  UDP *:5353
avahi-dae 2580      avahi   15u  IPv4   7396      0t0  UDP *:47014
avahi-dae 2580      avahi   16u  IPv6   7397      0t0  UDP *:39872
dhclient  2675       root    6u  IPv4   7539      0t0  UDP *:68
dhclient  2675       root   20u  IPv4   7529      0t0  UDP *:24378
dhclient  2675       root   21u  IPv6   7530      0t0  UDP *:56547
tor       2686 debian-tor    4u  IPv4   7606      0t0  TCP
192.168.1.4:38300->188.138.104.154:443 (ESTABLISHED)
tor       2686 debian-tor    7u  IPv4   6495      0t0  TCP
127.0.0.1:9050 (LISTEN)
tor       2686 debian-tor    8u  IPv4   6496      0t0  UDP 127.0.0.1:53
tor       2686 debian-tor    9u  IPv4   6497      0t0  TCP
127.0.0.1:9040 (LISTEN)
tor       2686 debian-tor   10u  IPv4   6498      0t0  TCP
127.0.0.1:9051 (LISTEN)
tor       2686 debian-tor   14u  IPv4 963741      0t0  TCP
127.0.0.1:9040->192.168.1.4:51136 (ESTABLISHED)
tor       2686 debian-tor   15u  IPv4 182884      0t0  TCP
127.0.0.1:9050->127.0.0.1:53591 (ESTABLISHED)
tor       2686 debian-tor   16u  IPv4   6571      0t0  TCP
192.168.1.4:37413->144.51.40.66:443 (ESTABLISHED)
tor       2686 debian-tor   17u  IPv4   6606      0t0  TCP
192.168.1.4:44714->93.185.101.76:443 (ESTABLISHED)
tor       2686 debian-tor   18u  IPv4 964951      0t0  TCP
127.0.0.1:9040->192.168.1.4:38331 (ESTABLISHED)
tor       2686 debian-tor   19u  IPv4 964213      0t0  TCP
127.0.0.1:9040->192.168.1.4:47171 (ESTABLISHED)
tor       2686 debian-tor   28u  IPv4  13205      0t0  TCP
127.0.0.1:9050->127.0.0.1:51685 (ESTABLISHED)
tor       2686 debian-tor   29u  IPv4  10504      0t0  TCP
127.0.0.1:9050->127.0.0.1:51662 (ESTABLISHED)
tor       2686 debian-tor   30u  IPv4 601334      0t0  TCP
127.0.0.1:9050->127.0.0.1:56632 (ESTABLISHED)
tor       2686 debian-tor   31u  IPv4 602532      0t0  TCP
127.0.0.1:9050->127.0.0.1:56633 (ESTABLISHED)
tor       2686 debian-tor   32u  IPv4 601518      0t0  TCP
127.0.0.1:9050->127.0.0.1:56634 (ESTABLISHED)
tor       2686 debian-tor   36u  IPv4  14604      0t0  TCP
127.0.0.1:9050->127.0.0.1:51694 (ESTABLISHED)
pidgin    3189      magus    8u  IPv4  13198      0t0  TCP
127.0.0.1:51685->127.0.0.1:9050 (ESTABLISHED)
pidgin    3189      magus   11u  IPv4  10503      0t0  TCP
127.0.0.1:51662->127.0.0.1:9050 (ESTABLISHED)
pidgin    3189      magus   14u  IPv4  15727      0t0  TCP
127.0.0.1:51694->127.0.0.1:9050 (ESTABLISHED)
ssh       3882      magus    3r  IPv4 182883      0t0  TCP
127.0.0.1:53591->127.0.0.1:9050 (ESTABLISHED)
ssh       4540      magus    3r  IPv4 602416      0t0  TCP
127.0.0.1:56632->127.0.0.1:9050 (ESTABLISHED)
ssh       4541      magus    3r  IPv4 601423      0t0  TCP
127.0.0.1:56633->127.0.0.1:9050 (ESTABLISHED)
ssh       4542      magus    3r  IPv4 602645      0t0  TCP
127.0.0.1:56634->127.0.0.1:9050 (ESTABLISHED)
chromium  5495      magus   63u  IPv4 963465      0t0  TCP
192.168.1.4:51136->173.194.71.95:443 (ESTABLISHED)
chromium  5495      magus   99u  IPv4 964203      0t0  TCP
192.168.1.4:38331->74.125.143.99:443 (ESTABLISHED)
chromium  5495      magus  107u  IPv4 965144      0t0  TCP
192.168.1.4:47171->173.194.71.120:443 (ESTABLISHED)

... Why is chromium telling me that I'm using tor, when it seems pretty
clear from lsof that I'm not? Am I doing something wrong? (See below)

Since I know someone is going to ask, here are my iptables rules
(They're the same rules found for setting up transparent proxying for a
specific user as you find on the transparent proxy wiki page
(https://trac.torproject.org/projects/tor/wiki/doc/TransparentProxy)
except with the username changed to my regular login):

iptables -t nat -A OUTPUT ! -o lo -p tcp -m owner --uid-owner magus -m
tcp -j REDIRECT --to-ports 9040
iptables -t nat -A OUTPUT ! -o lo -p udp -m owner --uid-owner magus -m
udp --dport 53 -j REDIRECT --to-ports 53
iptables -t filter -A OUTPUT -p tcp -m owner --uid-owner magus -m tcp
--dport 9040 -j ACCEPT
iptables -t filter -A OUTPUT -p udp -m owner --uid-owner magus -m udp
--dport 53 -j ACCEPT
iptables -t filter -A OUTPUT ! -o lo -m owner --uid-owner magus -j DROP
iptables -A OUTPUT -p icmp -j REJECT

I also want to point out that the only way I deviated from the
instructions was to apply the rules to my regular user account, as
opposed to creating a special "anonymous" user and sudoing to it any
time I want to do something over tor.

What gives?
_______________________________________________
tor-talk mailing list
tor-talk@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk