[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: Transparently anonymizing traffic iptables problem



On Mon, 9 Feb 2009 19:42:03 +0000
unknown <unknown@xxxxxxxxx> wrote:

> https://wiki.torproject.org/noreply/TheOnionRouter/TransparentProxy :
> 
> [quote]
> 
> 2.1. Transparently anonymizing traffic for a specific user
> 
> [code]
> iptables -t nat -A OUTPUT -p tcp -m owner --uid-owner anonymous -m tcp --syn -j REDIRECT --to-ports 9040 
> 
> iptables -t nat -A OUTPUT -p udp -m owner --uid-owner anonymous -m udp --dport 53 -j REDIRECT --to-ports 53 
> 
> iptables -t nat -A OUTPUT -m owner --uid-owner anonymous -j DROP
> [/code]
> 
> [/quote]
> 
> But last iptables rule will not working anymore.
> 
> Iptables warning:
> 
> [quote]
> The "nat" table is not intended for filtering, hence the use of DROP is deprecated and will permanently be disabled in the next iptables release. Please adjust your scripts.
> [/quote]
> 
> What's better iptables rule for *specific* user?
> 

Is it right instead DROP change destination of all packets for all ports and protocols from specific user to localhost to block what to tor or privoxy  can't accept?

iptables -t nat -A OUTPUT -m owner --uid-owner anonymous -j DNAT --to-destination 127.0.0.1