[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Ports 443 & 80



I read somewhere that you can use ports 443 and 80 to help out people stuck 
behind really restrictive firewalls.  I've been trying to manually configure 
Tor to do just that.  I've configured the router for port forwaring.  I'm 
pretty sure I did the same for my Linux firewall.  I told the firewall to 
listen on ports 443/80 and redirect to 9090/9091.  So the way I understand it 
is, Tor servers/clients should be trying to connect to ports 443/80 --> my 
router listens on 443/80 and bounces to my firewall --> my firewall listens 
to 443/80 and bounces to 9090/9091 which the tor server is really listening 
in on.  I'm running openSUSE 10.3.  I used yast to set the firewall.  If I 
understand what I'm doing I use the "Masquerading" section to do firewall 
port forwaring.  Which I'm pretty sure I did correctly but for some reason 
servers/clients are still unable to connect to my tor server.

I could really use some help getting this working.  I can get the normal ports 
working no problem and have my server join the tor network.  It's when I try 
doing the port 443/80 trick that things get harry.

Here are screenshots of my configuration screens I did for the port 
forwarding.

http://img246.imageshack.us/img246/303/443zb6.png
http://img265.imageshack.us/img265/1403/80xv7.png
http://img253.imageshack.us/img253/483/yastmasqsm4.png
http://img253.imageshack.us/img253/2820/yastrulesyl0.png
http://img338.imageshack.us/img338/5127/routerpn3.png

Here's portions of tor's config file.  I Xed out stuff that might be 
considered a security risk on my part.

SocksPort 9050
SocksListenAddress 127.0.0.1
DataDirectory /home/tor/.tor
ControlPort 9051

ORPort 443
ORListenAddress 0.0.0.0:9090
DirPort 80
DirListenAddress 0.0.0.0:9091

Also, here's the log when I run tor in Konsole as root.  I know, don't run Tor 
as root.  I'm just doing that to test it to make sure it's working before I 
set it to start on boot under the "tor" user.

May 16 23:09:16.449 [notice] Tor v0.1.2.19. This is experimental software. Do 
not rely on it for strong anonymity.
May 16 23:09:16.450 [notice] Initialized libevent version 1.3b using method 
epoll. Good.
May 16 23:09:16.450 [notice] Opening OR listener on 0.0.0.0:9090
May 16 23:09:16.450 [notice] Opening Directory listener on 0.0.0.0:9091
May 16 23:09:16.450 [notice] Opening Socks listener on 127.0.0.1:9050
May 16 23:09:16.450 [notice] Opening Control listener on 127.0.0.1:9051
May 16 23:09:16.451 [warn] You are running Tor as root. You don't need to, and 
you probably shouldn't.
May 16 23:09:16.642 [notice] Your Tor server's identity key fingerprint 
is 'XXXXXXXXXXXXXXXXXXX'
May 16 23:09:18.240 [notice] We now have enough directory information to build 
circuits.
May 16 23:09:18.438 [notice] Guessed our IP address as XXXXXXXXXXXXX.
May 16 23:09:21.856 [notice] Tor has successfully opened a circuit. Looks like 
client functionality is working.
May 16 23:09:21.856 [notice] Now checking whether ORPort XXXXXXX:443 and 
DirPort XXXXXXXXXXXX:80 are reachable... (this may take up to 20 minutes -- 
look for log messages indicating success)
May 16 23:29:18.900 [warn] Your server (XXXXXXXXXXX:443) has not managed to 
confirm that its ORPort is reachable. Please check your firewalls, ports, 
address, /etc/hosts file, etc.
May 16 23:29:18.900 [warn] Your server (XXXXXXXXXX:80) has not managed to 
confirm that its DirPort is reachable. Please check your firewalls, ports, 
address, /etc/hosts file, etc.