[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: Please run a bridge relay! (was Re: Tor 0.2.0.13-alpha is out)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
This time the iptable applied, but I still have the same problem; cannot
verify that 443 is reachable.
- --
People just like you lose untold millions in personal wealth due to
frivolous lawsuits and unfair government seizures.
Are you protected? Read the Asset Protection Crash Course at
http://www.keepyourassets.net?andrew to find out how to protect your
hard-earned assets.
Olaf Selke wrote:
> Andrew Del Vecchio wrote:
>> I got nothing:
>>
>> Chain PREROUTING (policy ACCEPT)
>> target prot opt source destination
>>
>> Chain POSTROUTING (policy ACCEPT)
>> target prot opt source destination
>>
>> Chain OUTPUT (policy ACCEPT)
>> target prot opt source destination
>
> sorry dude, no idea! On my box it does work:
>
> iptables -t nat -A PREROUTING -p tcp -d 195.71.90.10 --dport 443 -j DNAT
> --to-destination 195.71.90.10:9080
> iptables -t nat -A PREROUTING -p tcp -d 195.71.90.10 --dport 80 -j DNAT
> --to-destination 195.71.90.10:9090
>
> gives
>
> anonymizer:~# iptables -L -t nat
> Chain PREROUTING (policy ACCEPT)
> target prot opt source destination
> DNAT tcp -- anywhere anonymizer.blutmagie.de tcp
> dpt:https to:195.71.90.10:9080
> DNAT tcp -- anywhere anonymizer.blutmagie.de tcp
> dpt:www to:195.71.90.10:9090
>
> Chain POSTROUTING (policy ACCEPT)
> target prot opt source destination
>
> Chain OUTPUT (policy ACCEPT)
> target prot opt source destination
>
>
> regards, Olaf
>
>
>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFHeVWngwZR2XMkZmQRAlkxAJsG0hkxqFxuYhTkdX0VQ9Y9nUR2IACfa/Gv
ZU2/HZqYyvifDfIP9JH94dk=
=3Y+0
-----END PGP SIGNATURE-----