[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] tor setup on wt3020h with openwrt problem
Hi,
On Mon, Dec 29, 2014 at 9:00 AM, Michal Zuber <michael@xxxxxxxxxx> wrote:
> Hi,
> 1. what about the logs?
>
> 2. I have the following in my iptables.rules to be notified what was
> blocked
> -A INPUT -m limit --limit 5/min -j LOG --log-prefix "iptables denied: "
> --log-level 7
>
>
I added this to firewall.user and saw that UDP messages are somehow blocked.
[ 2539.100000] iptables denied: IN=wlan0 OUT=
MAC=20:28:18:a0:a8:fe:e0:b9:a5:9d:7b:4f:08:00 SRC=192.168.2.171
DST=192.168.2.1 LEN=66 TOS=0x00 PREC=0x00 TTL=64 ID=38735 DF PROTO=UDP
SPT=48397 DPT=9053 LEN=46
[ 2550.550000] iptables denied: IN=wlan0 OUT=
MAC=20:28:18:a0:a8:fe:e0:b9:a5:9d:7b:4f:08:00 SRC=192.168.2.171
DST=192.168.2.1 LEN=70 TOS=0x00 PREC=0x00 TTL=64 ID=40926 DF PROTO=UDP
SPT=47905 DPT=9053 LEN=50
[ 2563.880000] iptables denied: IN=wlan0 OUT=
MAC=20:28:18:a0:a8:fe:e0:b9:a5:9d:7b:4f:08:00 SRC=192.168.2.171
DST=192.168.2.1 LEN=64 TOS=0x00 PREC=0x00 TTL=64 ID=43508 DF PROTO=UDP
SPT=37506 DPT=9053 LEN=44
[ 2574.950000] iptables denied: IN=wlan0 OUT=
MAC=20:28:18:a0:a8:fe:68:48:98:59:97:36:08:00 SRC=192.168.2.148
DST=192.168.2.1 LEN=70 TOS=0x00 PREC=0x00 TTL=64 ID=54347 DF PROTO=UDP
SPT=28425 DPT=9053 LEN=50
[ 2586.200000] iptables denied: IN=wlan0 OUT=
MAC=20:28:18:a0:a8:fe:e0:b9:a5:9d:7b:4f:08:00 SRC=192.168.2.171
DST=192.168.2.1 LEN=66 TOS=0x00 PREC=0x00 TTL=64 ID=46793 DF PROTO=UDP
SPT=37394 DPT=9053 LEN=46
[ 2598.680000] iptables denied: IN=wlan0 OUT=
MAC=20:28:18:a0:a8:fe:e0:b9:a5:9d:7b:4f:08:00 SRC=192.168.2.171
DST=192.168.2.1 LEN=64 TOS=0x00 PREC=0x00 TTL=64 ID=48473 DF PROTO=UDP
SPT=57058 DPT=9053 LEN=44
[ 2611.290000] iptables denied: IN=wlan0 OUT=
MAC=20:28:18:a0:a8:fe:68:48:98:59:97:36:08:00 SRC=192.168.2.148
DST=192.168.2.1 LEN=68 TOS=0x00 PREC=0x00 TTL=64 ID=58998 DF PROTO=UDP
SPT=58128 DPT=9053 LEN=48
> 3. `netstat -nat |grep :53` or `lsof -i :53` shows listening on port 53 ? (
> https://www.debian-administration.org/article/184/How_to_find_out_which_
> process_is_listening_upon_a_port)
> 4. Did you try host (dig, nslookup) on the router?
> 5. Doest `dig @ROUTER_IP google.com` work?
> 6. You could also try watch into the DNS traffic with ` tcpdump -vvv -s 0
> -l -n port 53` (http://jontai.me/blog/2011/11/monitoring-dns-queries-
> with-tcpdump/)
route -n was strange
# route -n
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use
Iface
192.168.1.0 0.0.0.0 255.255.255.0 U 0 0 0
br-lan
192.168.2.0 0.0.0.0 255.255.255.0 U 0 0 0
wlan0
netstat -pantu says the ports are right
netstat -pantu
Active Internet connections (servers and established)
Proto Recv-Q Send-Q Local Address Foreign Address
State PID/Program name
tcp 0 0 192.168.2.1:9040 0.0.0.0:*
LISTEN 734/tor
tcp 0 0 0.0.0.0:80 0.0.0.0:*
LISTEN 756/uhttpd
tcp 0 0 0.0.0.0:53 0.0.0.0:*
LISTEN 1059/dnsmasq
tcp 0 0 0.0.0.0:22 0.0.0.0:*
LISTEN 699/dropbear
tcp 0 0 0.0.0.0:443 0.0.0.0:*
LISTEN 734/tor
tcp 0 248 192.168.2.1:22 192.168.2.171:44694
ESTABLISHED 1062/dropbear
tcp 0 0 :::80 :::*
LISTEN 756/uhttpd
tcp 0 0 :::53 :::*
LISTEN 1059/dnsmasq
tcp 0 0 :::22 :::*
LISTEN 699/dropbear
udp 0 0 0.0.0.0:53 0.0.0.0:*
1059/dnsmasq
udp 0 0 0.0.0.0:67 0.0.0.0:*
1059/dnsmasq
udp 0 0 192.168.2.1:9053 0.0.0.0:*
734/tor
udp 0 0 :::546
:::* 812/odhcp6c
udp 0 0 :::547
:::* 669/odhcpd
udp 0 0 :::53
:::* 1059/dnsmasq
~
here is iptables -L
Chain INPUT (policy ACCEPT)
target prot opt source destination
delegate_input all -- anywhere anywhere
LOG all -- anywhere anywhere limit: avg
5/min burst 5 LOG level debug prefix "iptables denied: "
Chain FORWARD (policy DROP)
target prot opt source destination
delegate_forward all -- anywhere anywhere
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
delegate_output all -- anywhere anywhere
Chain delegate_forward (1 references)
target prot opt source destination
forwarding_rule all -- anywhere anywhere /* user
chain for forwarding */
ACCEPT all -- anywhere anywhere ctstate
RELATED,ESTABLISHED
zone_lan_forward all -- anywhere anywhere
zone_wan_forward all -- anywhere anywhere
reject all -- anywhere anywhere
Chain delegate_input (1 references)
target prot opt source destination
ACCEPT all -- anywhere anywhere
input_rule all -- anywhere anywhere /* user
chain for input */
ACCEPT all -- anywhere anywhere ctstate
RELATED,ESTABLISHED
syn_flood tcp -- anywhere anywhere tcp
flags:FIN,SYN,RST,ACK/SYN
zone_lan_input all -- anywhere anywhere
zone_wan_input all -- anywhere anywhere
Chain delegate_output (1 references)
target prot opt source destination
ACCEPT all -- anywhere anywhere
output_rule all -- anywhere anywhere /* user
chain for output */
ACCEPT all -- anywhere anywhere ctstate
RELATED,ESTABLISHED
zone_lan_output all -- anywhere anywhere
zone_wan_output all -- anywhere anywhere
Chain forwarding_lan_rule (1 references)
target prot opt source destination
Chain forwarding_rule (1 references)
target prot opt source destination
Chain forwarding_transtor_rule (1 references)
target prot opt source destination
Chain forwarding_wan_rule (1 references)
target prot opt source destination
Chain input_lan_rule (1 references)
target prot opt source destination
Chain input_rule (1 references)
target prot opt source destination
Chain input_transtor_rule (1 references)
target prot opt source destination
Chain input_wan_rule (1 references)
target prot opt source destination
Chain output_lan_rule (1 references)
target prot opt source destination
Chain output_rule (1 references)
target prot opt source destination
Chain output_transtor_rule (1 references)
target prot opt source destination
Chain output_wan_rule (1 references)
target prot opt source destination
Chain reject (3 references)
target prot opt source destination
REJECT tcp -- anywhere anywhere reject-with
tcp-reset
REJECT all -- anywhere anywhere reject-with
icmp-port-unreachable
Chain syn_flood (1 references)
target prot opt source destination
RETURN tcp -- anywhere anywhere tcp
flags:FIN,SYN,RST,ACK/SYN limit: avg 25/sec burst 50
DROP all -- anywhere anywhere
Chain zone_lan_dest_ACCEPT (2 references)
target prot opt source destination
ACCEPT all -- anywhere anywhere
Chain zone_lan_forward (1 references)
target prot opt source destination
forwarding_lan_rule all -- anywhere anywhere /*
user chain for forwarding */
ACCEPT all -- anywhere anywhere ctstate DNAT
/* Accept port forwards */
zone_lan_dest_ACCEPT all -- anywhere anywhere
Chain zone_lan_input (1 references)
target prot opt source destination
input_lan_rule all -- anywhere anywhere /* user
chain for input */
ACCEPT all -- anywhere anywhere ctstate DNAT
/* Accept port redirections */
zone_lan_src_ACCEPT all -- anywhere anywhere
Chain zone_lan_output (1 references)
target prot opt source destination
output_lan_rule all -- anywhere anywhere /* user
chain for output */
zone_lan_dest_ACCEPT all -- anywhere anywhere
Chain zone_lan_src_ACCEPT (1 references)
target prot opt source destination
ACCEPT all -- anywhere anywhere
Chain zone_transtor_dest_ACCEPT (1 references)
target prot opt source destination
Chain zone_transtor_dest_REJECT (1 references)
target prot opt source destination
Chain zone_transtor_forward (0 references)
target prot opt source destination
forwarding_transtor_rule all -- anywhere
anywhere /* user chain for forwarding */
ACCEPT all -- anywhere anywhere ctstate DNAT
/* Accept port forwards */
zone_transtor_dest_REJECT all -- anywhere
anywhere
Chain zone_transtor_input (0 references)
target prot opt source destination
input_transtor_rule all -- anywhere anywhere /*
user chain for input */
ACCEPT udp -- anywhere anywhere udp
dpt:bootps /* Allow-Tor-DHCP */
ACCEPT tcp -- anywhere anywhere tcp dpt:9040
/* Allow-Tor-Transparent */
ACCEPT udp -- anywhere anywhere udp dpt:9053
/* Allow-Tor-DNS */
ACCEPT all -- anywhere anywhere ctstate DNAT
/* Accept port redirections */
zone_transtor_src_REJECT all -- anywhere anywhere
Chain zone_transtor_output (0 references)
target prot opt source destination
output_transtor_rule all -- anywhere anywhere /*
user chain for output */
zone_transtor_dest_ACCEPT all -- anywhere
anywhere
Chain zone_transtor_src_REJECT (1 references)
target prot opt source destination
Chain zone_wan_dest_ACCEPT (1 references)
target prot opt source destination
ACCEPT all -- anywhere anywhere
Chain zone_wan_dest_REJECT (1 references)
target prot opt source destination
reject all -- anywhere anywhere
Chain zone_wan_forward (1 references)
target prot opt source destination
forwarding_wan_rule all -- anywhere anywhere /*
user chain for forwarding */
ACCEPT all -- anywhere anywhere ctstate DNAT
/* Accept port forwards */
zone_wan_dest_REJECT all -- anywhere anywhere
Chain zone_wan_input (1 references)
target prot opt source destination
input_wan_rule all -- anywhere anywhere /* user
chain for input */
ACCEPT udp -- anywhere anywhere udp
dpt:bootpc /* Allow-DHCP-Renew */
ACCEPT icmp -- anywhere anywhere icmp
echo-request /* Allow-Ping */
ACCEPT tcp -- anywhere anywhere tcp dpt:https
/* @rule[5] */
ACCEPT all -- anywhere anywhere ctstate DNAT
/* Accept port redirections */
zone_wan_src_REJECT all -- anywhere anywhere
Chain zone_wan_output (1 references)
target prot opt source destination
output_wan_rule all -- anywhere anywhere /* user
chain for output */
zone_wan_dest_ACCEPT all -- anywhere anywhere
Chain zone_wan_src_REJECT (1 references)
target prot opt source destination
reject all -- anywhere anywhere
I started to lost my Internet connection for other adsl users. When they
connected to normal adsl ssid while the tor router is plugged, they started
to lost connection.
Seems there is a firewall or network problem.
Anyone can figure it out?
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk