[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-talk] Transparent Proxy with iptables



Hello!

I made my own iptables bash script for redirection of local traffic through 
Tor. I built upon the examples from 
https://trac.torproject.org/projects/tor/wiki/doc/TransparentProxy while 
adding in some extra functionality that I'd like. This being:

- Disable redirection for every user in the system user group "nontor"
- Full IPv6 support

The user account running the Tor service (debian-tor) is in the nontor group. 
So are some other service users which need to communicate directly to the 
internet.

The script is attached to this mail.

To add IPv6 functionality, I mostly just repeated the rules from iptables in 
ip6tables. This worked for the most part, but IPv6 traffic to onion services 
doesn't work if I just allow loopback traffic to "::1". I need to allow 
outgoing traffic to the lo interface (see line 52 in script), which concerns 
me a little bit but is probably just a property of IPv6. When sniffing 
loopback traffic, I can see that the IPv6 traffic to Tor's TransPort has my 
primary network interface's (eth0) global IP address (2a02:...) as it's 
desination address.

In torrc I added:

	VirtualAddrNetworkIPv4 10.192.0.0/10
	VirtualAddrNetworkIPv6 1337::/16
	AutomapHostsonResolve 1
	TransPort 9040
	TransPort [::1]:9040
	DNSPort 53
	DNSPort [::1]:53

Can someone please take a look at the script and look for weaknesses or come 
up with possible improvements? I am wondering if there are any risks with 
allowing output to the lo interface and if "1337::/16" is a bad idea for  
VirtualAddrNetworkIPv6.

Thank you!
-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk