[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] tor/netfilter: packets without uid



> On Thu, May 10, 2012 at 10:11:06PM -0400, johnmurphy323@xxxxxxxxxxxxx wrote:
> > IN= OUT=eth0 SRC=192.168.178.50 DST=some-target LEN=40 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=TCP SPT=50447 DPT=443 WINDOW=1002 RES=0x00 ACK URGP=0
> > 
> > This packet is https, most likely generated by my firefox user when
> >I was browsing a website. But it gets more interesting. There are lost
> >packets, even when I only use Tor. A reverse dns lookup of the target
> >ip shows that these are packets send by tor to the first relay.
> 
> These statements are contradictory. If the destination is a Tor relay,
> and the destination port is 443, then it's a Tor relay whose ORPort is
> 443. (Many relays listen on 443 so they can be reachable by firewalled
> users.) Your firefox user probably has nothing to do with it.

The tor packets (or at least what I think what tor packets were) went to another port, of course.

> > How is it possible for a packet not to have an associated uid?
> 
> This I do not know.
> 
> It does sound like your iptables failing to categorize the packet,
> rather than an actual application-level leak, though.

Of course.  Application-level leaks (I have those as well :( ) have associated UIDs.

Here is the relevant except of the iptables output:

-nat: No rules associated with my firefox user (I do not want to forward its packets through tor)
-filter OUTPUT:     
...
0     0 RETURN     all  --  any    any     anywhere             anywhere             owner UID match firefox-unsafe
...
45  2340 LOG        all  --  any    any     anywhere             anywhere             LOG level warning tcp-options ip-options uid prefix "DROP "
45  2340 REJECT     all  --  any    any     anywhere             anywhere             reject-with icmp-net-unreachable

Any ideas?
_______________________________________________
tor-talk mailing list
tor-talk@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk