[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] orWall 1.0.0 released!
On 04/10/14 00:27, Mike Perry wrote:
> CJ:
>> Hello!
>>
>> just a small update regarding orWall: it's released 1.0.0!
>> There's still *one* annoying issue regarding the tethering, but it
>> should be OK next week. Just have to take some time in order to debug
>> this for good.
>>
>> orWall provides now a brand new UI in order to be easier to handle.
>> There's also an integrated help (as a first-start wizard we might call
>> later on).
>> There are many new features and improvements, like:
>>
>> - ability to disable all rules and let the device access freely the Net
>> - for each app, the possibility to access some advanced settings
>> allowing to bypass Tor, or tell orWall the app knows about proxies or Tor
>> - better management for the init-script
>> - better management for iptables rules
>> - translations in French, German and Italian are almost done
>
> Hey CJ, just wanted to let you know that I've tried OrWall and it's a
> huge improvement! Way better user experience on just about every front!
>
\o/ I'm really glad I could do something more userfriendly
> I also have not detected any leaks on my upstream router, either.
thanks to the init-script and a better iptables management ;). DROP
policy is just the key.
>
> When I get a chance, I will update the original blog post to recommend
> OrWall instead of my crazy Droidwall hack scripts.
Wow… Thank you!
>
>> Any feedback from Tor/Orbot users interest me in order to improve
>> orWall. I think the current release is pretty good, but as the main dev
>> I'm maybe not that neutral regarding this statement ;).
>
> The one thing is that I find the long-press options for "Connectype
> type" confusing:
>
> - "Force connection" to what? I assume through Tor's transproxy because
> of the REDIRECT text, but this will not be clear to users who are
> unfamiliar with iptables.
> How about: "Redirect all network activity"
hmmm yes. Why not, I think it's a sentence people will understand indeed
>
> - What does "native capacity"/"fenced path" mean? Does that mean only
> access to the local SOCKS/HTTP proxy ports in Tor's case?
> How about: "Only allow local proxy port access"
>
Same thing. As this box allow all local connections (no port filtered
for now, I'll maybe add it later), text will be correct.
> These are complicated ideas to convey, though. I'm not sure my
> suggestions are the best ones either.
>
True :/. It's a bit explained in the wizard though. But I think the
wizard might be worked out a bit more, it's painfully long and full of text.
>
> I also suggest soliciting input about the DNS issue we discussed where
> DNS queries are done by root on Android 4.3+ unless the
> 'ANDROID_DNS_MODE=local' environment variable is set. Perhaps someone
> will come up with a clever hack to set this env var in a persistent way
> that we haven't thought of, or find some way to write a shim on the DNS
> resolution filesystem socket to enforce what we want.
yup. This part is hard, and I don't think I'll be able to find a
solution alone. I'll open an issue on the github tracker and place a big
"help wanted" in it :).
>
> You could list this on a known issues or FAQ page, or in your bugtracker
> I guess. Making root/UID 0 handle DNS is also a security risk, and I'm
> very surprised the Android team thought this was a good idea. :/
Oh, well, they also decided to follow Oracle JVM Cipher list, you know…
Nothing surprises me now ;).
>
>
> Also looking forward to the "Logs" window doing something :)
Same for me. This part will be complicated due to different kernel
capabilities:
some supports LOG target, other NFLOG, and the latter doesn't provide
any nflog reader in the ROM (heya, Cyanogenmod, you're brain-dead on this!).
Thus it means:
- detecting which kind of log is supported
- create some UI in order to activate logs (already have some ideas)
- inject some binary in the system for nflog support
- … and many other things.
Maybe this can be avoided, as AFWall+ is considering providing some
intents as API end-points. This would mean:
- install orWall
- install AFWall+
and you'll get the best of both worlds, as AFWall will take care of the
iptables and log interfaces, just executing orWall orders…
Thanks for your feedback!
Cheers,
C.
>
>
>
>
>
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk