Hi, I'm running a Tor relay on a dynamic address with the latest version 0.2.2.3-alpha-1~~lenny+1 on Debian Lenny. After the update to this version (was running 0.2.1.19-1~~lenny+1 before that which didn't had the problem) my firewall drops some packets and I'm not sure what's wrong. This is my iptables firewall configuration (outgoing only). Tor is running as debian-tor user. About 150KiB traffic (in and outgoing). -A OUTPUT -m conntrack --ctstate INVALID -j DROP -A OUTPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT -A OUTPUT -m owner --uid-owner debian-tor -j ACCEPT -A OUTPUT -o lo -j ACCEPT -A OUTPUT -j REJECT I log the packets before the REJECT and that's what I'm getting now: IN= OUT=eth0 SRC=192.168.2.19 DST=xxx LEN=626 TOS=0x00 PREC=0x00 TTL=64 ID=6346 DF PROTO=TCP SPT=9090 DPT=3465 WINDOW=241 RES=0x00 ACK PSH FIN URGP=0 IN= OUT=eth0 SRC=192.168.2.19 DST=xxx LEN=626 TOS=0x00 PREC=0x00 TTL=64 ID=60157 DF PROTO=TCP SPT=9090 DPT=45746 WINDOW=65535 RES=0x00 ACK PSH FIN URGP=0 IN= OUT=eth0 SRC=192.168.2.19 DST=xxx LEN=1212 TOS=0x00 PREC=0x00 TTL=64 ID=15496 DF PROTO=TCP SPT=9090 DPT=15098 WINDOW=14883 RES=0x00 ACK PSH FIN URGP=0 IN= OUT=eth0 SRC=192.168.2.19 DST=xxx LEN=1212 TOS=0x00 PREC=0x00 TTL=64 ID=48676 DF PROTO=TCP SPT=9090 DPT=45491 WINDOW=115 RES=0x00 ACK PSH FIN URGP=0 IN= OUT=eth0 SRC=192.168.2.19 DST=xxx LEN=1212 TOS=0x00 PREC=0x00 TTL=64 ID=48677 DF PROTO=TCP SPT=9090 DPT=45491 WINDOW=115 RES=0x00 ACK PSH FIN URGP=0 From what I can see from the traffic and established connections Tor is working fine but I'm not sure if this may cause any other problems. Is there something wrong with my setup or is this a Tor problem or is this normal? Thanks, Simon -- + privacy is necessary + using http://gnupg.org + public key id: 0x92FEFDB7E44C32F9
Attachment:
signature.asc
Description: Digital signature