[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] ORPort NoListen



Sorry I didn't get back to you sooner not been at the computer, but yes
you have it right there just use your 192.168.1.12 internal address for
tor to listen on, the other advantage of this way over just giving the
port number is that you will only be accepting traffic arriving at your
router using the published address and port, I generally figure if
neither me nor any software I gave permission to have published an
address/port to legitimate clients then it seems safe enough to me to
presume it suspicious and not be passing it to a running daemon process.

On the other thing you mentioned you have a solution now so it may well
be that there isn't any use me trying to say anything helpful about that
but if it helps any I can tell you this much without knowing more about
your situation.  With a port bellow port 1024 like this there are
generally two different failures that account for the majority of the
traffic most likely.

  * Firstly there is the usual one that can apply with any port, port in
    use the error message will usually say something along the lines of
    cannot bind to IP:Addr and something along the lines of
    "Address/Port in use", "Device/Resource is busy" etc.  Only one
    process can be associated with a unique scrip:port->dstip:port
    combination so you will often get this error if you accidentally
    launch a second copy of a process such as a network server when the
    existing processes are still alive and havn't closed the port yet. 
    If you are at a loss what is using the port, netstat is your friend,
    you can use it to find out exactly what sockets are in use and which
    process currently owns each listening socket/TCP stream.
  * The second one is specific to ports bellow 1024, these low number
    ports were always traditionally and in many cases still are the main
    default port.  As a result many operating systems reserve these
    ports for the root/administrator, or at least being in position of
    the relevant capabilities on newer versions of linux, if this is the
    case usually the error will say something along the lines of "Cannot
    bind to IP:Port" and "Permission Denied", "Insufficient Privileges"
    etc or words to that effect.  If you have this issue then you will
    need to initially start tor as root but if you do this then you
    would also be really strongly recommended to also make sure to use
    the User directive in your config file to let tor know the use
    account to drop privileges to after it has finished initially
    binding to the proper port.  Alternative options however are to go
    ahead and use a NAT router to slip around the issue only an options
    until tor steps out of the 20th century and enables IPv6 support
    however, the other option is to set up a redirection using IP tables
    on the same machine as the tor relay itself, this has the additional
    advantage that with a reasonably recent kernel you could look into
    using TPROXY which does support IPv6 also.


On 10/03/13 18:24, Sina Eetezadi wrote:
> The thing is, with this setup arm and also vidalia reported "can not
> bind 0.0.0.0:443. Thats why I went back to the old setting.
> For the moment I do not really care, because it works, I was just wondering.
>
> My router forwards 443 to 192.168.1.12:9001. So you suggest I put
> "192.168.1.12" instead of "0.0.0.0.", right?
>
>
>> Sorry there is an error in my example, forgot the NoAdvertise attribute
>> didn't notice till the mail came back through the list, should have been
>>
>> DirPort 80 NoListen
>> DirPort 127.0.0.1:9030 NoAdvertise
>>
>> Other than that the rest all should work as I suggested either specify the actual address your router is set to forward to or specify only the port.
>>
>> On 10/03/13 17:20, Matt Joyce wrote:
>>> There is no need to actually write out the IPv4 unspecified address in
>>> the config file (0.0.0.0), all you need to do is just put:
>>>
>>> ORPort 9001 NoAdvertise
>>>
>>> Admittedly I have not actually tried it with ORPort personally but I
>>> have had that configuration on one of my relays in the past for DirPort
>>> to enable tor to advertise directory on 80 which was already assigned to
>>> apache2, then apache simply reverse proxied requests for /tor/* to tor
>>> on localhost 9030.  However, while you can do the above to listen on any
>>> address there is no need to do so, I would instead specify the address
>>> and port you have set in the DNAT rule on your router.  Same when I had
>>> the reverse proxy setup I simply had it set like:
>>>
>>> DirPort 80 NoListen
>>> DirPort 127.0.0.1:9030
>>>
>>> Course in your case it wont be 127.0.0.1 because it is coming in from
>>> your external router not another server on the local machine.
>>>
>>> On 10/03/13 16:18, Sina Eetezadi wrote:
>>>> Hi!
>>>>
>>>> I want to have port 443 advertised but listen on port 9001. My router
>>>> then forwards 443->9001 to the machine tor is running on.
>>>>
>>>> It works with this:
>>>> ORport 433
>>>> ORListenAddress 0.0.0.0:9001
>>>>
>>>> However I thought this is deprecated and I rather use:
>>>>
>>>> ORport 443 NoListen
>>>> ORPort 0.0.0.0:9001 NoAdvertise
>>>>
>>>> The latter however does not seem to work. Arm for example still errors
>>>> "binding failed" and I see no incoming connections.
>>>>
>>>> Is this a bug?
>>>>
>>>> Thanks.
>>>>
>>>> SE
>>>> _______________________________________________
>>>> tor-relays mailing list
>>>> tor-relays@xxxxxxxxxxxxxxxxxxxx
>>>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>>>
>>>
>>> _______________________________________________
>>> tor-relays mailing list
>>> tor-relays@xxxxxxxxxxxxxxxxxxxx
>>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>>
>>
>>
>> _______________________________________________
>> tor-relays mailing list
>> tor-relays@xxxxxxxxxxxxxxxxxxxx
>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>>
> _______________________________________________
> tor-relays mailing list
> tor-relays@xxxxxxxxxxxxxxxxxxxx
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays