Glenn Dawson wrote:

At 08:18 PM 7/17/2005, Jim Campbell wrote:

I have a machine set up as a classroom to learn about FreeBSD.  It is
running 4.11 primarily because anything later can't see my hard drive.

As background, my FBSD machine has an address of 192.168.1.110.  It is
situated behind a hardware firewall (a Linksys router).  $pif is vr0.

I'm having problems setting up IPFW to communicate with an Onion router.
The puzzling part is that I am able to use the Onion router but my
/var/log/security file says that some of the packets are being dropped.

Following is what I hope are the pertinent lines from my /etc/ipfw.rules
file:

$cmd 00225 allow tcp from me to any 9001-9033 out via $pif setup keep-state
$cmd 00299 deny log all from me to any out via $pif
$cmd 00332 deny log tcp from any to me established in via $pif

Next is an excerpt from the /var/log/security file:

Jul 17 21:49:58 JimsP1G /kernel: ipfw: 299 Deny TCP 192.168.1.110:2218
128.148.34.133:9001 out via vr0
Jul 17 21:49:59 JimsP1G /kernel: ipfw: 299 Deny TCP 192.168.1.110:4959
131.175.189.134:9001 out via vr0
Jul 17 21:50:18 JimsP1G /kernel: ipfw: 332 Deny TCP 128.148.34.133:9001
192.168.1.110:2218 in via vr0
Jul 17 21:50:29 JimsP1G /kernel: ipfw: 332 Deny TCP 131.175.189.134:9030
192.168.1.110:4566 in via vr0

Now my questions. First, why isn't rule 225 allowing all the packets out
to the Onion router?  It seems to me that ipfw should allow all packets
in the port range 9001-9033 out or none.


Rule 225 will only match packets used to setup the tcp session, once it's established you need another rule that will allow the established session to function.

Rule 299 is denying everything from leaving your machine except for the packets allowed by rule 225.


It appears that I didn't include enough of the ipfw.rules file. Following is another abstract:

#################################################################
# Allow the packet through if it has previous been added to the
# the "dynamic" rules table by a allow keep-state statement.
#################################################################
$cmd 00015 check-state

It's my understanding that this rule allows through any returning
packets that match the dynamic rule established by Rule 225.


Next, the two inbound packets should be returning in response to an outbound packet. Why are they being dropped? Are they exceeding some
timeout?


Rule 332 is denying all established traffic from entering your machine. So, while rule 225 allows you to establish a tcp session with another system on ports 9001-9033, once the session is established, rule 225 no longer applies and rule 332 is then throwing all those packets away.

-Glenn


Part of my problem is that I don't understand the protocols being used by the Onion routers. It appears that Tor (the application on my machine that sets up the communication with the Onion routers) begins to communicate with the Onion routers as soon as it starts. This communication continues as long as the FBSD machine is alive. Really shook me up when I first started using Tor and Privoxy. I thought someone was hacking my machine :-)

The really puzzling thing about this situation is that at least some of the messages concerning the Onion protocol are getting through. I can ask for www.google.com and sometimes it resolves to Google in Europe, sometimes to Google in Asia, and sometines to Google here
in the US.  Ipfw appears to be only dropping some of the packets.

Perhaps I should set up another machine to sniff the packets that occur. Maybe that would
give me an idea of what is happening with the Onion protocol.

In any event, thanks for your input to my problem, and if you have any other ideas I would appreciate them very much. I've been chewing on this problem the better part of a week.

Thanks,

Jim
_______________________________________________
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Reply via email to