Tony Nguyen wrote:
> 
> Wyllys,
> 
> With the integration of 2008/580 Solaris host-based firewall, the new 
> tor service, with some small changes, can provide fine-grained access 
> control to its service and be consistent with existing services. Since 
> tor defines listening ports in a configuration file, similar to ssh, you 
> can see network/ssh for example. I'm happy to work with you offline to 
> figure this out.

Tor listens on either 1 or 2 ports, 9001/tcp + (optionally) a SOCKS port 
(9050/tcp by default).  In relay-mode, it just then routes the data onto 
the next Tor node somewhere out on the internet.

It can be allowed to be an "exit" point, which means
that the Tor relay will route the connection to its proper endpoint
(website, IRC server, etc) instead of another Tor node, but the 
"exit policy" is defined in the torrc config file.

The exit policy statement in the torrc config file determines
the services that Tor may connect to.  If the host firewall blocks
the ports before they get to Tor, then the users are simply told
that those destinations are down.  This is from the torrc.sample
file regarding exit policy configuration:

...
## If certain IPs and ports are blocked externally, e.g. by your firewall,
## you should update your exit policy to reflect this -- otherwise Tor
## users will be told that those destinations are down.
##
#ExitPolicy accept *:6660-6667,reject *:* # allow irc ports but no more
#ExitPolicy accept *:119 # accept nntp as well as default exit policy
#ExitPolicy reject *:* # no exits allowed
...


Are you suggesting just adding some firewall_context properties to the
smf profile similar to ssh?  That sounds reasonable if you think it makes
sense here.   I would prefer to NOT modify any of the actual Tor code
as that makes it harder to resync later.


> Services with no explicit firewall configuration, by default, will 
> inherit the global firewall policy which may not always be the desired 
> behavior.

If the global firewall policy is to block ports that Tor would either be 
listening
to or talking to, then Tor would just report that to the remote user as an
error or an unavailable service.

-Wyllys



Reply via email to