>On Friday, January 19th, 2024 at 5:04 PM, Jochen Bern <jochen.b...@binect.de> 
>wrote:


> On 19.01.24 13:59, Peter Davis via Openvpn-users wrote:
> 
> > I want to tunnel OpenVPN on Tor and I found the following iptables rules:
> > 
> > # export OVPN=tun0
> > # IPTABLES -A INPUT -i $OVPN -s 10.8.0.0/24 -m state --state NEW -j ACCEPT
> > # IPTABLES -t nat -A PREROUTING -i $OVPN -p udp --dport 53 -s 10.8.0.0/24 
> > -j DNAT --to-destination 10.8.0.1:53530
> > # IPTABLES -t nat -A PREROUTING -i $OVPN -p tcp -s 10.8.0.0/24 -j DNAT 
> > --to-destination 10.8.0.1:9040
> > # IPTABLES -t nat -A PREROUTING -i $OVPN -p udp -s 10.8.0.0/24 -j DNAT 
> > --to-destination 10.8.0.1:9040
> 
> 
> Please explain what your definition of "tunnel OpenVPN on Tor" is. These
> rules look rather like running the server's own Tor connection, the
> incoming traffic in particular, through the VPN(s) ("inside" and
> "outside" reversed WRT what your question implies when taken literally),
> and royally hosing any traffic normal VPN clients try to send through
> the server.
> 
> Kind regards,
> --
> Jochen Bern
> Systemingenieur
> 
> Binect GmbH
> _______________________________________________
> Openvpn-users mailing list
> Openvpn-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/openvpn-users

Hi,
When someone connects to this server with OpenVPN and uses the Internet, then 
all his\her Internet connections are tunneled through Tor.
I want to know which group of iptables rules are sufficient!


_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to