Ports 443 & 80
morphium
morphium at morphium.info
Sun May 18 17:50:27 UTC 2008
why don't you set ORListenAddress to 0.0.0.0:443 and don't do anything
with your firewall?
2008/5/18, Nathaniel Dube <njdube at gmail.com>:
> I read somewhere that you can use ports 443 and 80 to help out people stuck
> behind really restrictive firewalls. I've been trying to manually configure
> Tor to do just that. I've configured the router for port forwaring. I'm
> pretty sure I did the same for my Linux firewall. I told the firewall to
> listen on ports 443/80 and redirect to 9090/9091. So the way I understand it
> is, Tor servers/clients should be trying to connect to ports 443/80 --> my
> router listens on 443/80 and bounces to my firewall --> my firewall listens
> to 443/80 and bounces to 9090/9091 which the tor server is really listening
> in on. I'm running openSUSE 10.3. I used yast to set the firewall. If I
> understand what I'm doing I use the "Masquerading" section to do firewall
> port forwaring. Which I'm pretty sure I did correctly but for some reason
> servers/clients are still unable to connect to my tor server.
>
> I could really use some help getting this working. I can get the normal ports
> working no problem and have my server join the tor network. It's when I try
> doing the port 443/80 trick that things get harry.
>
> Here are screenshots of my configuration screens I did for the port
> forwarding.
>
> http://img246.imageshack.us/img246/303/443zb6.png
> http://img265.imageshack.us/img265/1403/80xv7.png
> http://img253.imageshack.us/img253/483/yastmasqsm4.png
> http://img253.imageshack.us/img253/2820/yastrulesyl0.png
> http://img338.imageshack.us/img338/5127/routerpn3.png
>
> Here's portions of tor's config file. I Xed out stuff that might be
> considered a security risk on my part.
>
> SocksPort 9050
> SocksListenAddress 127.0.0.1
> DataDirectory /home/tor/.tor
> ControlPort 9051
>
> ORPort 443
> ORListenAddress 0.0.0.0:9090
> DirPort 80
> DirListenAddress 0.0.0.0:9091
>
> Also, here's the log when I run tor in Konsole as root. I know, don't run Tor
> as root. I'm just doing that to test it to make sure it's working before I
> set it to start on boot under the "tor" user.
>
> May 16 23:09:16.449 [notice] Tor v0.1.2.19. This is experimental software. Do
> not rely on it for strong anonymity.
> May 16 23:09:16.450 [notice] Initialized libevent version 1.3b using method
> epoll. Good.
> May 16 23:09:16.450 [notice] Opening OR listener on 0.0.0.0:9090
> May 16 23:09:16.450 [notice] Opening Directory listener on 0.0.0.0:9091
> May 16 23:09:16.450 [notice] Opening Socks listener on 127.0.0.1:9050
> May 16 23:09:16.450 [notice] Opening Control listener on 127.0.0.1:9051
> May 16 23:09:16.451 [warn] You are running Tor as root. You don't need to, and
> you probably shouldn't.
> May 16 23:09:16.642 [notice] Your Tor server's identity key fingerprint
> is 'XXXXXXXXXXXXXXXXXXX'
> May 16 23:09:18.240 [notice] We now have enough directory information to build
> circuits.
> May 16 23:09:18.438 [notice] Guessed our IP address as XXXXXXXXXXXXX.
> May 16 23:09:21.856 [notice] Tor has successfully opened a circuit. Looks like
> client functionality is working.
> May 16 23:09:21.856 [notice] Now checking whether ORPort XXXXXXX:443 and
> DirPort XXXXXXXXXXXX:80 are reachable... (this may take up to 20 minutes --
> look for log messages indicating success)
> May 16 23:29:18.900 [warn] Your server (XXXXXXXXXXX:443) has not managed to
> confirm that its ORPort is reachable. Please check your firewalls, ports,
> address, /etc/hosts file, etc.
> May 16 23:29:18.900 [warn] Your server (XXXXXXXXXX:80) has not managed to
> confirm that its DirPort is reachable. Please check your firewalls, ports,
> address, /etc/hosts file, etc.
>
More information about the tor-talk
mailing list