this post was submitted on 30 Sep 2024
5 points (85.7% liked)
Tor - The Onion Router
1465 readers
1 users here now
Tips, tricks and information about the Tor network!
founded 4 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Thank you very much @qprimed@lemmy.ml ! indeed I saw in my nftables log tentative to 443 and 9001. ( I didn't find this in the
tor
doc ... )is this will do :
ip saddr 127.0.0.1 ip daddr 127.0.0.1 accept
?that will work. always test your FW rules after a change. never just trust it.
netcat is your friend for a quick test to port 9050/TCP from a different PC if you are listening on more than just the loopback. careful with the loopback source addy AFAIK there is no guarantee that local host traffic to
127.0.0.1
will be sourced from127.0.0.1
- I may be wrong here, but be safe.regardless, depending on your rules, you will either get a timeout, instant connection reset or connect. obviously connect is bad if you think the traffic should be blocked, refusal is ok as long as the daemon is actually running (FW on a non-listening port can generate a TCP RST so its somewhat ambiguous), timeout is best as you know as long as the host is up, the FW is likely dropping traffic.
a more comprehensive test against any local host would be done with nmap.
sounds like you are poking things with a stick - thats awesome! happy to help :-)
edit: clarify loopback.