Hi,
How does a usable ipset (hash:ip,port) look like, so that it is a
whitelist for
in/out tcp connections? *Everything* else from/to the outside world is
assumed
to be dropped. (DNS too).
* dir auths from src/or/auth_dirs.inc
* fallback dirs from scripts/maint/fallback.whitelist
* current guard relays (parsed from a consensus file)
anything else?
Bonus question: how would you write this whitelist in iptables rules,
assuming you
have the complete ipset?
thanks
martin