[tor-relays] Unbelieveable

Kurt Besig kbesig at socal.rr.com
Sun Dec 6 00:41:22 UTC 2015


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 12/5/2015 3:20 PM, Sean Greenslade wrote:
>>> Dec 05 21:17:46.000 [notice] Your IP address seems to have
>>> changed to 167.114.35.28 (METHOD=INTERFACE). Updating. Dec 05
>>> 21:17:46.000 [notice] Our IP Address has changed from
>>> 142.4.217.95 to 167.114.35.28; rebuilding descriptor (source:
>>> METHOD=INTERFACE). Dec 05 21:18:42.000 [notice] Your IP address
>>> seems to have changed to 142.4.217.95 (METHOD=GETHOSTNAME
>>> HOSTNAME=ca3.pulseservers.com). Updating. Dec 05 21:18:42.000
>>> [notice] Our IP Address has changed from 167.114.35.28 to
>>> 142.4.217.95; rebuilding descriptor (source: METHOD=GETHOSTNAME
>>> HOSTNAME=ca3.pulseservers.com). Dec 05 21:18:43.000 [notice]
>>> Self-testing indicates your ORPort is reachable from the
>>> outside. Excellent. Publishing server descriptor. Dec 05
>>> 21:38:37.000 [warn] Your server (142.4.217.95:9030) has not
>>> managed to confirm that its DirPort is reachable. Please check
>>> your firewalls, ports, address, /etc/hosts file, etc. Dec 05
>>> 21:58:37.000 [warn] Your server (142.4.217.95:9030) has not
>>> managed to confirm that its DirPort is reachable. Please check
>>> your firewalls, ports, address, /etc/hosts file, etc.
>> I've gotten this far, not being much good at networking I can't
>> tell where the problem lies.. do I need to forward something?
> Check your firewall, and gateway port forwards if the server is
> behind a NAT. If you're not sure where to start, post the output of
> "sudo iptables -L"
> 
> --Sean _______________________________________________ tor-relays
> mailing list tor-relays at lists.torproject.org 
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> 
I've made several iptables and saved them, I thought, however every
time I reboot the VPS all my rules are gone.
~$ sudo iptables -L
> Chain INPUT (policy ACCEPT) target     prot opt source
> destination
> 
> Chain FORWARD (policy ACCEPT) target     prot opt source
> destination
> 
> Chain OUTPUT (policy ACCEPT) target     prot opt source
> destination


but:
 cat /etc/iptables.rules
# Generated by iptables-save v1.4.21 on Fri Dec  4 04:30:56 2015
*raw
:PREROUTING ACCEPT [2424:210831]
:OUTPUT ACCEPT [1856:540218]
COMMIT
# Completed on Fri Dec  4 04:30:56 2015
# Generated by iptables-save v1.4.21 on Fri Dec  4 04:30:56 2015
*nat
:PREROUTING ACCEPT [229:8057]
:POSTROUTING ACCEPT [86:5885]
:OUTPUT ACCEPT [86:5885]
COMMIT
# Completed on Fri Dec  4 04:30:56 2015
# Generated by iptables-save v1.4.21 on Fri Dec  4 04:30:56 2015
*mangle
:PREROUTING ACCEPT [2424:210831]
:INPUT ACCEPT [2424:210831]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [1856:540218]
:POSTROUTING ACCEPT [1856:540218]
COMMIT
# Completed on Fri Dec  4 04:30:56 2015
# Generated by iptables-save v1.4.21 on Fri Dec  4 04:30:56 2015
*filter
:INPUT ACCEPT [0:0]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [581:184073]
- -A INPUT -i lo -j ACCEPT
- -A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
- -A INPUT -p tcp -m tcp --dport 80 -j ACCEPT
- -A INPUT -p tcp -m tcp --dport 443 -j ACCEPT
- -A INPUT -p tcp -m tcp --dport 9052 -j ACCEPT
- -A INPUT -p tcp -m tcp --dport 9051 -j ACCEPT
- -A INPUT -p tcp -m tcp --dport 9001 -j ACCEPT
- -A INPUT -p tcp -m tcp --dport 9030 -j ACCEPT
- -A INPUT -p tcp -m tcp --dport 22 -j ACCEPT
- -A INPUT -j DROP
COMMIT
# Completed on Fri Dec  4 04:30:56 2015


> 3:/etc/network$ cat interfaces # This configuration file is
> auto-generated. # # WARNING: Do not edit this file, your changes
> will be lost. # Please create/edit /etc/network/interfaces.head
> and # /etc/network/interfaces.tail instead, their contents will be 
> # inserted at the beginning and at the end of this file,
> respectively. # # NOTE: it is NOT guaranteed that the contents of
> /etc/network/interfaces.tail # will be at the very end of this
> file. #
> 
> # Auto generated lo interface auto lo iface lo inet loopback
> 
> # Auto generated venet0 interface auto venet0 iface venet0 inet
> manual up ifconfig venet0 up up ifconfig venet0 127.0.0.2 up route
> add default dev venet0 down route del default dev venet0 down
> ifconfig venet0 down
> 
> 
> iface venet0 inet6 manual up route -A inet6 add default dev venet0 
> down route -A inet6 del default dev venet0
> 
> auto venet0:0 iface venet0:0 inet static address 167.114.35.28 
> netmask 255.255.255.255

> cat sysctl.conf

> # Uncomment the next line to enable packet forwarding for IPv4 
> net.ipv4.ip_forward=1
> 
> # Uncomment the next line to enable packet forwarding for IPv6 #
> Enabling this option disables Stateless Address Autoconfiguration #
> based on Router Advertisements for this host 
> net.ipv6.conf.all.forwarding=1

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (MingW32)

iQEcBAEBAgAGBQJWY4QyAAoJEJQqkaGlFNDPpiEH/jpcbG8GurVjOsSDneOQvKU3
o9cY536TmP2J8+t+JgTfG5KVm/lL1jzBT6/NE62xkWMPrrrdRGx4mLLJJ+AKjTdJ
t+89gBgBdtBfaWtGu29XcgXh/wbWB9EDMZgkKi2iSh9CEVMC5uTZKPXtzslUl6Rk
aul1cObhhlzrOEBa3mR6CV5jiD5ikmF+l7iBCsc4vtYqK7ss91IHdndAxFlrWiJv
1dUZzkm7DrukwMhAmcFJmynQiQwNbiKRlysOmqqHl/f/HRvf4YJZwHYxDEUBo92L
A/4U4z/83OlhsDJQpD8a32QnYk3DRiP76jhwQjSS6vNqckMW0cf4CQZwhPnnp+g=
=42BP
-----END PGP SIGNATURE-----


More information about the tor-relays mailing list