Iptables configuration for a transparent proxy for a single user

coderman coderman at gmail.com
Sat May 16 22:14:06 UTC 2009


On Fri, May 15, 2009 at 2:00 PM, unknown <unknown at pgpru.com> wrote:
>... Any possible vulnerabilities here?

make sure control port is disabled or properly authenticated;
otherwise a good setup.

an improvement is white listing Tor process with direct access and all
other traffic is transparently re-routed through Tor. this protects
against attacks where embedded content or network filesystem based
URIs are used to initiate requests through a kernel subsystem or other
process not associated with the anonymous Tor network user. (this is a
relevant issue on Windows, less so unix like systems)

best regards,



More information about the tor-talk mailing list