[tor-talk] Linux kernel transproxy packet leak (w/ repro case + workaround)

Patrick Schleizer adrelanos at riseup.net
Wed Apr 9 19:30:48 UTC 2014


Mike Perry:
> At this point, you will see a FIN ACK or RST ACK packet appear in your
> tcpdump window. That packet has leaked past the iptables firewall rules,
> and past the transproxy rules. It went straight to Google.

Can you post an example log please how it's the tcpdump output is
looking when a leak has been detected?


More information about the tor-talk mailing list