From: Peter Müller Date: Mon, 11 Mar 2019 20:07:00 +0000 (+0000) Subject: add IPtables chain for outgoing Tor traffic X-Git-Tag: v2.23-core131~119 X-Git-Url: http://git.ipfire.org/?p=ipfire-2.x.git;a=commitdiff_plain;h=5fc5f703470b37b43e18be66da0fb181696428a7 add IPtables chain for outgoing Tor traffic If Tor is operating in relay mode, it has to open a lot of outgoing TCP connections. These should be separated from any other outgoing connections, as allowing _all_ outgoing traffic will be unwanted and risky in most cases. Thereof, Tor will be running as a dedicated user (see second patch), allowing usage of user-based IPtables rulesets. Partially fixes #11779. Singed-off-by: Peter Müller Signed-off-by: Michael Tremer --- diff --git a/src/initscripts/packages/tor b/src/initscripts/packages/tor index 551538e2f6..754a2786f3 100644 --- a/src/initscripts/packages/tor +++ b/src/initscripts/packages/tor @@ -21,8 +21,11 @@ function setup_firewall() { # Flush all rules. flush_firewall + # Allow incoming traffic to Tor relay (and directory) port and + # all outgoing TCP connections from Tor user. if [ "${TOR_RELAY_ENABLED}" = "on" -a -n "${TOR_RELAY_PORT}" ]; then iptables -A TOR_INPUT -p tcp --dport "${TOR_RELAY_PORT}" -j ACCEPT + iptables -A TOR_OUTPUT -p tcp -m owner --uid-owner tor -j ACCEPT fi if [ "${TOR_RELAY_ENABLED}" = "on" -a -n "${TOR_RELAY_DIRPORT}" ] && [ "${TOR_RELAY_DIRPORT}" -ne 0 ]; then @@ -33,6 +36,7 @@ function setup_firewall() { function flush_firewall() { # Flush all rules. iptables -F TOR_INPUT + iptables -F TOR_OUTPUT } case "${1}" in diff --git a/src/initscripts/system/firewall b/src/initscripts/system/firewall index 2739a68343..cb533cc94b 100644 --- a/src/initscripts/system/firewall +++ b/src/initscripts/system/firewall @@ -294,9 +294,11 @@ iptables_init() { iptables -N OVPNINPUT iptables -A INPUT -j OVPNINPUT - # Tor + # Tor (inbound and outbound) iptables -N TOR_INPUT iptables -A INPUT -j TOR_INPUT + iptables -N TOR_OUTPUT + iptables -A OUTPUT -j TOR_OUTPUT # Jump into the actual firewall ruleset. iptables -N INPUTFW