Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

add IPv6 support / port to nftables or Berkeley Packet Filter (BPF) #39

Open
adrelanos opened this issue Jan 30, 2017 · 1 comment
Open

Comments

@adrelanos
Copy link
Contributor

IPv6 is coming.

https://trac.torproject.org/projects/tor/ticket/21269

Having corridor support IPv6 would be of tremendous help leak testing Whonix if/when it gets added IPv6 supports / ported to nftables.

https://phabricator.whonix.org/T509

@rustybird
Copy link
Owner

The IPv6Traffic option discussed in that ticket only affects connections from the exit node to the destination host. For IPv6 connections between the tor client and the Tor network, there's ClientUseIPv6. It too is disabled by default, and not enabled by Tor Browser. Until that changes, corridor should probably continue to block all forwarded IPv6 traffic unconditionally.

But being able to also log the blocked IPv6 traffic would be helpful, indeed. We could add a $LOGGED6 environment variable selecting some IPv6 client addresses, like $LOGGED for IPv4. Or simplify things by changing $LOGGED to a list of incoming network interfaces (such as eth+ wlan0, or just + to match all) on which every kind of blocked traffic is logged for every client.

@adrelanos adrelanos changed the title add IPv6 support / port to nftables add IPv6 support / port to nftables or Berkeley Packet Filter (BPF) Dec 11, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants