Date: Tue, 11 Dec 2018 01:41:50 +0000 From: Hubert Hauser <hubot@mail.com> To: freebsd-hackers@freebsd.org Subject: Running Tor service in the jail environment Message-ID: <66526968-1446-c95e-629a-fb9e1b246111@mail.com>
next in thread | raw e-mail | index | archive | help
I want to torify my FreeBSD old machine purposed to mainly darknet activities. Should I worry about these errors during creating jail? |Warning: Some services already seem to be listening on all IP, (including 127.0.1.1) This may cause some confusion, here they are: root ntpd 58008 20 udp6 *:123 *:* root ntpd 58008 21 udp4 *:123 *:* root lpd 48726 6 tcp6 *:515 *:* root lpd 48726 7 tcp4 *:515 *:* Warning: Some services already seem to be listening on IP 192.168.1.105 This may cause some confusion, here they are: root ntpd 58008 23 udp4 192.168.1.105:123 *:* Warning: Some services already seem to be listening on all IP, (including 192.168.1.105) This may cause some confusion, here they are: root ntpd 58008 20 udp6 *:123 *:* root ntpd 58008 21 udp4 *:123 *:* root lpd 48726 6 tcp6 *:515 *:* root lpd 48726 7 tcp4 *:515 *:| Should jail have access to loopback interface and public Ethernet interface assuming that all traffic from this machine will be routed through Tor? Is it necessary to set up a virtual network interface to communicate between jails?
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?66526968-1446-c95e-629a-fb9e1b246111>