From mboxrd@z Thu Jan 1 00:00:00 1970 From: "Secure-Mail User" Subject: tcp packets without uid Date: Sat, 05 May 2012 15:36:54 +0200 Message-ID: Reply-To: "Secure-Mail User" Mime-Version: 1.0 Content-Transfer-Encoding: 8bit Return-path: DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=secure-mail.biz; s=default; t=1336225016; bh=X1KZortbNRs8JzobdJkI1m9DeuYwgcWRLqJ11LTtljw=; l=1070; h=Date:MIME-Version:Message-ID:From:Subject:Reply-To:To: Content-Type:Content-Transfer-Encoding; b=1rwsK2EkfLF0Uhub2qbcs93/+8hSc0MwssIVm+6V1DnXxvYmKW3FSMR1u+NC6TSI4 jOz1Un9/mu8x3zT2vZUokMoPksmDqDk5nAmPvQagqpIvb4ADmBNQDXWPnPymOaEAiD hCM7DIhy1GmdD7C611IBIcLNTJ3l66lbYXVwHX5E= Content-Disposition: inline Sender: netfilter-owner@vger.kernel.org List-ID: Content-Type: text/plain; charset="us-ascii" To: netfilter@vger.kernel.org Hi List, I am trying to tweak my transparent tor-proxyfying netfilter setup (Tor Stable, Debian Wheezy, GNU/Linux, iptables v1.4.12.2, Kernel 3.2.0-amd64). So far, redirection and torification works fine. I have have several users, some of them have their TCP traffic redirected to Tor, some are allowed to send packets directly. It works splendid. There is just one issue. About every once or twice a second there is a tcp packet running along my filter (that is the iptables -t filter) table that has no associated UID. This is what those packets look like: IN= OUT=eth0 SRC=192.168.178.50 DST=some-target LEN=40 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=TCP SPT=50447 DPT=443 WINDOW=1002 RES=0x00 ACK URGP=0 Always 40 to 60 bytes. This packet is https, most likely generated by my firefox user when I was browsing a website. How is it possible for a packet not to have an associated uid? What am I missing? -- John ______________________________________________________ powered by Secure-Mail.biz - anonymous and secure e-mail accounts.