From 0f00e12cdcbe1d0bb60d04eae0e557c6ddf21bb7 Mon Sep 17 00:00:00 2001 From: Nathan Freitas Date: Wed, 29 Jun 2016 10:01:42 -0400 Subject: [PATCH] move patches to external since that is what it is applied to (external code) --- external/patches/UDP-block.patch | 243 +++++++++++ .../orbot-patch-sporkbomb-20110501/Part 1.4 | 11 + ...transproxy_all-use_only_new_iptables.patch | 390 ++++++++++++++++++ .../orbot_leak_report | 110 +++++ external/patches/transproxy.patch | 0 external/patches/udptransproxyfinal.patch | 247 +++++++++++ .../ic_launcher_gibberbot.png | Bin 0 -> 7527 bytes .../update_GibberBot_info.diff | 285 +++++++++++++ 8 files changed, 1286 insertions(+) create mode 100644 external/patches/UDP-block.patch create mode 100644 external/patches/orbot-patch-sporkbomb-20110501/Part 1.4 create mode 100644 external/patches/orbot-patch-sporkbomb-20110501/orbot-real_transproxy_all-use_only_new_iptables.patch create mode 100644 external/patches/orbot-patch-sporkbomb-20110501/orbot_leak_report create mode 100644 external/patches/transproxy.patch create mode 100644 external/patches/udptransproxyfinal.patch create mode 100644 external/patches/update_GibberBot_info/ic_launcher_gibberbot.png create mode 100644 external/patches/update_GibberBot_info/update_GibberBot_info.diff diff --git a/external/patches/UDP-block.patch b/external/patches/UDP-block.patch new file mode 100644 index 00000000..e16a9574 --- /dev/null +++ b/external/patches/UDP-block.patch @@ -0,0 +1,243 @@ +From c2620d6939713762e30badc3ed5da981e296b742 Mon Sep 17 00:00:00 2001 +From: patch +Date: Mon, 23 Jul 2012 16:12:55 -0400 +Subject: [PATCH] Modified iptables rules for transproxying. UDP is now + blocked. Also removed some redundant rules and reordered + others. I reordered by the idea that its generally easier + to specifically allow traffic before your reject it. + +--- + .../torproject/android/service/TorTransProxy.java | 133 ++++++++++---------- + 1 file changed, 64 insertions(+), 69 deletions(-) + +diff --git a/src/org/torproject/android/service/TorTransProxy.java b/src/org/torproject/android/service/TorTransProxy.java +index 2571123..c248a9f 100644 +--- a/src/org/torproject/android/service/TorTransProxy.java ++++ b/src/org/torproject/android/service/TorTransProxy.java +@@ -224,6 +224,15 @@ public class TorTransProxy implements TorServiceConstants { + + int torUid = context.getApplicationInfo().uid; + ++ // Allow everything for Tor ++ script.append(ipTablesPath); ++ script.append(" -t filter"); ++ script.append(" -A OUTPUT"); ++ script.append(" -m owner --uid-owner "); ++ script.append(torUid); ++ script.append(" -j ACCEPT"); ++ script.append(" || exit\n"); ++ + //build up array of shell cmds to execute under one root context + for (TorifiedApp tApp:apps) + { +@@ -235,9 +244,9 @@ public class TorTransProxy implements TorServiceConstants { + { + + TorService.logMessage("enabling transproxy for app: " + tApp.getUsername() + "(" + tApp.getUid() + ")"); +- +- // Set up port redirection +- script.append(ipTablesPath); ++ ++ // Set up port redirection ++ script.append(ipTablesPath); + script.append(" -t nat"); + script.append(" -A OUTPUT -p tcp"); + script.append(" ! -d 127.0.0.1"); //allow access to localhost +@@ -251,14 +260,28 @@ public class TorTransProxy implements TorServiceConstants { + // Same for DNS + script.append(ipTablesPath); + script.append(" -t nat"); +- script.append(" -A OUTPUT -p udp -m owner --uid-owner "); ++ script.append(" -A OUTPUT -p udp"); ++ script.append(" -m owner --uid-owner "); + script.append(tApp.getUid()); + script.append(" -m udp --dport "); + script.append(STANDARD_DNS_PORT); + script.append(" -j REDIRECT --to-ports "); + script.append(TOR_DNS_PORT); + script.append(" || exit\n"); +- ++ ++ // Allow loopback ++ script.append(ipTablesPath); ++ script.append(" -t filter"); ++ script.append(" -A OUTPUT"); ++ script.append(" -m owner --uid-owner "); ++ script.append(tApp.getUid()); ++ script.append(" -o lo"); ++ script.append(" -j ACCEPT"); ++ script.append(" || exit\n"); ++ ++ /* ++ //Outgoing loopback already allowed (23/7/12) ++ + int[] ports = {TOR_DNS_PORT,TOR_TRANSPROXY_PORT,PORT_SOCKS,PORT_HTTP}; + + for (int port : ports) +@@ -276,53 +299,32 @@ public class TorTransProxy implements TorServiceConstants { + script.append(" -j ACCEPT"); + script.append(" || exit\n"); + } +- +- // Allow loopback ++ */ ++ ++ // Reject all other outbound TCP packets + script.append(ipTablesPath); + script.append(" -t filter"); + script.append(" -A OUTPUT"); + script.append(" -m owner --uid-owner "); + script.append(tApp.getUid()); + script.append(" -p tcp"); +- script.append(" -o lo"); +- script.append(" -j ACCEPT"); +- script.append(" || exit\n"); +- +- // Reject DNS that is not from Tor (order is important - first matched rule counts!) +- script.append(ipTablesPath); +- script.append(" -t filter"); +- script.append(" -A OUTPUT"); +- script.append(" -m owner --uid-owner "); +- script.append(tApp.getUid()); +- script.append(" -p udp"); +- script.append(" --dport "); +- script.append(STANDARD_DNS_PORT); + script.append(" -j REJECT"); + script.append(" || exit\n"); +- +- // Reject all other outbound TCP packets ++ ++ // Reject all other outbound UDP packets + script.append(ipTablesPath); + script.append(" -t filter"); + script.append(" -A OUTPUT"); + script.append(" -m owner --uid-owner "); + script.append(tApp.getUid()); +- script.append(" -p tcp"); ++ script.append(" -p udp"); + script.append(" -j REJECT"); + script.append(" || exit\n"); ++ + + } + } +- + +- // Allow everything for Tor +- script.append(ipTablesPath); +- script.append(" -t filter"); +- script.append(" -A OUTPUT"); +- script.append(" -m owner --uid-owner "); +- script.append(torUid); +- script.append(" -j ACCEPT"); +- script.append(" || exit\n"); +- + String[] cmdAdd = {script.toString()}; + + code = TorServiceUtils.doShellCommand(cmdAdd, res, runRoot, waitFor); +@@ -450,8 +452,8 @@ public class TorTransProxy implements TorServiceConstants { + + int torUid = context.getApplicationInfo().uid; + +- // Set up port redirection +- script.append(ipTablesPath); ++ // Set up port redirection ++ script.append(ipTablesPath); + script.append(" -t nat"); + script.append(" -A OUTPUT -p tcp"); + script.append(" ! -d 127.0.0.1"); //allow access to localhost +@@ -465,14 +467,36 @@ public class TorTransProxy implements TorServiceConstants { + // Same for DNS + script.append(ipTablesPath); + script.append(" -t nat"); +- script.append(" -A OUTPUT -p udp -m owner ! --uid-owner "); ++ script.append(" -A OUTPUT -p udp"); ++ script.appent(" -m owner ! --uid-owner "); + script.append(torUid); + script.append(" -m udp --dport "); + script.append(STANDARD_DNS_PORT); + script.append(" -j REDIRECT --to-ports "); + script.append(TOR_DNS_PORT); + script.append(" || exit\n"); ++ ++ // Allow loopback ++ script.append(ipTablesPath); ++ script.append(" -t filter"); ++ script.append(" -A OUTPUT"); ++ script.append(" -o lo"); ++ script.append(" -j ACCEPT"); ++ script.append(" || exit\n"); + ++ // Allow everything for Tor ++ script.append(ipTablesPath); ++ script.append(" -t filter"); ++ script.append(" -A OUTPUT"); ++ script.append(" -m owner --uid-owner "); ++ script.append(torUid); ++ script.append(" -j ACCEPT"); ++ script.append(" || exit\n"); ++ ++ ++ /* ++ //Outgoing loopback already allowed (23/7/12) ++ + int[] ports = {TOR_DNS_PORT,TOR_TRANSPROXY_PORT,PORT_SOCKS,PORT_HTTP}; + + for (int port : ports) +@@ -490,25 +514,8 @@ public class TorTransProxy implements TorServiceConstants { + script.append(" -j ACCEPT"); + script.append(" || exit\n"); + +- } +- +- // Allow loopback +- script.append(ipTablesPath); +- script.append(" -t filter"); +- script.append(" -A OUTPUT"); +- script.append(" -p tcp"); +- script.append(" -o lo"); +- script.append(" -j ACCEPT"); +- script.append(" || exit\n"); ++ } */ + +- // Allow everything for Tor +- script.append(ipTablesPath); +- script.append(" -t filter"); +- script.append(" -A OUTPUT"); +- script.append(" -m owner --uid-owner "); +- script.append(torUid); +- script.append(" -j ACCEPT"); +- script.append(" || exit\n"); + + if (TorService.ENABLE_DEBUG_LOG) + { +@@ -532,23 +539,11 @@ public class TorTransProxy implements TorServiceConstants { + script.append(" --log-uid"); + script.append(" || exit\n"); + } +- +- // Reject DNS that is not from Tor (order is important - first matched rule counts!) +- script.append(ipTablesPath); +- script.append(" -t filter"); +- script.append(" -A OUTPUT"); +- script.append(" -p udp"); +- script.append(" --dport "); +- script.append(STANDARD_DNS_PORT); +- script.append(" -j REJECT"); +- script.append(" || exit\n"); +- +- // Reject all other outbound TCP packets ++ ++ // Reject all other outbound packets by default + script.append(ipTablesPath); + script.append(" -t filter"); +- script.append(" -A OUTPUT"); +- script.append(" -p tcp"); +- script.append(" -j REJECT"); ++ script.append(" -P OUTPUT DROP"); + script.append(" || exit\n"); + + String[] cmdAdd = {script.toString()}; +-- +1.7.9.5 + diff --git a/external/patches/orbot-patch-sporkbomb-20110501/Part 1.4 b/external/patches/orbot-patch-sporkbomb-20110501/Part 1.4 new file mode 100644 index 00000000..002bdb96 --- /dev/null +++ b/external/patches/orbot-patch-sporkbomb-20110501/Part 1.4 @@ -0,0 +1,11 @@ +_______________________________________________ +Guardian-dev mailing list + +Post: Guardian-dev@lists.mayfirst.org +List info: https://lists.mayfirst.org/mailman/listinfo/guardian-dev + +To Unsubscribe + Send email to: Guardian-dev-unsubscribe@lists.mayfirst.org + Or visit: https://lists.mayfirst.org/mailman/options/guardian-dev/nathan%40guardianproject.info + +You are subscribed as: nathan@guardianproject.info diff --git a/external/patches/orbot-patch-sporkbomb-20110501/orbot-real_transproxy_all-use_only_new_iptables.patch b/external/patches/orbot-patch-sporkbomb-20110501/orbot-real_transproxy_all-use_only_new_iptables.patch new file mode 100644 index 00000000..60635b48 --- /dev/null +++ b/external/patches/orbot-patch-sporkbomb-20110501/orbot-real_transproxy_all-use_only_new_iptables.patch @@ -0,0 +1,390 @@ +Index: src/org/torproject/android/service/TorService.java +=================================================================== +--- src/org/torproject/android/service/TorService.java (revision 24697) ++++ src/org/torproject/android/service/TorService.java (working copy) +@@ -710,10 +710,36 @@ + + if (enableTransparentProxy) + { +- showAlert("Status", "Setting up transparent proxying..."); +- +- //TorTransProxy.setDNSProxying(); +- int code = TorTransProxy.setTransparentProxyingByApp(this,AppManager.getApps(this),transProxyAll); ++ //TODO: Find a nice place for the next (commented) line ++ //TorTransProxy.setDNSProxying(); ++ ++ int code = 0; // Default state is "okay" ++ ++ if(transProxyPortFallback) ++ { ++ showAlert("Status", "Setting up port-based transparent proxying..."); ++ StringTokenizer st = new StringTokenizer(portProxyList, ","); ++ int status = code; ++ while (st.hasMoreTokens()) ++ { ++ status = TorTransProxy.setTransparentProxyingByPort(this, Integer.parseInt(st.nextToken())); ++ if(status != 0) ++ code = status; ++ } ++ } ++ else ++ { ++ if(transProxyAll) ++ { ++ showAlert("Status", "Setting up full transparent proxying..."); ++ code = TorTransProxy.setTransparentProxyingAll(this); ++ } ++ else ++ { ++ showAlert("Status", "Setting up app-based transparent proxying..."); ++ code = TorTransProxy.setTransparentProxyingByApp(this,AppManager.getApps(this),transProxyAll); ++ } ++ } + + TorService.logMessage ("TorTransProxy resp code: " + code); + +@@ -725,17 +751,7 @@ + { + showAlert("Status", "WARNING: error starting transparent proxying!"); + } +- +- //this is for Androids w/o owner module support as a circumvention only fallback +- if (transProxyPortFallback) +- { +- StringTokenizer st = new StringTokenizer(portProxyList, ","); +- +- while (st.hasMoreTokens()) +- TorTransProxy.setTransparentProxyingByPort(this, Integer.parseInt(st.nextToken())); +- +- } +- ++ + return true; + + } +Index: src/org/torproject/android/service/TorTransProxy.java +=================================================================== +--- src/org/torproject/android/service/TorTransProxy.java (revision 24697) ++++ src/org/torproject/android/service/TorTransProxy.java (working copy) +@@ -136,8 +136,6 @@ + //redirectDNSResolvConf(); //not working yet + + String ipTablesPath = new File(context.getDir("bin", 0),"iptables").getAbsolutePath(); +- +- boolean ipTablesOld = false; + + StringBuilder script = new StringBuilder(); + +@@ -145,14 +143,12 @@ + int code = -1; + + purgeIptables(context); +- +- script = new StringBuilder(); +- ++ + //build up array of shell cmds to execute under one root context + for (int i = 0; i < apps.length; i++) + { + +- if (forceAll || apps[i].isTorified()) //if "Tor Everything" on or app is set to true ++ if (apps[i].isTorified()) //if app is set to true + { + + if (apps[i].getUsername().equals(TorServiceConstants.TOR_APP_USERNAME)) +@@ -170,14 +166,8 @@ + script.append(" -m owner --uid-owner "); + script.append(apps[i].getUid()); + script.append(" -m tcp --syn"); +- +- if (ipTablesOld) +- script.append(" -j DNAT --to 127.0.0.1:"); +- else +- script.append(" -j REDIRECT --to-ports "); +- ++ script.append(" -j REDIRECT --to-ports "); + script.append(TOR_TRANSPROXY_PORT); +- + script.append(" || exit\n"); + + //DNS +@@ -187,57 +177,37 @@ + script.append(apps[i].getUid()); + script.append(" -m udp --dport "); + script.append(STANDARD_DNS_PORT); ++ script.append(" -j REDIRECT --to-ports "); ++ script.append(TOR_DNS_PORT); ++ script.append(" || exit\n"); + +- if (ipTablesOld) +- script.append(" -j DNAT --to 127.0.0.1:"); +- else +- script.append(" -j REDIRECT --to-ports "); ++ script.append(ipTablesPath); ++ script.append(" -t filter"); ++ script.append(" -A OUTPUT -p tcp"); ++ script.append(" -m owner --uid-owner "); ++ script.append(apps[i].getUid()); ++ script.append(" -m tcp --dport "); ++ script.append(TOR_TRANSPROXY_PORT); ++ script.append(" -j ACCEPT"); ++ script.append(" || exit\n"); + ++ script.append(ipTablesPath); ++ script.append(" -t filter"); ++ script.append(" -A OUTPUT -p udp"); ++ script.append(" -m owner --uid-owner "); ++ script.append(apps[i].getUid()); ++ script.append(" -m udp --dport "); + script.append(TOR_DNS_PORT); +- ++ script.append(" -j ACCEPT"); + script.append(" || exit\n"); ++ ++ script.append(ipTablesPath); ++ script.append(" -t filter -A OUTPUT -m owner --uid-owner "); ++ script.append(apps[i].getUid()); ++ script.append(" -j DROP"); //drop all other packets as Tor won't handle them ++ script.append(" || exit\n"); + + +- if (ipTablesOld) //for some reason this doesn't work on iptables 1.3.7 +- { +- script.append(ipTablesPath); +- script.append(" -t nat"); +- script.append(" -A OUTPUT -m owner --uid-owner "); +- script.append(apps[i].getUid()); +- script.append(" -j DROP"); +- script.append(" || exit\n"); +- } +- else +- { +- script.append(ipTablesPath); +- script.append(" -t filter"); +- script.append(" -A OUTPUT -p tcp"); +- script.append(" -m owner --uid-owner "); +- script.append(apps[i].getUid()); +- script.append(" -m tcp --dport "); +- script.append(TOR_TRANSPROXY_PORT); +- script.append(" -j ACCEPT"); +- script.append(" || exit\n"); +- +- script.append(ipTablesPath); +- script.append(" -t filter"); +- script.append(" -A OUTPUT -p udp"); +- script.append(" -m owner --uid-owner "); +- script.append(apps[i].getUid()); +- script.append(" -m udp --dport "); +- script.append(TOR_DNS_PORT); +- script.append(" -j ACCEPT"); +- script.append(" || exit\n"); +- +- script.append(ipTablesPath); +- script.append(" -t filter -A OUTPUT -m owner --uid-owner "); +- script.append(apps[i].getUid()); +- script.append(" -j DROP"); //drop all other packets as Tor won't handle them +- script.append(" || exit\n"); +- +- } +- +- + } + } + +@@ -260,20 +230,13 @@ + + //String baseDir = context.getDir("bin",0).getAbsolutePath() + '/'; + String ipTablesPath = new File(context.getDir("bin", 0),"iptables").getAbsolutePath(); +- +- boolean ipTablesOld = false; + + StringBuilder script = new StringBuilder(); + + StringBuilder res = new StringBuilder(); + int code = -1; +- +- String[] cmdFlush = {script.toString()}; +- code = TorServiceUtils.doShellCommand(cmdFlush, res, true, true); +- //String msg = res.toString(); //get stdout from command ++ purgeIptables(context); + +- script = new StringBuilder(); +- + //TCP + //iptables -t nat -A PREROUTING -i eth0 -p tcp --dport $srcPortNumber -j REDIRECT --to-port $dstPortNumbe + +@@ -283,14 +246,8 @@ + script.append(" --dport "); + script.append(port); + //script.append(" -m tcp --syn"); +- +- if (ipTablesOld) +- script.append(" -j DNAT --to 127.0.0.1:"); +- else +- script.append(" -j REDIRECT --to-ports "); +- ++ script.append(" -j REDIRECT --to-ports "); + script.append(TOR_TRANSPROXY_PORT); +- + script.append(" || exit\n"); + + script.append(ipTablesPath); +@@ -298,14 +255,8 @@ + script.append(" -A OUTPUT -p udp"); + script.append(" --dport "); + script.append(port); +- +- if (ipTablesOld) +- script.append(" -j DNAT --to 127.0.0.1:"); +- else +- script.append(" -j REDIRECT --to-ports "); +- ++ script.append(" -j REDIRECT --to-ports "); + script.append(TOR_TRANSPROXY_PORT); +- + script.append(" || exit\n"); + + //DNS +@@ -314,24 +265,134 @@ + script.append(" -A OUTPUT -p udp "); + script.append(" -m udp --dport "); + script.append(STANDARD_DNS_PORT); ++ script.append(" -j REDIRECT --to-ports "); ++ script.append(TOR_DNS_PORT); ++ script.append(" || exit\n"); + +- if (ipTablesOld) +- script.append(" -j DNAT --to 127.0.0.1:"); +- else +- script.append(" -j REDIRECT --to-ports "); ++ ++ String[] cmdAdd = {script.toString()}; ++ code = TorServiceUtils.doShellCommand(cmdAdd, res, true, true); ++ String msg = res.toString(); ++ TorService.logMessage(cmdAdd[0] + ";errCode=" + code + ";resp=" + msg); + ++ return code; ++ } ++ ++ public static int setTransparentProxyingAll(Context context) throws Exception { ++ boolean runRoot = true; ++ boolean waitFor = true; ++ ++ //android.os.Debug.waitForDebugger(); ++ ++ //redirectDNSResolvConf(); //not working yet ++ ++ String ipTablesPath = new File(context.getDir("bin", 0),"iptables").getAbsolutePath(); ++ ++ StringBuilder script = new StringBuilder(); ++ ++ StringBuilder res = new StringBuilder(); ++ int code = -1; ++ ++ purgeIptables(context); ++ ++ int torUid = context.getApplicationInfo().uid; ++ ++ // Set up port redirection ++ script.append(ipTablesPath); ++ script.append(" -t nat"); ++ script.append(" -A OUTPUT -p tcp"); ++ script.append(" -m owner ! --uid-owner "); ++ script.append(torUid); ++ script.append(" -m tcp --syn"); ++ script.append(" -j REDIRECT --to-ports "); ++ script.append(TOR_TRANSPROXY_PORT); ++ script.append(" || exit\n"); ++ ++ // Same for DNS ++ script.append(ipTablesPath); ++ script.append(" -t nat"); ++ script.append(" -A OUTPUT -p udp -m owner ! --uid-owner "); ++ script.append(torUid); ++ script.append(" -m udp --dport "); ++ script.append(STANDARD_DNS_PORT); ++ script.append(" -j REDIRECT --to-ports "); + script.append(TOR_DNS_PORT); ++ script.append(" || exit\n"); + ++ // Allow packets to localhost (contains all the port-redirected ones) ++ script.append(ipTablesPath); ++ script.append(" -t filter"); ++ script.append(" -A OUTPUT"); ++ script.append(" -p tcp"); ++ script.append(" -d 127.0.0.1"); ++ script.append(" -j ACCEPT"); + script.append(" || exit\n"); + ++ // Allow loopback ++ script.append(ipTablesPath); ++ script.append(" -t filter"); ++ script.append(" -A OUTPUT"); ++ script.append(" -p tcp"); ++ script.append(" -o lo"); ++ script.append(" -j ACCEPT"); ++ script.append(" || exit\n"); ++ ++ // Allow everything for Tor ++ script.append(ipTablesPath); ++ script.append(" -t filter"); ++ script.append(" -A OUTPUT"); ++ script.append(" -m owner --uid-owner "); ++ script.append(torUid); ++ script.append(" -j ACCEPT"); ++ script.append(" || exit\n"); ++ ++ //XXX: Comment the following rules for non-debug builds ++ script.append(ipTablesPath); ++ script.append(" -t filter"); ++ script.append(" -A OUTPUT"); ++ script.append(" -p udp"); ++ script.append(" --dport "); ++ script.append(STANDARD_DNS_PORT); ++ script.append(" -j LOG"); ++ script.append(" --log-prefix='ORBOT_DNSLEAK_PROTECTION'"); ++ script.append(" --log-uid"); ++ script.append(" || exit\n"); ++ script.append(ipTablesPath); ++ script.append(" -t filter"); ++ script.append(" -A OUTPUT"); ++ script.append(" -p tcp"); ++ script.append(" -j LOG"); ++ script.append(" --log-prefix='ORBOT_TCPLEAK_PROTECTION'"); ++ script.append(" --log-uid"); ++ script.append(" || exit\n"); ++ ++ ++ // Reject DNS that is not from Tor (order is important - first matched rule counts!) ++ script.append(ipTablesPath); ++ script.append(" -t filter"); ++ script.append(" -A OUTPUT"); ++ script.append(" -p udp"); ++ script.append(" --dport "); ++ script.append(STANDARD_DNS_PORT); ++ script.append(" -j REJECT"); ++ script.append(" || exit\n"); ++ ++ // Reject all other outbound TCP packets ++ script.append(ipTablesPath); ++ script.append(" -t filter"); ++ script.append(" -A OUTPUT"); ++ script.append(" -p tcp"); ++ script.append(" -j REJECT"); ++ script.append(" || exit\n"); ++ ++ String[] cmdAdd = {script.toString()}; + +- String[] cmdAdd = {script.toString()}; +- code = TorServiceUtils.doShellCommand(cmdAdd, res, true, true); ++ code = TorServiceUtils.doShellCommand(cmdAdd, res, runRoot, waitFor); + String msg = res.toString(); + TorService.logMessage(cmdAdd[0] + ";errCode=" + code + ";resp=" + msg); + +- return code; +- } ++ return code; ++ } + + + } diff --git a/external/patches/orbot-patch-sporkbomb-20110501/orbot_leak_report b/external/patches/orbot-patch-sporkbomb-20110501/orbot_leak_report new file mode 100644 index 00000000..8f61a1f7 --- /dev/null +++ b/external/patches/orbot-patch-sporkbomb-20110501/orbot_leak_report @@ -0,0 +1,110 @@ +<4>[ 115.319671] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=9997 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK URGP=0 UID=10035 GID=10035 +<4>[ 115.482788] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=64 TOS=0x00 PREC=0x00 TTL=64 ID=9998 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK URGP=0 UID=10035 GID=10035 +<4>[ 116.037658] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=64 TOS=0x00 PREC=0x00 TTL=64 ID=9999 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK URGP=0 UID=10035 GID=10035 +<4>[ 116.699127] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10000 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH URGP=0 UID=10035 GID=10035 +<4>[ 116.724517] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10001 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 UID=10035 GID=10035 +<4>[ 116.922515] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=91 TOS=0x00 PREC=0x00 TTL=64 ID=10002 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 117.330810] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10003 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 118.150726] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10004 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 118.903320] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=91 TOS=0x00 PREC=0x00 TTL=64 ID=10005 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 119.310729] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10006 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 120.130737] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10007 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 121.770690] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10008 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 122.695465] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=91 TOS=0x00 PREC=0x00 TTL=64 ID=10009 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 123.100708] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10010 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 123.920684] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10011 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 125.565673] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10012 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 128.840789] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10013 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 130.366333] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=91 TOS=0x00 PREC=0x00 TTL=64 ID=10014 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 130.785339] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10015 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 131.600799] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10016 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 132.835144] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=87.238.52.70 LEN=249 TOS=0x00 PREC=0x00 TTL=64 ID=50247 DF PROTO=TCP SPT=53939 DPT=993 WINDOW=32044 RES=0x00 ACK PSH URGP=0 UID=10053 GID=10053 +<4>[ 133.240753] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10017 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 133.410705] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=87.238.52.70 LEN=249 TOS=0x00 PREC=0x00 TTL=64 ID=50248 DF PROTO=TCP SPT=53939 DPT=993 WINDOW=32044 RES=0x00 ACK PSH URGP=0 UID=10053 GID=10053 +<4>[ 133.443481] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=87.238.52.70 LEN=261 TOS=0x00 PREC=0x00 TTL=64 ID=50249 DF PROTO=TCP SPT=53939 DPT=993 WINDOW=32044 RES=0x00 ACK PSH URGP=0 UID=10053 GID=10053 +<4>[ 134.031341] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=87.238.52.70 LEN=249 TOS=0x00 PREC=0x00 TTL=64 ID=50250 DF PROTO=TCP SPT=53939 DPT=993 WINDOW=32044 RES=0x00 ACK PSH URGP=0 UID=10053 GID=10053 +<4>[ 134.782196] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=87.238.52.70 LEN=261 TOS=0x00 PREC=0x00 TTL=64 ID=50251 DF PROTO=TCP SPT=53939 DPT=993 WINDOW=32044 RES=0x00 ACK PSH URGP=0 UID=10053 GID=10053 +<4>[ 135.360778] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=87.238.52.70 LEN=249 TOS=0x00 PREC=0x00 TTL=64 ID=50252 DF PROTO=TCP SPT=53939 DPT=993 WINDOW=32044 RES=0x00 ACK PSH URGP=0 UID=10053 GID=10053 +<4>[ 136.520782] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10018 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 136.526306] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=87.238.52.70 LEN=249 TOS=0x00 PREC=0x00 TTL=64 ID=50253 DF PROTO=TCP SPT=53939 DPT=993 WINDOW=32044 RES=0x00 ACK PSH URGP=0 UID=10053 GID=10053 +<4>[ 137.334716] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=87.238.52.70 LEN=261 TOS=0x00 PREC=0x00 TTL=64 ID=50254 DF PROTO=TCP SPT=53939 DPT=993 WINDOW=32044 RES=0x00 ACK PSH URGP=0 UID=10053 GID=10053 +<4>[ 137.915832] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=87.238.52.70 LEN=249 TOS=0x00 PREC=0x00 TTL=64 ID=50255 DF PROTO=TCP SPT=53939 DPT=993 WINDOW=32044 RES=0x00 ACK PSH URGP=0 UID=10053 GID=10053 +<4>[ 139.075378] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=87.238.52.70 LEN=249 TOS=0x00 PREC=0x00 TTL=64 ID=50256 DF PROTO=TCP SPT=53939 DPT=993 WINDOW=32044 RES=0x00 ACK PSH URGP=0 UID=10053 GID=10053 +<4>[ 140.435913] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=91 TOS=0x00 PREC=0x00 TTL=64 ID=10019 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 140.850799] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10020 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 141.395019] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=87.238.52.70 LEN=249 TOS=0x00 PREC=0x00 TTL=64 ID=50257 DF PROTO=TCP SPT=53939 DPT=993 WINDOW=32044 RES=0x00 ACK PSH URGP=0 UID=10053 GID=10053 +<4>[ 141.675140] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10021 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 142.455352] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=87.238.52.70 LEN=261 TOS=0x00 PREC=0x00 TTL=64 ID=50258 DF PROTO=TCP SPT=53939 DPT=993 WINDOW=32044 RES=0x00 ACK PSH URGP=0 UID=10053 GID=10053 +<4>[ 143.030792] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=87.238.52.70 LEN=249 TOS=0x00 PREC=0x00 TTL=64 ID=50259 DF PROTO=TCP SPT=53939 DPT=993 WINDOW=32044 RES=0x00 ACK PSH URGP=0 UID=10053 GID=10053 +<4>[ 143.310852] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10022 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 144.190734] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=87.238.52.70 LEN=249 TOS=0x00 PREC=0x00 TTL=64 ID=50260 DF PROTO=TCP SPT=53939 DPT=993 WINDOW=32044 RES=0x00 ACK PSH URGP=0 UID=10053 GID=10053 +<4>[ 146.510803] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=87.238.52.70 LEN=249 TOS=0x00 PREC=0x00 TTL=64 ID=50261 DF PROTO=TCP SPT=53939 DPT=993 WINDOW=32044 RES=0x00 ACK PSH URGP=0 UID=10053 GID=10053 +<4>[ 146.590789] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10023 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 151.150726] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=87.238.52.70 LEN=249 TOS=0x00 PREC=0x00 TTL=64 ID=50262 DF PROTO=TCP SPT=53939 DPT=993 WINDOW=32044 RES=0x00 ACK PSH URGP=0 UID=10053 GID=10053 +<4>[ 151.166290] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=91 TOS=0x00 PREC=0x00 TTL=64 ID=10024 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 151.570739] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10025 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 152.390686] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10026 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 152.694427] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=87.238.52.70 LEN=261 TOS=0x00 PREC=0x00 TTL=64 ID=50263 DF PROTO=TCP SPT=53939 DPT=993 WINDOW=32044 RES=0x00 ACK PSH URGP=0 UID=10053 GID=10053 +<4>[ 153.270721] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=87.238.52.70 LEN=249 TOS=0x00 PREC=0x00 TTL=64 ID=50264 DF PROTO=TCP SPT=53939 DPT=993 WINDOW=32044 RES=0x00 ACK PSH URGP=0 UID=10053 GID=10053 +<4>[ 154.030731] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10027 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 154.430694] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=87.238.52.70 LEN=249 TOS=0x00 PREC=0x00 TTL=64 ID=50265 DF PROTO=TCP SPT=53939 DPT=993 WINDOW=32044 RES=0x00 ACK PSH URGP=0 UID=10053 GID=10053 +<4>[ 156.750701] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=87.238.52.70 LEN=249 TOS=0x00 PREC=0x00 TTL=64 ID=50266 DF PROTO=TCP SPT=53939 DPT=993 WINDOW=32044 RES=0x00 ACK PSH URGP=0 UID=10053 GID=10053 +<4>[ 157.310699] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10028 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 160.383117] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=91 TOS=0x00 PREC=0x00 TTL=64 ID=10029 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 160.790832] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10030 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 161.390716] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=87.238.52.70 LEN=249 TOS=0x00 PREC=0x00 TTL=64 ID=50267 DF PROTO=TCP SPT=53939 DPT=993 WINDOW=32044 RES=0x00 ACK PSH URGP=0 UID=10053 GID=10053 +<4>[ 161.610717] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10031 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 163.250701] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10032 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 166.531494] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10033 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 170.670715] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=87.238.52.70 LEN=249 TOS=0x00 PREC=0x00 TTL=64 ID=50268 DF PROTO=TCP SPT=53939 DPT=993 WINDOW=32044 RES=0x00 ACK PSH URGP=0 UID=10053 GID=10053 +<4>[ 170.842285] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=91 TOS=0x00 PREC=0x00 TTL=64 ID=10034 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 171.250732] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10035 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 172.070800] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10036 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 173.309783] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=87.238.52.70 LEN=261 TOS=0x00 PREC=0x00 TTL=64 ID=50269 DF PROTO=TCP SPT=53939 DPT=993 WINDOW=32044 RES=0x00 ACK PSH URGP=0 UID=10053 GID=10053 +<4>[ 173.710784] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10037 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 173.880828] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=87.238.52.70 LEN=249 TOS=0x00 PREC=0x00 TTL=64 ID=50270 DF PROTO=TCP SPT=53939 DPT=993 WINDOW=32044 RES=0x00 ACK PSH URGP=0 UID=10053 GID=10053 +<4>[ 175.040710] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=87.238.52.70 LEN=249 TOS=0x00 PREC=0x00 TTL=64 ID=50271 DF PROTO=TCP SPT=53939 DPT=993 WINDOW=32044 RES=0x00 ACK PSH URGP=0 UID=10053 GID=10053 +<4>[ 176.990692] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10038 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 177.360687] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=87.238.52.70 LEN=249 TOS=0x00 PREC=0x00 TTL=64 ID=50272 DF PROTO=TCP SPT=53939 DPT=993 WINDOW=32044 RES=0x00 ACK PSH URGP=0 UID=10053 GID=10053 +<4>[ 181.682952] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=91 TOS=0x00 PREC=0x00 TTL=64 ID=10039 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 182.000701] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=87.238.52.70 LEN=249 TOS=0x00 PREC=0x00 TTL=64 ID=50273 DF PROTO=TCP SPT=53939 DPT=993 WINDOW=32044 RES=0x00 ACK PSH URGP=0 UID=10053 GID=10053 +<4>[ 182.090698] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10040 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 182.910797] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10041 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 184.550689] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10042 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 187.830749] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10043 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 191.280700] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=87.238.52.70 LEN=249 TOS=0x00 PREC=0x00 TTL=64 ID=50274 DF PROTO=TCP SPT=53939 DPT=993 WINDOW=32044 RES=0x00 ACK PSH URGP=0 UID=10053 GID=10053 +<4>[ 193.917053] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=91 TOS=0x00 PREC=0x00 TTL=64 ID=10044 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 194.330749] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10045 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 195.150695] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10046 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 196.790679] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10047 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 200.070709] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10048 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 201.567718] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=91 TOS=0x00 PREC=0x00 TTL=64 ID=10049 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 201.970703] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10050 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 202.790771] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10051 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 204.430816] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10052 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 207.710693] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10053 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 209.840789] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=87.238.52.70 LEN=249 TOS=0x00 PREC=0x00 TTL=64 ID=50275 DF PROTO=TCP SPT=53939 DPT=993 WINDOW=32044 RES=0x00 ACK PSH URGP=0 UID=10053 GID=10053 +<4>[ 212.362884] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=91 TOS=0x00 PREC=0x00 TTL=64 ID=10054 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 212.770812] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10055 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 213.590698] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10056 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 215.235809] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10057 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 217.285766] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=87.238.52.70 LEN=261 TOS=0x00 PREC=0x00 TTL=64 ID=50276 DF PROTO=TCP SPT=53939 DPT=993 WINDOW=32044 RES=0x00 ACK PSH URGP=0 UID=10053 GID=10053 +<4>[ 217.860687] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=87.238.52.70 LEN=249 TOS=0x00 PREC=0x00 TTL=64 ID=50277 DF PROTO=TCP SPT=53939 DPT=993 WINDOW=32044 RES=0x00 ACK PSH URGP=0 UID=10053 GID=10053 +<4>[ 218.510803] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10058 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 219.020721] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=87.238.52.70 LEN=249 TOS=0x00 PREC=0x00 TTL=64 ID=50278 DF PROTO=TCP SPT=53939 DPT=993 WINDOW=32044 RES=0x00 ACK PSH URGP=0 UID=10053 GID=10053 +<4>[ 220.840667] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.101 LEN=40 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=TCP SPT=40218 DPT=80 WINDOW=0 RES=0x00 RST URGP=0 +<4>[ 220.842559] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.101 LEN=40 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=TCP SPT=40218 DPT=80 WINDOW=0 RES=0x00 RST URGP=0 +<4>[ 220.844512] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.101 LEN=40 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=TCP SPT=40218 DPT=80 WINDOW=0 RES=0x00 RST URGP=0 +<4>[ 221.340820] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=87.238.52.70 LEN=249 TOS=0x00 PREC=0x00 TTL=64 ID=50279 DF PROTO=TCP SPT=53939 DPT=993 WINDOW=32044 RES=0x00 ACK PSH URGP=0 UID=10053 GID=10053 +<4>[ 221.478881] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=91 TOS=0x00 PREC=0x00 TTL=64 ID=10059 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 221.890777] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10060 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 221.898010] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.101 LEN=40 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=TCP SPT=40218 DPT=80 WINDOW=0 RES=0x00 RST URGP=0 +<4>[ 222.710754] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10061 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 224.350677] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10062 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 225.617523] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.101 LEN=40 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=TCP SPT=40218 DPT=80 WINDOW=0 RES=0x00 RST URGP=0 +<4>[ 225.980743] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=87.238.52.70 LEN=249 TOS=0x00 PREC=0x00 TTL=64 ID=50280 DF PROTO=TCP SPT=53939 DPT=993 WINDOW=32044 RES=0x00 ACK PSH URGP=0 UID=10053 GID=10053 +<4>[ 227.630798] ORBOT_TCPLEAK_PROTECTIONIN= OUT=eth0 SRC=192.168.0.14 DST=74.125.39.139 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=10063 DF PROTO=TCP SPT=53388 DPT=443 WINDOW=32044 RES=0x00 ACK PSH FIN URGP=0 +<4>[ 241.522155] ORBOT_TCPLEAK_PROTECTIONIN= OUT=rmnet0 SRC=46.206.239.134 DST=84.22.122.5 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=20341 DF PROTO=TCP SPT=49138 DPT=9001 WINDOW=32044 RES=0x00 ACK URGP=0 +<4>[ 241.792358] ORBOT_TCPLEAK_PROTECTIONIN= OUT=rmnet0 SRC=46.206.239.134 DST=84.22.122.5 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=TCP SPT=49138 DPT=9001 WINDOW=32044 RES=0x00 ACK URGP=0 +<4>[ 242.362335] ORBOT_TCPLEAK_PROTECTIONIN= OUT=rmnet0 SRC=46.206.239.134 DST=84.22.122.5 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=TCP SPT=49138 DPT=9001 WINDOW=32044 RES=0x00 ACK URGP=0 +<4>[ 243.452331] ORBOT_TCPLEAK_PROTECTIONIN= OUT=rmnet0 SRC=46.206.239.134 DST=84.22.122.5 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=TCP SPT=49138 DPT=9001 WINDOW=32044 RES=0x00 ACK URGP=0 diff --git a/external/patches/transproxy.patch b/external/patches/transproxy.patch new file mode 100644 index 00000000..e69de29b diff --git a/external/patches/udptransproxyfinal.patch b/external/patches/udptransproxyfinal.patch new file mode 100644 index 00000000..32cc0e2f --- /dev/null +++ b/external/patches/udptransproxyfinal.patch @@ -0,0 +1,247 @@ +From a81741afe06ac2309b4306dedbd5a0ebf755b7e1 Mon Sep 17 00:00:00 2001 +From: patch +Date: Fri, 31 Aug 2012 17:25:52 -0400 +Subject: [PATCH] Addendum to the last commit on UDP transproxy rules. Trying + to simplfy the iptables rules didn't work out so this is a + minimal change from the original TorTransProxy.java file. + UDP is blocked and tested as working. + +--- + .../torproject/android/service/TorTransProxy.java | 144 ++++++++++++-------- + 1 file changed, 84 insertions(+), 60 deletions(-) + +diff --git a/src/org/torproject/android/service/TorTransProxy.java b/src/org/torproject/android/service/TorTransProxy.java +index c248a9f..90bdc34 100644 +--- a/src/org/torproject/android/service/TorTransProxy.java ++++ b/src/org/torproject/android/service/TorTransProxy.java +@@ -224,15 +224,6 @@ public class TorTransProxy implements TorServiceConstants { + + int torUid = context.getApplicationInfo().uid; + +- // Allow everything for Tor +- script.append(ipTablesPath); +- script.append(" -t filter"); +- script.append(" -A OUTPUT"); +- script.append(" -m owner --uid-owner "); +- script.append(torUid); +- script.append(" -j ACCEPT"); +- script.append(" || exit\n"); +- + //build up array of shell cmds to execute under one root context + for (TorifiedApp tApp:apps) + { +@@ -244,9 +235,9 @@ public class TorTransProxy implements TorServiceConstants { + { + + TorService.logMessage("enabling transproxy for app: " + tApp.getUsername() + "(" + tApp.getUid() + ")"); +- +- // Set up port redirection +- script.append(ipTablesPath); ++ ++ // Set up port redirection ++ script.append(ipTablesPath); + script.append(" -t nat"); + script.append(" -A OUTPUT -p tcp"); + script.append(" ! -d 127.0.0.1"); //allow access to localhost +@@ -260,28 +251,14 @@ public class TorTransProxy implements TorServiceConstants { + // Same for DNS + script.append(ipTablesPath); + script.append(" -t nat"); +- script.append(" -A OUTPUT -p udp"); +- script.append(" -m owner --uid-owner "); ++ script.append(" -A OUTPUT -p udp -m owner --uid-owner "); + script.append(tApp.getUid()); + script.append(" -m udp --dport "); + script.append(STANDARD_DNS_PORT); + script.append(" -j REDIRECT --to-ports "); + script.append(TOR_DNS_PORT); + script.append(" || exit\n"); +- +- // Allow loopback +- script.append(ipTablesPath); +- script.append(" -t filter"); +- script.append(" -A OUTPUT"); +- script.append(" -m owner --uid-owner "); +- script.append(tApp.getUid()); +- script.append(" -o lo"); +- script.append(" -j ACCEPT"); +- script.append(" || exit\n"); +- +- /* +- //Outgoing loopback already allowed (23/7/12) +- ++ + int[] ports = {TOR_DNS_PORT,TOR_TRANSPROXY_PORT,PORT_SOCKS,PORT_HTTP}; + + for (int port : ports) +@@ -299,8 +276,30 @@ public class TorTransProxy implements TorServiceConstants { + script.append(" -j ACCEPT"); + script.append(" || exit\n"); + } +- */ +- ++ ++ // Allow loopback ++ script.append(ipTablesPath); ++ script.append(" -t filter"); ++ script.append(" -A OUTPUT"); ++ script.append(" -m owner --uid-owner "); ++ script.append(tApp.getUid()); ++ script.append(" -p tcp"); ++ script.append(" -o lo"); ++ script.append(" -j ACCEPT"); ++ script.append(" || exit\n"); ++ ++ // Reject DNS that is not from Tor (order is important - first matched rule counts!) ++ script.append(ipTablesPath); ++ script.append(" -t filter"); ++ script.append(" -A OUTPUT"); ++ script.append(" -m owner --uid-owner "); ++ script.append(tApp.getUid()); ++ script.append(" -p udp"); ++ script.append(" --dport "); ++ script.append(STANDARD_DNS_PORT); ++ script.append(" -j REJECT"); ++ script.append(" || exit\n"); ++ + // Reject all other outbound TCP packets + script.append(ipTablesPath); + script.append(" -t filter"); +@@ -321,10 +320,19 @@ public class TorTransProxy implements TorServiceConstants { + script.append(" -j REJECT"); + script.append(" || exit\n"); + +- + } + } ++ + ++ // Allow everything for Tor ++ script.append(ipTablesPath); ++ script.append(" -t filter"); ++ script.append(" -A OUTPUT"); ++ script.append(" -m owner --uid-owner "); ++ script.append(torUid); ++ script.append(" -j ACCEPT"); ++ script.append(" || exit\n"); ++ + String[] cmdAdd = {script.toString()}; + + code = TorServiceUtils.doShellCommand(cmdAdd, res, runRoot, waitFor); +@@ -452,8 +460,8 @@ public class TorTransProxy implements TorServiceConstants { + + int torUid = context.getApplicationInfo().uid; + +- // Set up port redirection +- script.append(ipTablesPath); ++ // Set up port redirection ++ script.append(ipTablesPath); + script.append(" -t nat"); + script.append(" -A OUTPUT -p tcp"); + script.append(" ! -d 127.0.0.1"); //allow access to localhost +@@ -467,36 +475,14 @@ public class TorTransProxy implements TorServiceConstants { + // Same for DNS + script.append(ipTablesPath); + script.append(" -t nat"); +- script.append(" -A OUTPUT -p udp"); +- script.appent(" -m owner ! --uid-owner "); ++ script.append(" -A OUTPUT -p udp -m owner ! --uid-owner "); + script.append(torUid); + script.append(" -m udp --dport "); + script.append(STANDARD_DNS_PORT); + script.append(" -j REDIRECT --to-ports "); + script.append(TOR_DNS_PORT); + script.append(" || exit\n"); +- +- // Allow loopback +- script.append(ipTablesPath); +- script.append(" -t filter"); +- script.append(" -A OUTPUT"); +- script.append(" -o lo"); +- script.append(" -j ACCEPT"); +- script.append(" || exit\n"); + +- // Allow everything for Tor +- script.append(ipTablesPath); +- script.append(" -t filter"); +- script.append(" -A OUTPUT"); +- script.append(" -m owner --uid-owner "); +- script.append(torUid); +- script.append(" -j ACCEPT"); +- script.append(" || exit\n"); +- +- +- /* +- //Outgoing loopback already allowed (23/7/12) +- + int[] ports = {TOR_DNS_PORT,TOR_TRANSPROXY_PORT,PORT_SOCKS,PORT_HTTP}; + + for (int port : ports) +@@ -514,8 +500,25 @@ public class TorTransProxy implements TorServiceConstants { + script.append(" -j ACCEPT"); + script.append(" || exit\n"); + +- } */ ++ } ++ ++ // Allow loopback ++ script.append(ipTablesPath); ++ script.append(" -t filter"); ++ script.append(" -A OUTPUT"); ++ script.append(" -p tcp"); ++ script.append(" -o lo"); ++ script.append(" -j ACCEPT"); ++ script.append(" || exit\n"); + ++ // Allow everything for Tor ++ script.append(ipTablesPath); ++ script.append(" -t filter"); ++ script.append(" -A OUTPUT"); ++ script.append(" -m owner --uid-owner "); ++ script.append(torUid); ++ script.append(" -j ACCEPT"); ++ script.append(" || exit\n"); + + if (TorService.ENABLE_DEBUG_LOG) + { +@@ -539,13 +542,34 @@ public class TorTransProxy implements TorServiceConstants { + script.append(" --log-uid"); + script.append(" || exit\n"); + } +- +- // Reject all other outbound packets by default ++ ++ // Reject DNS that is not from Tor (order is important - first matched rule counts!) + script.append(ipTablesPath); + script.append(" -t filter"); +- script.append(" -P OUTPUT DROP"); ++ script.append(" -A OUTPUT"); ++ script.append(" -p udp"); ++ script.append(" --dport "); ++ script.append(STANDARD_DNS_PORT); ++ script.append(" -j REJECT"); + script.append(" || exit\n"); + ++ // Reject all other outbound TCP packets ++ script.append(ipTablesPath); ++ script.append(" -t filter"); ++ script.append(" -A OUTPUT"); ++ script.append(" -p tcp"); ++ script.append(" -j REJECT"); ++ script.append(" || exit\n"); ++ ++ // Reject all other outbound UDP packets ++ script.append(ipTablesPath); ++ script.append(" -t filter"); ++ script.append(" -A OUTPUT"); ++ script.append(" -p udp"); ++ script.append(" -j REJECT"); ++ script.append(" || exit\n"); ++ ++ + String[] cmdAdd = {script.toString()}; + + code = TorServiceUtils.doShellCommand(cmdAdd, res, runRoot, waitFor); +-- +1.7.9.5 + diff --git a/external/patches/update_GibberBot_info/ic_launcher_gibberbot.png b/external/patches/update_GibberBot_info/ic_launcher_gibberbot.png new file mode 100644 index 0000000000000000000000000000000000000000..e4099106985fefd8e0bd2a0d83634e90052a3b07 GIT binary patch literal 7527 zcmbVxXEdDc+V+gzd#_`Zh&rQ;5P~rVql`A%Bzp8HA<=tCA$ar>q687q6C`@? zf)Iq@lf9p3fA5dI-XHJ1)_v9UIL>mN=e@4A?s#KEZAvmWG5`QTsdEQzdeh(e^O6wV zv=)1H+BY35R?`Y==H-kHMEIfrYEE8`D3FdP!UbiDLO2Ecd_*Y%0Qk;mb1STsfxbM_ z%To;TM@B5j)B6Su04S;ic_WbSC@jbk<$}g2f%o5bfI(;{CGcHo1BijQ2FewE2j`12 z!x@?*aqdVtC$Ne#NHIwMhQJerMSy}lJurUqK}z6%@yg$f|167xLH`oLx+{VIZIqRP zF-XJ97X^|QgNPy_G7yjqR17L91%tsvKoSrrL>wX^4wVpv!sI0-n$%X9vB!X7APs^R|k^2n-VSk6!eR-oLSO|0`Br!xx3X zdik1rd3pSk0miOgST8?UFK>{BnKZ}%fkb2e%>NwEzrBT{e9-|YCoNwuPtd>OE06v! z`eEu22{i~rLPGOzzag@ca%$?bPzW3%DXp#r{u}G`e~Fp+jWObXlH-3Q%Rfsu8Te=T zpVYsZ{HJ(On4606y(tY6nCwkivS#YQ)y#vYcWudo7$(}U3$wr7mC1$m6KayEmsz~F zBvdo811B&uD)X4GPCD)d&P<0kl{DCGPsLU?Sj?QePBiK^;DnhPm`TW(@CaTh;y*bM z0+FV8)anGJhm5RTUAqhq4r2m>PcPi6-~MtDsH>CQ_&vOTt>{w15(B(0w0|EbuQmmLdYbVQ26kTUXimY_>k`@8~qYG{0 z6Zf1(emW|zcFb{BfP67}!ES|~baYbGMm3F(fk@J2_T%PP8!vG&R^KsAn9O%fPPV?l z%clBz)uW~Nqg-yWcVzL#tQhFx`CQ8fs(FOTg4*p4E)t7MOBu?`g%F+LM80(7NvPAUtAvo zOn99atTj6SvT&a=ziVzj8=Dm7FjAoOSICTvtoH!`tKE8Nc3y1%8`swN+Wy<;CEjjNE#lB1HPo=tE-DI z)rsC@3$t!@>LkP`4&`M^9Imde)^=#r5M=NT@7lbDA4_RzX~uD(H7OQAC^R6vn5HKl zJ@#B%14I*4UQu`S%LiGl0!JRdY+}k*{U##eabg8R=jpI5xCzz7v6OaeEEI%&2iAu3 z?0p^o>(Z`Xe5BH<25)=YQbUnR84dZ(a118 zVp+3$+0Eb^nci-cPr#xQ$}t;y!8tlVuT1FqS=Z4_IkiBgZPqEJ0Q#lWZ6Rb+VMBmQ z-Fwp(H5cZ7f{ zv5zQSh@?V?@jjGP&IJ)0mzW7a(4WKUWJL(epGMZ_Jt|F8jrY@8Qs!JKtdnA6!PA!P z;w{3u0|xgphHMspZ4^E?Ml4PL{Q3D+WeaGl6%(~`?CV0AT4rgad?^)NZc*L#gG@?B zW}1>O$0mF;I6~clA|1-X_mE!jwj575kFjH_x3=VR!Vjd*-C5<7aMNsnF67gwBt9I` zt0&%0(EnXiT-;VxikVMAfNrp+JF+ezO2pfEb}FeI17uzCcc1c|0i#&WCNG-Mi9YsC zlnG+)MS5Q$tl5j|0ytE(M}`QNv3 zCw)ogq&yf_*zZhA7kJ`+&ZbMJwmd(?D$9m*e$WT7o+sfSNB}kJ^}RQK?cGCWVJo@(9lp`A1l=b5BwM5t$;!Tm*zBg69Kz*lL6a*s9Ypc5N5w9dQjh3o+ z@}}>P#5fuDEJWz@taHRB*BX*MyH(V#{$A7@U2W{c9%XDD>tLa9O$AL+UAHsT&E9p& z$+wpy_F5ZwW<2q7gmhXk##<=?W|&_8So)S|@l4$s-Wz7iRaNPHwZ zbw0Mvs9B%agDEl8#J$pWjWV;Un#M zKe|)Ab8Fa?#Q|8)jN~mGQSj;RiMQZ>W6Szp?$L+stzQy;9 zKSk@52dZ?hDpR_s;iqiTb5`{z!^_K$DO^ZHqkvX`^^>{}8%IB1mSlRS)?sF6RBd>* zDa)E~t+eQem(0s1x5*`o3>E!;?ptNKG!j$%>#b7q zBTKVLQ6ko-)C0~ZPCgWoHfz!LYkV@DsV}gl+#9Lpix~}S)tV*}%r`u8Y#Tn}r1=>A zv}RE2MHSN0MP#I`WJ>qYs#j{5fup<)=>YsvcHnNdq-MGW5&+UJ7V*Nq{!^aIK+X|1n3f zzd)n6C6!-F_Gp$DFttz6wH_?IxM+MUUXw|6{c(9=qG@G#)4*?qgc z?WR4~pp%&+?jnESc=tm4;4lN|N8(}3-b{*va@}4GJEot#j7h!^Nr#h+?Ggo00cly; zA`UzeT-OvQY~H_MiNPePDrLoF>Axl)jn3prOS|Zt^%O}r@Sc1e=9E1MB+&*RIgex? zeJSZp6t7(_`D`HV5iaQQ;4&r5R>5yw-|)~bY2pZ*RYw9Jn@5}&8RMYpM8qx*gq;l# zhHg%i`5N`Q%ACqUJPw-hSJ}VB=76cUg;YW}7u86JZ1!1gmCksyu|tNWpqd^yGr;7G z$@oG+!d0OmGV|YGiIK%@)49B($Evm7rXoUw zOz_4zzsO=2$$p|_RrO*%j+HiX&)K#usIay$fvGalRyR?v=E1_@472^c`(}R36x^Xc z1*R2GI(FR%vu*+7-kKg;^82G?!O+d=I8M3ErFr4&UooFKz2okTi7>9{*%CyV>rEVc z_&*;x-JLf$y_`&&M!}r5U2YNg(=1upI%yTBu(6+Z9Cs(~s~nF87PY;3(}a^dk!#Cg z?VU!y*U2LUuKKnF1+wBqK0RQ>Wp_G-k8^TPO$;s*OGqo=a zCLO47Yrps8xpNk++AZCK7MFt8Hg&C4h^|ONmUqM)yFPCk#yW}O(cm-7E?|yHs%D$~ zR$K%btN+nM;cNPhvO}xs%`)fgN;iDXi}J53hYF@5&+Gcx|Ey{vPCz~|3iVx57qphAYgNPH;vhfIvmHj9z zcyy0PRH(fqV$oj-bI#t!NVcl0+kPAX9mR2_Ek3_Zk*stZX*Wn#pdBwL#BCG_sloja3u2FihDqNal*l*#61hzoeiI^! z>AV0-q2ID!vbvCAPP6HBL9}huKqm=Oc2%CphFTH#kP^b=0cImwtGT(kRhsiiYoCMy z3DusGC5>2A%R@&xyr%^2hqQkB(q>=5xph=MT>NWV-inLKA3#ado(!y`{@NsfBi#v2 zvp#^uB~a`&TWF-}N1B~Di1_;^@{1ynAci1L)%PV$X)`$=K^#BLs#IizV;s%=z0R#; zM*`hGZzLo~iUd>`rIr>)X!I@!s5VZ^XCX)u!Jx^gx7A%KNjz(gl-f&vyx6R2so0if z@rYFT$NZPtES6inyAL>c0_}I0E5;28QXhGk$hzB-BoY5!G$8Jriwf6l?_4J1*2*`( zS7t#e@8av+^;AqTpAl6dkVwNPkQYJ1W~A5qW6edUw1X-;@g6 zs|X|ftvM1lXCv1kQ**_-UGK*LGKZ%2SyW-a$fw!mAl0$9MI8rAZVjSdNLP~M;8RuI z7pZClbOF;eTwk11*M`iAWgT}8gI+DO1ZFrHk%NleGR7uZ(y_uk(*BR*QDU7Hp=lBK z5v4Rlck$0N@+?7X@li0t3OUH@rT>+yDCqo6TQx6qc6)p-RAn(M3bcoeUy)6`{Z%kP&JhVMD^He{*%YVz(&_2O5NO( zjREn8K$(y;#AU`%u1$2(#4w?1Niq`P_lkvHqy!(eRt7=#QDiBH$hRGIS5qg2Ivvjk zNlY&R?K63{pc?CdCngkM-dz=39o;HqV^{t%#Gb!)(CcgOP71LvDsuUusQkI>Wp0

FsV;ci zgDg&>;ZH@x`xY~7FfYmk;NKQQj=s+=)Voh129`!0X+mZW8ut{zu%P<##MxLTSTA?M z^+B4w^2OteT0LczM_l2z`@t?B3Er&r<^Z%6D~c7uYm(~My37qvUz>SFbI!0UpC3|( z)kl^yg7Xu|r4^9jd7d&!QUU1+=YAW*(aFZIRxTDE950@qpGSdPJQ>FY*v8gaZfg)Y zD>;5y^$NXY*9$!ytj4fI9ebh`0=}y%JQ+5D-ipF@741f^Ws|CjBBM9}jK3bbQormR z=2SQxx~}#T?-J%@_DqZm$Zwz=pW|vui~CUAii6CCUBl4pwMRoL?ZK-fiA;O+4pyB6 znpcyz*=YP9)5UcTw(MU`!oJ&|zyH9M`*6h|J=SC49cMDPO2*Hxz}3HQ?U)FDpjU3$ z)-+uekNj5GLE0286cKU?yEBWSRvMvI^R`?Gp&}2zM_6}MKD9-Z(3W*wVgK9r^OFo->Zyqd z);&*8u|sQfz!!n=nlB%>IL|iqb0o4|T7=y)qn_u16}lgCe#=sqJLW!pxK$g=6&hp( zVR@txOVwS2`~c!e_O?m;`Lr0}6p_x!m$UuM@MY&pfSE#0wAJnw?cV4Jp=!_5{=x;E zyW}(Fo>OU{ab_w8sNcv*V`!_4!KOu#d2!yY(iB-s zfls~;n|~n~qbi7r&ri7*#f63a_0ry$Q@=jB@4HoYHIxfG+_w^|(Iw>KI65aM z2RW6*<;QKelL~lkQ*WU%WB#6Puk@>tO9E4XiS&|S)%No$PGpvzEtb}})^6lYGN;P0 z)zOqi4)VK(AH&ugU1#G*_^7XAX>$e!p$vsA5WR=bt5_!jC+`PRzIxqK;jt1!*#@dE zM{5&QBHVb~)ywkmUl+Pgey{gTMebOYcBh~xhpITF$BSZg964#?Jl}2Ht!_uWslohY zn;Wxoxx5Ybu!(obw2zzO$(vw@c_>EuIxHup6V1u_t#_JC*_yS!sG z4Hc-$4`@8iQ}o#kGJLisLRo7zKzr8~WBha=%PHzTSp>oG8qd1>`)U6)L4~+As>vKF zsz`o2pV>X*2Y8kGuN?Vb3j(DpUabGV!Y48pv$rFU55ij?%&sH0*iAh9W#Z_fxu6`M z>@d?3_Ue@TmoLR5!l%n5_<5iH65&ZrAb39zeYwrsI4?f0v;dHGMcPV)tRi@~mlbos=z!H?=@PyE`4A3wBj-H;UAFR_Jm7l|spy82uo^x`~9j8;tW}2Hfth(uA|n2{SN+E&~SeEvvVvKYRw>UdndF zdn1OZe&Zms6gM`0tB~gU5fDqaCAplicacions per a usar-se amb Orbot + T\'animem a descarregar-te & utilitza aplicacions que sàpiguen com connectar-se directament a Orbot. Fes clic als botons de sota per instal·lar. +- OTRCHAT - Client de missatgeria instantània segura per a Android ++ GibberBot - Client de missatgeria instantània segura per a Android + ORWEB (Només Android 1.x) - Navegador dissenyat per la privacitat & per a Orbot + Coniguració de Proxy - Aprèn a configurar aplicacions per a què funcionin amb Orbot + +@@ -115,7 +115,7 @@ + Orbot és a punt! + Centenars de milers de persones arreu del món utilitzen Tor per un gran ventall de raons: periodistes i blocaires, treballadors pels drets humans, agents de l\'autoritat, soldats, corporacions, ciutadans de règims opressors, i ciutadans qualssevol... I ara tu també ho pots fer! + +- https://guardianproject.info/getgibber ++ market://search?q=pname:info.guardianproject.otr.app.im + https://guardianproject.info/getorweb + + +Index: res/drawable/icon_otrchat.png +=================================================================== +Cannot display: file marked as a binary type. +svn:mime-type = application/octet-stream +Index: res/drawable/ic_launcher_gibberbot.png +=================================================================== +Cannot display: file marked as a binary type. +svn:mime-type = application/octet-stream + +Property changes on: res/drawable/ic_launcher_gibberbot.png +___________________________________________________________________ +Added: svn:mime-type + + application/octet-stream + +Index: res/values-fa/strings.xml +=================================================================== +--- res/values-fa/strings.xml (revision 24406) ++++ res/values-fa/strings.xml (working copy) +@@ -95,7 +95,7 @@ + + اپلیکیشن هایی که برای اوربات تنظیم شده اند + توصیه می کنیم داون لود و فعال کنید؛ اپلیکیشن هایی را استفاده کنید که مستقیم به اوربات وصل می شوند. دکمه های زیر را فشار دهید تا نصب شود. +- OTRCHAT - کاربر ایمن انتقال پیام فوری برای آندروید ++ GibberBot - کاربر ایمن انتقال پیام فوری برای آندروید + ORWEB (فقط آندروید 1.x) - مرورگر طراحی شده برای حفظ حریم خصوصی و افزونساز اوربات + تنظیمات پروکسی - یادگیری تنظیم اپلیکیشن ها برای کار با اوربات + +@@ -105,7 +105,7 @@ + اوربات آماده استفاده میباشد! + صدها هزار نفر در سراسر جهان به دلایل گوناگون از Tor استفاده می کنند: روزنامه نویسها و بلاگرها، کارکنان حقوق بشر، ماموران انتظامی، سربازان، شرکتها، شهروندان دولتهای سرکوبگر، و شهروندان عادی، و حالا شما نیز آماده استفاده از آن هستید! + +- https://guardianproject.info/getgibber ++ market://search?q=pname:info.guardianproject.otr.app.im + https://guardianproject.info/getorweb + + +Index: res/values-ru/strings.xml +=================================================================== +--- res/values-ru/strings.xml (revision 24406) ++++ res/values-ru/strings.xml (working copy) +@@ -95,7 +95,7 @@ + + Orbot-задействованные приложения + Мы советуем вам скачать и использовать приложения, которые умеют работать напрямую через Orbot. Нажмите на кнопки ниже, чтобы запустить процесс установки. +- OTRCHAT - Обезопасте обмен мгновенными сообщениями для клиентов в Android ++ GibberBot - Обезопасте обмен мгновенными сообщениями для клиентов в Android + ORWEB (Только для версии Android 1.x) - Браузер, разработанный для обеспечения безопасности и для Orbot + Настройки прокси - узнайте как настроить приложения для работы с Orbot + +@@ -109,7 +109,7 @@ + Программа Orbot готова к использованию! + Сотни тысяч людей по всему миру используют Tor по различным причинам: журналисты и блоггеры, активисты организаций, выступающих в защиту прав человека, судебные исполнители, солдаты, корпорации, граждане стран с репрессивным режимом, и простые люди... а теперь готовы и вы! + +- https://guardianproject.info/getgibber ++ market://search?q=pname:info.guardianproject.otr.app.im + https://guardianproject.info/getorweb + + +Index: res/values-de/strings.xml +=================================================================== +--- res/values-de/strings.xml (revision 24406) ++++ res/values-de/strings.xml (working copy) +@@ -97,7 +97,7 @@ + + Programme, für die Orbot aktiviert ist + Wir raten Ihnen Programme herunterzuladen & zu nutzen, die wissen, wie sie sich direkt mit Orbot verbinden. Klicken Sie zum Installieren auf den Knopf unten. +- OTRCHAT - Ein sicheres Instant-Messaging-Programm für Android ++ GibberBot - Ein sicheres Instant-Messaging-Programm für Android + ORWEB (Nur Android 1.x) - Ein für Privatsphäre & Orbot entworfener Browser + Proxy-Einstellungen - Lernen Sie Anwendungen so zu konfigurieren, dass sie mit Orbot zusammenarbeiten. + +@@ -115,7 +115,7 @@ + Orbot ist bereit! + Hunderttausende Menschen auf der ganzen Welt nutzen Tor aus einer Vielzahl von Gründen: Journalisten und Blogger, Menschenrechtsaktivisten, Strafverfolgungsbehörden, Soldaten, Unternehmen, Bürger repressiver Regime und ganz normale Menschen... und sind Sie ebenfalls bereit! + +- https://guardianproject.info/getgibber ++ market://search?q=pname:info.guardianproject.otr.app.im + https://guardianproject.info/getorweb + + +Index: res/values/strings.xml +=================================================================== +--- res/values/strings.xml (revision 24406) ++++ res/values/strings.xml (working copy) +@@ -94,7 +94,7 @@ + + Orbot-enabled Apps + We encourage you to download & use apps that know how to connect directly to Orbot. Click on the buttons below to install. +- OTRCHAT - Secure instant messaging client for Android ++ Gibberbot - Secure instant messaging client for Android + ORWEB (Android 1.x Only) - Browser designed for privacy & for Orbot + Proxy Settings - Learn how to configure apps to work with Orbot + +@@ -108,7 +108,7 @@ + Orbot is ready! + Hundreds of thousands of people around the world use Tor for a wide variety of reasons: journalists and bloggers, human rights workers, law enforcement officers, soldiers, corporations, citizens of repressive regimes, and just ordinary citizens... and now you are ready to, as well! + +- https://guardianproject.info/getgibber ++ market://search?q=pname:info.guardianproject.otr.app.im + https://guardianproject.info/getorweb + + +Index: res/values-ar/strings.xml +=================================================================== +--- res/values-ar/strings.xml (revision 24406) ++++ res/values-ar/strings.xml (working copy) +@@ -97,7 +97,7 @@ + + تطبيقات مهيئة لأوربوت + نشجعكم على تحميل واستخدام التطبيقات التي تعرف كيفية الاتصال مباشرة بأوربوت. اضغط على الأزرار في الأسفل للتثبيت. +- OTRCHAT - عميل التراسل الفوري الآمن للأندرويد ++ GibberBot - عميل التراسل الفوري الآمن للأندرويد + ORWEB (أندرويد 1.x فقط) - متصفح مصمّم للخصوصية لأوربوت + إعدادات الوكيل - تعلم كيفية تكوين التطبيقات لتعمل مع أوربوت + +@@ -115,7 +115,7 @@ + أوربوت جاهز! + مئات الآلاف من الناس في جميع أنحاء العالم يستخدمون تور لأسباب عديدة: الصحفيين والمدونين، والعاملين في مجال حقوق الإنسان، والجنود والشركات والمواطنين من الأنظمة القمعية، والمواطنين العاديين ... والآن أنت مستعد لأن تستخدمه كذلك! + +- https://guardianproject.info/getgibber ++ market://search?q=pname:info.guardianproject.otr.app.im + https://guardianproject.info/getorweb + + +Index: res/values-es/strings.xml +=================================================================== +--- res/values-es/strings.xml (revision 24406) ++++ res/values-es/strings.xml (working copy) +@@ -97,7 +97,7 @@ + + Aplicaciones activas en Orbot + Le invitamos a descargar y utilizar aplicaciones que saben cómo conectarse directamente a Orbot. Haga clic en los botones a continuación para Instalar. +- OTRCHAT - Cliente de mensajería instantánea seguro para Android ++ GibberBot - Cliente de mensajería instantánea seguro para Android + ORWEB (Sólo Android 1.x) - Navegador diseñado para la privacidad y para Orbot + Configuraciones Proxy - Aprenda cómo configurar aplicaciones para que trabajen con Orbot + +@@ -115,7 +115,7 @@ + ¡Orbot está listo! + Cientos de miles de personas alrededor del mundo usan Tor por una amplia variedad de razones: periodistas y bloggers, trabajadores de los derechos humanos, oficiales de policía, soldados, corporaciones, ciudadanos de regímenes represivos y ciudadanos ordinarios... ¡y ahora también lo estás! + +- https://guardianproject.info/getgibber ++ market://search?q=pname:info.guardianproject.otr.app.im + https://guardianproject.info/getorweb + + +Index: res/values-mk/strings.xml +=================================================================== +--- res/values-mk/strings.xml (revision 24406) ++++ res/values-mk/strings.xml (working copy) +@@ -95,7 +95,7 @@ + + Орбот-вклучени апликации + Ви препорачуваме да презимате и користите апликации кои што знаат како директно да се поврзат со Орбот. Притиснете на копчињата подолу за инсталирање. +- OTRCHAT - Безбеден клиент за инстант-пораки за Андроид ++ GibberBot - Безбеден клиент за инстант-пораки за Андроид + ORWEB (само Андроид 1.x) - Браусер дизајниран за приватност и за Орбот + Подесувања на прокси - Научете како да ги конфигурирате апликациите да работат со Орбот + +@@ -109,7 +109,7 @@ + Орбот е спремен! + Стотици илјади луѓе низ целиот Свет го користат Тор од многу различни причини: новинари и блогери, борци за човекови права, полицајци, војници, корпорации, граѓани на репресивни режими, и обични граѓани... а сега и Вие сте спремин да го користите! + +- https://guardianproject.info/getgibber ++ market://search?q=pname:info.guardianproject.otr.app.im + https://guardianproject.info/getorweb + + +Index: res/values-nl/strings.xml +=================================================================== +--- res/values-nl/strings.xml (revision 24406) ++++ res/values-nl/strings.xml (working copy) +@@ -97,7 +97,7 @@ + + Orbot-beschikbare Apps + We raden u aan om te apps te downloaden welke zich zich automatisch verbinden met Orbot. Klik op de buttons hier beneden om te installeren. +- OTRCHAT - Veilige instant message programma voor Android ++ GibberBot - Veilige instant message programma voor Android + ORWEB (Alleen Android 1.x) - Browser gemaakt voor privacy & voor Orbot + Proxy Instellingen - Leer hoe u uw apps kunt configureren voor Orbot + +@@ -114,7 +114,7 @@ + Orbot is klaar! + Honderdduizenden verschillende mensen over de wereld gebruiken Tor, zoals: journalisten, bloggers, mensen rechten medewerkers, soldaten, bedrijven, burgers met onderdrukte religies, en natuurlijk normale mensen... En nu bent u ook klaar om te gaan! + +- https://guardianproject.info/getgibber ++ market://search?q=pname:info.guardianproject.otr.app.im + https://guardianproject.info/getorweb + + +Index: res/values-pl/strings.xml +=================================================================== +--- res/values-pl/strings.xml (revision 24406) ++++ res/values-pl/strings.xml (working copy) +@@ -95,7 +95,7 @@ + + Aplikacje skonfigurowane dla Orbota + Zachęcamy do pobierania i używania aplikacji, które wiedzą, jak łączyć się bezpośrednio z Orbotem. Kliknij na poniższe przyciski, by zainstalować. +- OTRCHAT - Bezpieczny klieny rozmów dla Androida ++ GibberBot - Bezpieczny klieny rozmów dla Androida + ORWEB (tylko Android 1.x) - Przeglądarka zaprojektowana do prywatności i dla Orbota + Ustawienia Proxy - NDowiedz się, jak konfiguroać aplikacje do współpracy z Orbotem + +@@ -109,7 +109,7 @@ + Orbot jest gotowy! + Setki tysięcy ludzi na całym świecie używają Tora z różnych powodów: dziennikarze i blogerzy, działacze na rzecz praw człowieka, stróże prawa, żołnierze, korporacje, obywatele represyjnych reżimów i zwykli obywatele... teraz Ty też możesz! + +- https://guardianproject.info/getgibber ++ market://search?q=pname:info.guardianproject.otr.app.im + https://guardianproject.info/getorweb + + +Index: res/layout/layout_wizard_tips.xml +=================================================================== +--- res/layout/layout_wizard_tips.xml (revision 24406) ++++ res/layout/layout_wizard_tips.xml (working copy) +@@ -17,7 +17,7 @@ + + + +-