Task #5149
Design and implement packet leak detection!
Status: | New | Start date: | 05/11/2015 | |
---|---|---|---|---|
Priority: | Normal | Due date: | 05/29/2015 | |
Assignee: | amoghbl1 | % Done: | 0% | |
Category: | - | |||
Target version: | Orfox RC | |||
Component: |
Description
We need to ensure that DNS or other traffic from Orfox is always routed through Tor.
Look into using laptop as wifi hotspot + wireshark.
History
#1 Updated by n8fr8 over 2 years ago
NoRootFirewall is one simple approach to detect this... there should be no traffic from Orfox, only from Orbot
#2 Updated by amoghbl1 over 2 years ago
The current tests have been done with the NoRootFirewall application.
The advantage that this application over other methods is the way in which it detects which app is making the requests. Another method to test this could be by using mitmproxy, but then the requests would be visible but it would be hard to say where they came from, and so we might miss some packets while searching through them with all the noise from other applications.
I think using NoRootFirewall for future testing might be a good idea, unless a more useful alternative can be found.
#3 Updated by n8fr8 over 2 years ago
- Target version changed from Orfox Alpha to Orfox RC