[tor-commits] [ooni-probe/master] Add documentation for DNS Tamper test
art at torproject.org
art at torproject.org
Thu Nov 29 14:42:49 UTC 2012
commit 340e4b932f0817f552f12c2900039020fe2eba63
Author: Arturo Filastò <art at fuffa.org>
Date: Thu Nov 29 12:26:50 2012 +0100
Add documentation for DNS Tamper test
---
docs/source/tests/dnstamper.rst | 229 +++++++++++++++++++++++----------------
1 files changed, 137 insertions(+), 92 deletions(-)
diff --git a/docs/source/tests/dnstamper.rst b/docs/source/tests/dnstamper.rst
index d37afa8..b97131b 100644
--- a/docs/source/tests/dnstamper.rst
+++ b/docs/source/tests/dnstamper.rst
@@ -3,11 +3,11 @@ Details
*Test Name*: DNS Tamper
-*Current version*: 0.3
+*Current version*: 0.4
-*NetTest*: DNSTamperTest (https://gitweb.torproject.org/ooni-probe.git/blob/HEAD:/nettests/core/dnstamper.py)
+*NetTest*: DNS Tamper Test (https://gitweb.torproject.org/ooni-probe.git/blob/HEAD:/nettests/blocking/dnstamper.py)
-*Test Helper*: DNSTestHelper (https://gitweb.torproject.org/ooni-probe.git/blob/HEAD:/oonib/testhelpers/dns_helpers.py)
+*Test Helper*: DNS Test Helper (https://gitweb.torproject.org/ooni-probe.git/blob/HEAD:/oonib/testhelpers/dns_helpers.py)
*Test Type*: Content Blocking
@@ -28,7 +28,9 @@ youtube, etc.
How to run the test
===================
-`./bin/ooniprobe nettests/core/dnstamper.py -t <test resolvers file> -f <input file> -b IP:PORT`
+`./bin/ooniprobe nettests/core/dnstamper.py [-t <test resolvers>|-T <test resolver file>-f <input file> -b IP:PORT`
+
+*test resolvers* is a single test resolver (IP address)
*test resolvers file* is a file containing the IP addresses of the resolvers to test for censorship, one per line.
@@ -44,92 +46,135 @@ From running:
::
- ###########################################
- # OONI Probe Report for DNS tamper test
- # Tue Nov 20 20:38:54 2012
- ###########################################
- ---
- {probe_asn: null, probe_cc: null, probe_ip: 127.0.0.1, software_name: ooniprobe, software_version: 0.0.7.1-alpha,
- start_time: 1353436734.0, test_name: DNS tamper, test_version: '0.3'}
- ...
- ---
- input: torproject.org
- report:
- control_resolver: &id001 [8.8.8.8, 53]
- queries:
- - addrs: [86.59.30.40, 38.229.72.14, 38.229.72.16, 82.195.75.101]
- answers:
- - [<RR name=torproject.org type=A class=IN ttl=142s auth=False>, <A address=86.59.30.40
- ttl=142>]
- - [<RR name=torproject.org type=A class=IN ttl=142s auth=False>, <A address=38.229.72.14
- ttl=142>]
- - [<RR name=torproject.org type=A class=IN ttl=142s auth=False>, <A address=38.229.72.16
- ttl=142>]
- - [<RR name=torproject.org type=A class=IN ttl=142s auth=False>, <A address=82.195.75.101
- ttl=142>]
- query: '[Query(''torproject.org'', 1, 1)]'
- query_type: A
- resolver: *id001
- - addrs: [86.59.30.40, 38.229.72.14, 38.229.72.16, 82.195.75.101]
- answers:
- - [<RR name=torproject.org type=A class=IN ttl=142s auth=False>, <A address=86.59.30.40
- ttl=142>]
- - [<RR name=torproject.org type=A class=IN ttl=142s auth=False>, <A address=38.229.72.14
- ttl=142>]
- - [<RR name=torproject.org type=A class=IN ttl=142s auth=False>, <A address=38.229.72.16
- ttl=142>]
- - [<RR name=torproject.org type=A class=IN ttl=142s auth=False>, <A address=82.195.75.101
- ttl=142>]
- query: '[Query(''torproject.org'', 1, 1)]'
- query_type: A
- resolver: [8.8.8.8, 53]
- - addrs: [86.59.30.40, 38.229.72.14, 38.229.72.16, 82.195.75.101]
- answers:
- - [<RR name=torproject.org type=A class=IN ttl=142s auth=False>, <A address=86.59.30.40
- ttl=142>]
- - [<RR name=torproject.org type=A class=IN ttl=142s auth=False>, <A address=38.229.72.14
- ttl=142>]
- - [<RR name=torproject.org type=A class=IN ttl=142s auth=False>, <A address=38.229.72.16
- ttl=142>]
- - [<RR name=torproject.org type=A class=IN ttl=142s auth=False>, <A address=82.195.75.101
- ttl=142>]
- query: '[Query(''torproject.org'', 1, 1)]'
- query_type: A
- resolver: [8.8.4.4, 53]
- tampering: {8.8.4.4: false, 8.8.8.8: false}
- test_resolvers: [8.8.8.8, 8.8.4.4]
- test_name: test_a_queries
- test_started: 1353440334.075345
- ...
- ---
- input: ooni.nu
- report:
- control_resolver: &id001 [8.8.8.8, 53]
- queries:
- - addrs: [178.79.139.176]
- answers:
- - [<RR name=ooni.nu type=A class=IN ttl=1478s auth=False>, <A address=178.79.139.176
- ttl=1478>]
- query: '[Query(''ooni.nu'', 1, 1)]'
- query_type: A
- resolver: *id001
- - addrs: [178.79.139.176]
- answers:
- - [<RR name=ooni.nu type=A class=IN ttl=1478s auth=False>, <A address=178.79.139.176
- ttl=1478>]
- query: '[Query(''ooni.nu'', 1, 1)]'
- query_type: A
- resolver: [8.8.8.8, 53]
- - addrs: [178.79.139.176]
- answers:
- - [<RR name=ooni.nu type=A class=IN ttl=1478s auth=False>, <A address=178.79.139.176
- ttl=1478>]
- query: '[Query(''ooni.nu'', 1, 1)]'
- query_type: A
- resolver: [8.8.4.4, 53]
- tampering: {8.8.4.4: false, 8.8.8.8: false}
- test_resolvers: [8.8.8.8, 8.8.4.4]
- test_name: test_a_queries
- test_started: 1353440334.077116
- ...
+ ###########################################
+ # OONI Probe Report for DNS tamper test
+ # Thu Nov 29 12:17:19 2012
+ ###########################################
+ ---
+ options:
+ collector: null
+ help: 0
+ logfile: null
+ pcapfile: null
+ reportfile: null
+ resume: 0
+ subargs: [-t, 8.8.8.8, -f, test_inputs/dns_tamper_file.txt]
+ test: nettests/blocking/dnstamper.py
+ probe_asn: null
+ probe_cc: null
+ probe_ip: 127.0.0.1
+ software_name: ooniprobe
+ software_version: 0.0.7.1-alpha
+ start_time: 1354184239.0
+ test_name: DNS tamper
+ test_version: '0.4'
+ ...
+ ---
+ input: torproject.org
+ report:
+ control_resolver: &id001 [8.8.8.8, 53]
+ queries:
+ - addrs: [86.59.30.40, 38.229.72.14, 38.229.72.16, 82.195.75.101]
+ answers:
+ - [<RR name=torproject.org type=A class=IN ttl=91s auth=False>, <A address=86.59.30.40
+ ttl=91>]
+ - [<RR name=torproject.org type=A class=IN ttl=91s auth=False>, <A address=38.229.72.14
+ ttl=91>]
+ - [<RR name=torproject.org type=A class=IN ttl=91s auth=False>, <A address=38.229.72.16
+ ttl=91>]
+ - [<RR name=torproject.org type=A class=IN ttl=91s auth=False>, <A address=82.195.75.101
+ ttl=91>]
+ query: '[Query(''torproject.org'', 1, 1)]'
+ query_type: A
+ resolver: *id001
+ - addrs: [86.59.30.40, 38.229.72.14, 38.229.72.16, 82.195.75.101]
+ answers:
+ - [<RR name=torproject.org type=A class=IN ttl=91s auth=False>, <A address=86.59.30.40
+ ttl=91>]
+ - [<RR name=torproject.org type=A class=IN ttl=91s auth=False>, <A address=38.229.72.14
+ ttl=91>]
+ - [<RR name=torproject.org type=A class=IN ttl=91s auth=False>, <A address=38.229.72.16
+ ttl=91>]
+ - [<RR name=torproject.org type=A class=IN ttl=91s auth=False>, <A address=82.195.75.101
+ ttl=91>]
+ query: '[Query(''torproject.org'', 1, 1)]'
+ query_type: A
+ resolver: [8.8.8.8, 53]
+ tampering: {8.8.8.8: false}
+ test_name: test_a_lookup
+ test_runtime: 0.0733950138092041
+ test_started: 1354187839.508863
+ ...
+ ---
+ input: google.com
+ report:
+ control_resolver: &id001 [8.8.8.8, 53]
+ queries:
+ - addrs: [173.194.69.100, 173.194.69.139, 173.194.69.113, 173.194.69.101, 173.194.69.138,
+ 173.194.69.102]
+ answers:
+ - [<RR name=google.com type=A class=IN ttl=54s auth=False>, <A address=173.194.69.100
+ ttl=54>]
+ - [<RR name=google.com type=A class=IN ttl=54s auth=False>, <A address=173.194.69.139
+ ttl=54>]
+ - [<RR name=google.com type=A class=IN ttl=54s auth=False>, <A address=173.194.69.113
+ ttl=54>]
+ - [<RR name=google.com type=A class=IN ttl=54s auth=False>, <A address=173.194.69.101
+ ttl=54>]
+ - [<RR name=google.com type=A class=IN ttl=54s auth=False>, <A address=173.194.69.138
+ ttl=54>]
+ - [<RR name=google.com type=A class=IN ttl=54s auth=False>, <A address=173.194.69.102
+ ttl=54>]
+ query: '[Query(''google.com'', 1, 1)]'
+ query_type: A
+ resolver: *id001
+ - addrs: [173.194.69.100, 173.194.69.139, 173.194.69.113, 173.194.69.101, 173.194.69.138,
+ 173.194.69.102]
+ answers:
+ - [<RR name=google.com type=A class=IN ttl=54s auth=False>, <A address=173.194.69.100
+ ttl=54>]
+ - [<RR name=google.com type=A class=IN ttl=54s auth=False>, <A address=173.194.69.139
+ ttl=54>]
+ - [<RR name=google.com type=A class=IN ttl=54s auth=False>, <A address=173.194.69.113
+ ttl=54>]
+ - [<RR name=google.com type=A class=IN ttl=54s auth=False>, <A address=173.194.69.101
+ ttl=54>]
+ - [<RR name=google.com type=A class=IN ttl=54s auth=False>, <A address=173.194.69.138
+ ttl=54>]
+ - [<RR name=google.com type=A class=IN ttl=54s auth=False>, <A address=173.194.69.102
+ ttl=54>]
+ query: '[Query(''google.com'', 1, 1)]'
+ query_type: A
+ resolver: [8.8.8.8, 53]
+ tampering: {8.8.8.8: false}
+ test_name: test_a_lookup
+ test_runtime: 0.08325004577636719
+ test_started: 1354187839.51091
+ ...
+ ---
+ input: measurementlab.net
+ report:
+ control_resolver: &id001 [8.8.8.8, 53]
+ queries:
+ - addrs: [72.249.86.184]
+ answers:
+ - [<RR name=measurementlab.net type=A class=IN ttl=600s auth=False>, <A address=72.249.86.184
+ ttl=600>]
+ query: '[Query(''measurementlab.net'', 1, 1)]'
+ query_type: A
+ resolver: *id001
+ - addrs: [72.249.86.184]
+ answers:
+ - [<RR name=measurementlab.net type=A class=IN ttl=600s auth=False>, <A address=72.249.86.184
+ ttl=600>]
+ query: '[Query(''measurementlab.net'', 1, 1)]'
+ query_type: A
+ resolver: [8.8.8.8, 53]
+ tampering: {8.8.8.8: false}
+ test_name: test_a_lookup
+ test_runtime: 0.2565779685974121
+ test_started: 1354187839.512434
+ ...
+
+Notes: Query is the string repsentation of :class:twisted.names.dns.Query
More information about the tor-commits
mailing list