On Mon, Oct 01, 2012 at 09:13:58AM +0000, Ague Mill wrote:
> On Sun, Sep 30, 2012 at 03:46:57PM +0200, bertagaz@??? wrote:
> > Done the tests, works as expected, merged (with --no-ff this time) in
> > devel, and pushed.
>
> Could you outline how you made those tests (e.g. tools, process)?
Ok, so before noting it down on the release tests page, here how I
proceeded :
First open a bunch of spying windows :
* Start a root terminal and sniff the SocksPorts :
`tcpdump -i lo port 9050 or port 9061 or port 9062 or port 9063`
* Start another root terminal and follow /var/log/kern.log (to see the
trafic blocked by our firewall)
* Open Vidalias's network map, to see the different circuits (optional
as for this tests we assume that stream isolation works as expected in
Tor).
Then proceed with the tests written on the release tests page for this
feature. Watch on the spying windows if the traffic behave correctly.
To test the torsocks / torify part, I used wget and had to modify
/etc/wgetrc, set use_proxy to `off`, then unset $http_proxy and
$HTTP_PROXY. I also used wget to test polipo. I also tested pidgin, by
enabling all the default accounts and see if a new circuit was used for
each one.
I think that's it.
bert.