[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #7228 [Ooni]: Detect if the client is behind NAT
#7228: Detect if the client is behind NAT
-------------------------+--------------------------------------------------
Reporter: hellais | Owner: hellais
Type: enhancement | Status: new
Priority: minor | Milestone:
Component: Ooni | Version:
Keywords: oonib | Parent:
Points: | Actualpoints:
-------------------------+--------------------------------------------------
Comment(by ioerror):
The easy way is to see if we have an RFC1918 address. If we do, we can be
pretty sure that we're behind a NAT.
The more involved way is to actually emulate all of the Netalyzer tests.
As a first iteration, I propose we just look to see if we have an
interface bound to an RFC1918 address or if our gateway is an RFC1918
address.
As a second iteration, I propose we tcptraceroute with a three hop ttl to
see if we see any RFC1918 addresses.
As a third iteration, I propose Netalyzer tests that talk to a third
server. This iteration should be broken down into a series of tests that
we implement incrementally.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/7228#comment:1>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs