Dev/Leak Tests Old
- 1 OLD
- 2 Introduction
- 3 Leak through the Whonix-Gateway
- 3.1 Step 0: restrict Tor outgoing ports while testing
- 3.2 Step 1: Prepare the testing infrastructure
- 3.3 Step 2: Verify Wireshark is installed and working
- 3.4 Step 3: Verify Scapy is installed and working
- 3.5 Step 4: Do a simple ping test
- 3.6 Step 5: Setting up a “non-Tor traffic” capture with Wireshark
- 3.7 Step 6: Scapy traffic testing: IP packets
- 3.8 Step 7: Scapy traffic testing: TCP packets and ports
- 3.9 Step 8: Scapy traffic testing: UDP packets and ports
- 3.10 Step 9: undo Step 0
Old instructions for copy and paste. This is available now as a script, see Dev/Leak Tests.
This leak testing article was written by adrelanos and smarm for Whonix but it can be useful for other projects as well.
Discussion: “Leak testing” (as defined here), is the process of verifying that the Whonix-Gateway will not send unencrypted / “in the clear” network traffic. Only Tor traffic should be observed coming from the Whonix-Gateway.
Leak through the Whonix-Gateway
Due to misconfiguration of the Whonix-Gateway the Whonix-Gateway might forward traffic for Whonix-Workstation which goes not trough Tor. The following tests are designed to test for such behaviour.
Step 0: restrict Tor outgoing ports while testing
Why we do this will be clarified in Step 5.
Open your /usr/local/etc/torrc.d/50_user.conf.
sudo nano /usr/local/etc/torrc.d/50_user.conf
#+# #OptionalFeatureNr.6# #+# See Whonix/LeakTests. Activate this while testing for leaks. (Step 0) #+# Deactivate after you are done! (Important!) (Step 9) ReachableDirAddresses*:80 ReachableORAddresses*:443 FascistFirewall 1
and restart Tor using '/etc/init.d/tor restart'
This has to be undone after you finished testing. You will be reminded at the end of this chapter.
Step 1: Prepare the testing infrastructure
Three tools are used during testing:
Scapy: To create network traffic for testing. It is also desirable that the network traffic used in testing does not expose you to possible violations of security! Thus Scapy offers fine grained control over the creation of traffic for use with testing. Functionality defined here can be formalized into “Unit Tests” via UTScapy.
Python: Used to support Scapy and can be used to easily script Scapy tests.
wireshark to the Whonix-Gateway:
apt-get install tshark
Set capabilities to run wireshark with user privileges
sudo setcap cap_net_raw,cap_net_admin=eip /usr/bin/dumpcap
scapy to the Whonix-Workstation:
apt-get install python-scapy
(This automatically installs Python as a dependency of Scapy)
Step 2: Verify Wireshark is installed and working
Warning: It is unadvisable to run Wireshark as root. 'su user'
Wireshark without options will begin to capture packets on the first available interface:
You should see packets begin to scroll down the screen. This indicates you are seeing normal network traffic (ARP, DHCP requests, Tor traffic, etc). This will give you some idea of what to look for when we test for “leaked” traffic below.
Step 3: Verify Scapy is installed and working
Start Scapy with elevated privileges to allow both sending and receiving of packets:
This should present you with an interactive prompt:
Welcome to Scapy 2.1.0 >;>;>;
Other “WARNING” or “INFO” items that appear when you start Scapy, are most likely not going to effect your use of Scapy for this testing.
ls() command, to see an overview of the protocols supported by Scapy:
ls() command and pass it a protocol type, to see information supported by that protocol and its packet construction:
exit() command to end your interactive session with Scapy:
See more information at the official Scapy documentation.
Step 4: Do a simple ping test
Since Scapy is scriptable via Python, we'll use Scapy from within a Python script for our testing. An example script that creates a simple ICMP ping to the Whonix-Gateway's
Paste this code and save.
#! /usr/bin/env python # Since it will be useful to know something about the script, for the later tests, the terms are defined here: # (A discussion of Python language structure is beyond the scope of this document) #  http://en.wikipedia.org/wiki/Ipv4 #  http://en.wikipedia.org/wiki/Internet_Control_Message_Protocol #  http://en.wikipedia.org/wiki/IP_routing #  http://en.wikipedia.org/wiki/Ping #  http://en.wikipedia.org/wiki/Internet_Control_Message_Protocol#List_of_permitted_control_messages_.28incomplete_list.29 #  http://www.secdev.org/projects/scapy/doc/usage.html#send-and-receive-packets-sr #  http://www.secdev.org/projects/scapy/doc/usage.html#stacking-layers import sys from scapy.all import* # define the target gateway & data payload target # "192.168.0.1" data # "testing" # define packets # These define two variables, that are set to the object types IP and ICMP respectively. These objects in Scapy define the protocol type for IP (default IPv4)  and ICMP  respectively. And will send packets on the wire of these types when used. ip # IP() icmp # ICMP() # define packet parameters ip.dst # target # IP packets are used for routing  between networks on the Internet. So, we assign the destination (**dst**) in the IP portion of the packet we're going to assemble and send out. icmp.type # 8 icmp.code # 0 # Defines the type of ICMP message to send out. The **8 type** is a type defined as **echo request**, e.g. a simple ping . See a list here of various types of ICMP  messages here. # The sr1()  command will **send and receive network traffic, returning the 1st packet received**. # The notation of **ip/icmp/data** is the notation for encapsulation of various instances of networking protocols . Read it right to left: **data encapsulated inside an ICMP message and encapsulated inside an IP datagram**.
test_ping # sr1(ip/icmp/data)
if isinstance(test_ping, types.NoneType): print "No response" else: # Prints a short report on the packet received (if any). test_ping.summary()
Which will report the first successful ping from
eth1 on the Whonix-Gateway.
To test, simply:
sudo python simple_ping.py
Which will report with something similar to:
Begin emission: .....Finished to send 1 packets. .* Received 7 packets, got 1 answers, remaining 0 packets
Step 5: Setting up a “non-Tor traffic” capture with Wireshark
sudo -u user tshark -i eth0 -S -f "ip and src host 10.0.2.15 and not (port 80 or port 443 or port 9001 or port 9030 or ssh)"
(if you are not using VirtualBox NAT, you have to change the IP to your eth0 ip address, to find out that address type 'ifconfig') (TODO: make the command independent from the IP, use eth0)
When started wireshark should show NO packet information on the screen, as opposed to above where we capture Everything. To verify it is working correctly (and logging something, as opposed to logging nothing), (open a second SSH session or learn 'screen') from your Whonix-Gateway attempt to ping google.com. This should show something similar to:
5.115829 <eth0 IP address>; ->; <nearby Google mirror>; ICMP 98 Echo (ping) request id#0x1010,
seq#1/256, ttl#64 5.184410 <eth0 IP address> ->; <DNS server> DNS 86 Standard query PTR <some reverse IP> .in-addr.arpa
Where the IP and DNS names have been redacted to protect the innocent.
Leave this capture running for subsequent tests.
(See the tshark manual page for more information)
-S: Decode and display packets even while writing raw packet data using the -w option.
-i: Set the name of the network interface or pipe to use for live packet capture.
-f: Set the capture filter expression.
The “capture expression” (the bit in quotes above, after the '-f') reads: IP packets and from host 10.0.2.15 (your eth0 IP address) where the ports are NOT 80, 443, 9901 or 9030 (common ports for Tor, see the FAQ). The “ssh” keyword on the end is a predefined primitive in wireshark, used to define SSH traffic only. Adding this should not effect your capture if you are not using SSH to connect to the gateway, but should save you quite a bit of trouble filtering out your SSH traffic if you are.
See the documentation for the format of the “capture filter” here, for more information.
(Note: This may not cover all valid TOR traffic emiting from your Whonix, some Tor nodes may use non-standard ports and was observed during testing. The FAQ above, also covers this.)
Step 6: Scapy traffic testing: IP packets
Other testing is in the same vein as our ping (above).
First: We'll test IP datagrams of all types to see if any are emitted:
Paste this code and save.
#! /usr/bin/env python import sys from scapy.all import* #define the target gateway & data payload target # "google.com" data # "testing" #define packet ip # IP() #define packet parameters ip.dst # target #loop through all IP packet types for ip_type in range(0,255): ip.proto # ip_type send(ip/data)
sudo python exhaustive_ip_send.py
Step 7: Scapy traffic testing: TCP packets and ports
Second: We'll test TCP packets across all ports: (Note: This may appear as an ATTACK from some conservative ISP's / sites, use with caution. Google fields many of these types of scan's per day, so testing like this is most likely lost in the noise)
Paste this code and safe.
#! /usr/bin/env python import sys from scapy.all import* #define the target gateway & data payload target # "google.com" data # "testing" #define packets ip # IP() tcp # TCP() #define packet parameters ip.dst # target #loop through all TCP ports for tcp_port in range(0,65535): tcp.dport # tcp_port send(ip/tcp/data)
sudo python tcp_test.py
Again Whonix-Gateway should report NO activity, otherwise we've found a leak TCP / UDP port number documentation.
Step 8: Scapy traffic testing: UDP packets and ports
Third: We'll test UDP packets across all ports:
(Note: This may also be construed as an attack, Google is a good target for this, just as with the TCP test)
Paste this code and safe.
#! /usr/bin/env python import sys from scapy.all import* #define the target gateway & data payload target # "google.com" data # "testing" #define packets ip # IP() udp # UDP() #define packet parameters ip.dst # target #loop through all TCP ports for udp_port in range(0,65535): udp.dport # udp_port send(ip/udp/data)
sudo python udp_test.py
Again, check for leaks. TCP / UDP port number documentation.
Step 9: undo Step 0
Undo Step 0 now!
This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! See Conditions for Contributions to Whonix, then Edit! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.