Changes between Version 27 and Version 28 of doc/TorBOX/TestAndTroubleshoot


Ignore:
Timestamp:
Sep 27, 2012, 11:47:59 PM (6 years ago)
Author:
proper
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • doc/TorBOX/TestAndTroubleshoot

    v27 v28  
    1 [[TOC(noheading, depth=0)]]
    2 [https://trac.torproject.org/projects/tor/wiki/doc/TorBOX aos Homepage]
     1TorBOX has been renamed to Whonix.
    32
    4 = Tests on both Virtual Machines =
    5 /home/user/torboxinstalllog Must NOT exist.
    6 {{{
    7 nano /home/user/torboxinstalllog
    8 }}}
     3This page has been moved. The History of this page might still be interesting.
    94
    10 Always test first, if your host internet connection is working. (ping 8.8.8.8, ping google.com, etc).
    11 {{{
    12 
    13 }}}
    14 
    15 Make sure both VMs are online.
    16 {{{
    17 
    18 }}}
    19 
    20 Check content of '/etc/network/interfaces'.
    21 {{{
    22 
    23 nano /etc/network/interfaces
    24 }}}
    25 
    26 Check content of '/etc/resolv.conf'.
    27 {{{
    28 nano /etc/resolv.conf
    29 }}}
    30 
    31 Compare /etc/apt/sources.list from host operating system system with VM operating system.
    32 {{{
    33 nano /etc/apt/sources.list
    34 }}}
    35 
    36 Check contents of /etc/resolv.conf.
    37 {{{
    38 nano /etc/resolv.conf
    39 }}}
    40 
    41 Run 'locale'. Must not report any error. Compare results with your regular operating system.
    42 {{{
    43 locale
    44 sudo locale
    45 }}}
    46 
    47 'sudo dpkg-reconfigure -a' must be silent, i.e. not show any errors, must show output at all.
    48 {{{
    49 sudo dpkg-reconfigure -a
    50 }}}
    51 
    52 Apt-get must be fully functional.
    53 {{{
    54 sudo apt-get update
    55 sudo apt-get dist-upgrade
    56 }}}
    57 
    58 Check iptables.
    59 {{{
    60 sudo iptables --list
    61 }}}
    62 
    63 = Test on aos-Gateway =
    64 Check your `route` command, make sure the network 192.168.0.0 is associated with eth1.
    65 {{{
    66 route
    67 }}}
    68 
    69 Test the Firewall:
    70 {{{
    71 sudo /etc/init.d/networking restart | less
    72 }}}
    73 
    74 Check if Tor is running with 'pgrep tor -l', this should return something like "103 tor". If not try 'sudo service tor start' and check for any errors.
    75 {{{
    76 pgrep tor -l
    77 }}}
    78 
    79 Check the status of Tor.
    80 {{{
    81 sudo service tor status | less
    82 }}}
    83 
    84 Should reply with.
    85 {{{
    86 tor is running.
    87 }}}
    88 
    89 Restart Tor.
    90 {{{
    91 sudo service tor restart | less
    92 }}}
    93 
    94 Tor should show only notices, no errors:
    95 
    96 Check the logs.
    97 {{{
    98 less /var/log/tor/log
    99 }}}
    100 
    101 Check time.
    102 {{{
    103 date
    104 }}}
    105 
    106 Verify Tor configuration is valid:
    107 {{{
    108 sudo tor --verify-config | less
    109 }}}
    110 
    111 You should see confirmation:
    112 
    113 {{{
    114 Configuration was valid
    115 }}}
    116 
    117 Test if arm is fully functional.
    118 {{{
    119 arm
    120 }}}
    121 
    122 Test if arm's new identity function is working.
    123 {{{
    124 
    125 }}}
    126 
    127 Install a small text-based browser and torsocks
    128 
    129 {{{
    130 sudo apt-get -y install links torsocks ca-certificates
    131 }}}
    132 
    133 Now use the tools together to connect to the special “testing” site via tor:
    134 
    135 {{{
    136 usewithtor links https://check.torproject.org/
    137 }}}
    138 
    139 You should receive a “Congratulations.  Your browser is configured to use Tor.” message.  If not, there is some issue with the Tor installation or firewall configuration.  Find more information [https://www.torproject.org/docs/tor-doc-unix.html.en#verify here on troubleshooting your Tor installation]. [https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO#Abouttorsocks See documentation on torsocks here.]
    140 
    141 [https://www.torproject.org/docs/tor-doc-unix.html.en#verify See Tor documentation for testing]
    142 {{{
    143 
    144 }}}
    145 
    146 After logging in you should see aos help/welcome/disclaimer message.
    147 {{{
    148 
    149 }}}
    150 
    151 = Test aos-Workstation =
    152 Power off aos-Gateway. Try to ping outside or to use the browser in aos-Workstation. Obviously, should NOT work.
    153 {{{
    154 
    155 }}}
    156 
    157 Power on aos-Gateway again. Visit https://check.torproject.org/ with Tor Browser. You should see a “Congratulations”.
    158 {{{
    159 
    160 }}}
    161 
    162 Use a Tor Browser to visit a .onion address (Try the [http://idnxcnkne4qt76tg.onion torproject.org hidden service])
    163 {{{
    164 http://idnxcnkne4qt76tg.onion
    165 }}}
    166 
    167 Note: Ping commands should NOT work for external addresses from your aos-Workstation, [http://en.wikipedia.org/wiki/Internet_Control_Message_Protocol ICMP traffic] is not proxied, and filtered by /etc/torboxfirewall.sh, because Tor does not support UDP.
    168 {{{
    169 
    170 }}}
    171 
    172 ''dig google.com'' must only return a single IP, compare with the output on aos-Gateway or Host.
    173 {{{
    174 dig google.com
    175 }}}
    176 
    177 Test gpg.
    178 {{{
    179 # Example:
    180 gpg --keyserver keys.gnupg.net --recv A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89
    181 }}}
    182 
    183 Test wget.
    184 {{{
    185 wget http://idnxcnkne4qt76tg.onion
    186 }}}
    187 
    188 Setup a hidden service on aos-Gateway and test if it works. You can access your own test hidden service using Tor Browser.
    189 {{{
    190 
    191 }}}
    192 
    193 Test torcheck.
    194 {{{
    195 torcheck
    196 }}}
    197 
    198 See if torcheck gets autostarted.
    199 {{{
    200 
    201 }}}
    202 
    203 Test XChat, connect to a an SSL protected and to a hidden IRC server.
    204 {{{
    205 
    206 }}}
     5https://sourceforge.net/p/whonix/wiki/Test/