[tor-bugs] #7228 [Ooni]: Detect if the client is behind NAT

Tor Bug Tracker & Wiki blackhole at torproject.org
Tue Nov 6 23:38:22 UTC 2012


#7228: Detect if the client is behind NAT
-------------------------+--------------------------------------------------
 Reporter:  hellais      |          Owner:  hellais
     Type:  enhancement  |         Status:  new    
 Priority:  minor        |      Milestone:         
Component:  Ooni         |        Version:         
 Keywords:  oonib        |         Parent:         
   Points:               |   Actualpoints:         
-------------------------+--------------------------------------------------

Comment(by ioerror):

 The easy way is to see if we have an RFC1918 address. If we do, we can be
 pretty sure that we're behind a NAT.

 The more involved way is to actually emulate all of the Netalyzer tests.

 As a first iteration, I propose we just look to see if we have an
 interface bound to an RFC1918 address or if our gateway is an RFC1918
 address.

 As a second iteration, I propose we tcptraceroute with a three hop ttl to
 see if we see any RFC1918 addresses.

 As a third iteration, I propose Netalyzer tests that talk to a third
 server. This iteration should be broken down into a series of tests that
 we implement incrementally.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/7228#comment:1>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list