Changes between Version 124 and Version 125 of AnonymityModule


Ignore:
Timestamp:
Jul 8, 2011 9:37:25 AM (13 years ago)
Author:
TTaggart
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • AnonymityModule

    v124 v125  
    3939For this exercise, we are going to set up a network with 11 different nodes.  2 nodes will be client nodes, Alice and Bob, which will be making HTTP requests from 2 other nodes, Server1 and Server2, which will be running Apache2.  There will be a proxy node running tinyproxy, 4 nodes running the Tor program, and 2 routers. Once we set up the network, we will set up tinyproxy on the proxy node and Apache2 on the 2 Server nodes.  Then we will have Alice make HTTP requests of the Server1 node directly, through the proxy, and through the Tor network, while we sniff the requests.  The "Wide Area" should be treated as a cloud of an unknown number of computers and routers, representing a large network where we are just highlighting the nodes used for Tor. We will then analyze this data using Wireshark to determine who is communicating and what they are saying.
    4040
    41 == Step 1 Editing your NS file ==
     41== Creating the Experiment ==
    4242
    4343Open SSH Secure File Transfer Client