You are now rockin with the west = An Exercise in Anonymity = == Step 1 Setting Up the Network == Swap in the Experiment using [attachment:anonymous.ns this NS file] [[Image(wan.php3)]] Then log in to '''users.isi.deterlab.net''' through [http://www.chiark.greenend.org.uk/~sgtatham/putty/ Putty.] For help on logging onto Putty check out [https://trac.deterlab.net/wiki/DETERSSH this] tutorial. === Setting up apache === We need to generate traffic in our network and one of the easiest ways to do that is with HTTP traffic, so we need to set up a server and a web page. Connect to Server 1 and use the command: `sudo /proj/DeterTest/runme.nodeA` This will run a script with Apache 2 which sets up the server and web page and displays the users IP address on the Server 1 node. When prompted "Do you want to continue [Y/n]?" select `Y` Once the script is done running, the server is now set up and we can generate traffic! You can check this by typing `w3m http://localhost/cgi-bin/ip.cgi` which should display your IP address. [[Image(apache2setup.png)]] It should look like this. Repeat this process on Server 2 === Setting up the proxy node === Log onto the proxy node and use the command: `sudo /proj/DeterTest/runme.proxy` this will run a script which installs and sets up [https://banu.com/tinyproxy/ tinyproxy] on the node. The proxy is now set up! We'll get to using it in a little while. == Step 2 Generating and Listening to Network Traffic == We are now ready to begin learning! One person needs to connect to either Alice while another person logs into the server1 node (or server2 if you choose). From the server node type the command `ifconfig` This will show the ethernet links that the node is using. [[Image(ifconfig.png)]] Find the one that shows an inet address of 10.x.x.x In the example above it is eth0. Yours may be different, but that is still ok. === Direct Client-to-Server Traffic === Then type the command `sudo tcpdump -i eth0 -s 0 -x -w /tmp/direct.pcap` This will begin listening to the traffic that comes through this node and that specific ethernet link, eth0 in the example, and write the data out to the file direct.pcap in the tmp diretory. At this time, the person connected to Alice will enter the command `wget --no-proxy http://server/cgi-bin/ip.cgi`This saves a local copy of the web page set up on the server, and by doing so generates HTTP traffic to examine. We were able to listen in on this traffic thanks to the `tcpdump` command. === Client-to-Server Traffic through a Proxy === Repeat the tcpdump command `sudo tcpdump -i eth0 -s 0 -x -w /tmp/throughproxy.pcap` from the server node. However, now the user connected to Alice should enter the command `env http_proxy=http://proxy:8888 wget http://server/cgi-bin/ip.cgi` This command changes an environmental setting and sends the `wget` command through the proxy on port 8888. Tor: `torify wget http://server/cgi-bin/ip.cgi` == Step 3 Analyzing the Traffic Data ==