Share attack results with old vs new proxy
This commit is contained in:
15
TESTING.md
15
TESTING.md
@ -4,9 +4,22 @@ Divided into 2 sections.
|
||||
Basic tests confirm that the functionality works as-implemented.
|
||||
Extended tests ensure that features are not broken.
|
||||
|
||||
## Very basic tests:
|
||||
|
||||
**\1.** Run the test scripts.
|
||||
|
||||
```md
|
||||
Set up:
|
||||
1. Configure an I2PTunnelHTTPBrowserClient(Tabbed HTTP Proxy) on port 8888.
|
||||
2. Open a terminal.
|
||||
3. Run the ./test-attack-is-working.sh script
|
||||
4. Run the ./test-attack-is-broken.sh script
|
||||
3. View attack.log and attack-broken.log files. Observe that attack.log indicates correlation, and attack-broken.log indicates no correlation.
|
||||
```
|
||||
|
||||
## Basic Tests:
|
||||
|
||||
**\1.** Confirm isolatin works on both HTTP and HTTPS URL's within I2P.
|
||||
**\1.** Confirm isolation works on both HTTP and HTTPS URL's within I2P.
|
||||
|
||||
```md
|
||||
Set up:
|
||||
|
Reference in New Issue
Block a user