Share attack results with old vs new proxy

This commit is contained in:
eyedeekay
2024-06-03 14:17:03 -04:00
parent d45c6681ba
commit 055f425bb0

View File

@ -4,9 +4,22 @@ Divided into 2 sections.
Basic tests confirm that the functionality works as-implemented.
Extended tests ensure that features are not broken.
## Very basic tests:
**\1.** Run the test scripts.
```md
Set up:
1. Configure an I2PTunnelHTTPBrowserClient(Tabbed HTTP Proxy) on port 8888.
2. Open a terminal.
3. Run the ./test-attack-is-working.sh script
4. Run the ./test-attack-is-broken.sh script
3. View attack.log and attack-broken.log files. Observe that attack.log indicates correlation, and attack-broken.log indicates no correlation.
```
## Basic Tests:
**\1.** Confirm isolatin works on both HTTP and HTTPS URL's within I2P.
**\1.** Confirm isolation works on both HTTP and HTTPS URL's within I2P.
```md
Set up: