Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/nullhypothesis/exitmap
A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tpo/network-health/exitmap
https://github.com/nullhypothesis/exitmap
python scanner security tor tor-network
Last synced: about 1 month ago
JSON representation
A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tpo/network-health/exitmap
- Host: GitHub
- URL: https://github.com/nullhypothesis/exitmap
- Owner: NullHypothesis
- License: gpl-3.0
- Archived: true
- Created: 2013-11-21T15:41:22.000Z (about 11 years ago)
- Default Branch: master
- Last Pushed: 2023-10-16T15:30:05.000Z (about 1 year ago)
- Last Synced: 2024-08-08T23:26:43.991Z (4 months ago)
- Topics: python, scanner, security, tor, tor-network
- Language: Python
- Homepage: https://www.cs.kau.se/philwint/spoiled_onions/
- Size: 1.51 MB
- Stars: 458
- Watchers: 41
- Forks: 107
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- Changelog: ChangeLog
- License: COPYING
Awesome Lists containing this project
- awesome-network-stuff - **424**星
README
![exitmap logo](doc/logo.png)
**This repository is unmaintained.
Refer to [The Tor Project's fork](https://gitlab.torproject.org/tpo/network-health/exitmap).**Overview
--------Exitmap is a fast and modular Python-based scanner for
[Tor](https://www.torproject.org) exit relays. Exitmap modules implement tasks
that are run over (a subset of) all exit relays. If you have a background in
functional programming, think of exitmap as a `map()` interface for Tor exit
relays: Modules can perform any TCP-based networking task like fetching a web
page, uploading a file, connecting to an SSH server, or joining an IRC channel.In practice, exitmap is useful to monitor the reliability and trustworthiness of
exit relays. The Tor Project uses exitmap to check for false negatives on the
Tor Project's [check](https://check.torproject.org) service and to find
[malicious exit relays](http://www.cs.kau.se/philwint/spoiled_onions). It is
easy to develop new modules for exitmap; just have a look at the file HACKING in
the doc/ directory or check out one of the existing modules.Exitmap uses [Stem](https://stem.torproject.org) to create circuits to all given
exit relays. Each time tor notifies exitmap of an established circuit, a module
is invoked for the newly established circuit. Modules can be pure Python
scripts or executables. For executables,
[torsocks](https://github.com/dgoulet/torsocks/) is necessary.Finally, note that exitmap is a network measurement tool and of little use to
ordinary Tor users. The Tor Project is already running the tool regularly.
More exitmap scans just cause unnecessary network load. The only reason exitmap
is publicly available is because its source code and design might be of interest
to some.Installation
------------Exitmap uses the library Stem to communicate with Tor. There are
[plenty of ways](https://stem.torproject.org/download.html) to install Stem.
The easiest might be to use pip in combination with the provided
requirements.txt file:$ pip install -r requirements.txt
Running exitmap
---------------The only argument exitmap requires is the name of a module. For example, you
can run exitmap with the checktest module by running:$ ./bin/exitmap checktest
The command line output will then show you how Tor bootstraps, the output of the
checktest module, and a scan summary. If you don't need three hops and prefer
to use two hops with a static first hop, run:$ ./bin/exitmap --first-hop 1234567890ABCDEF1234567890ABCDEF12345678 checktest
To run the same test over German exit relays only, execute:
$ ./bin/exitmap --country DE --first-hop 1234567890ABCDEF1234567890ABCDEF12345678 checktest
If you want to pause for five seconds in between circuit creations to reduce the
load on the Tor network and the scanning destination, run:$ ./bin/exitmap --build-delay 5 checktest
Note that `1234567890ABCDEF1234567890ABCDEF12345678` is a pseudo fingerprint
that you should replace with an exit relay that you control.To learn more about all of exitmap's options, run:
$ ./bin/exitmap --help
Exitmap comes with batteries included, providing the following modules:
* testfds: Tests if an exit relay is able to fetch the content of a simple
web page. If an exit relay is unable to do that, it might not have enough
file descriptors available.
* checktest: Attempts to find false negatives in the Tor Project's
[check](https://check.torproject.org) service.
* dnspoison: Attempts to resolve several domains and compares the received DNS A
records to the expected records.
* dnssec: Detects exit relays whose resolver does not validate DNSSEC.
* patchingCheck: Checks for file tampering.
* cloudflared: Checks if a web site returns a CloudFlare CAPTCHA.
* rtt: Measure round-trip times through an exit to various destinations.Configuration
-------------By default, exitmap tries to read the file .exitmaprc in your home directory.
The file accepts all command line options, but you have to replace minuses with
underscores. Here is an example:[Defaults]
first_hop = 1234567890ABCDEF1234567890ABCDEF12345678
verbosity = debug
build_delay = 1
analysis_dir = /path/to/exitmap_scansAlternatives
------------Don't like exitmap? Then have a look at
[tortunnel](http://www.thoughtcrime.org/software/tortunnel/),
[SoaT](https://gitweb.torproject.org/torflow.git/tree/NetworkScanners/ExitAuthority/README.ExitScanning),
[torscanner](https://code.google.com/p/torscanner/),
[DetecTor](http://detector.io/DetecTor.html), or
[SelekTOR](https://www.dazzleships.net/selektor-for-linux/).Tests
-----Before submitting pull requests, please make sure that all unit tests pass by
running:$ pip install -r requirements-dev.txt
$ py.test --cov-report term-missing --cov-config .coveragerc --cov=src testFeedback
--------Contact: Philipp Winter
OpenPGP fingerprint: `B369 E7A2 18FE CEAD EB96 8C73 CF70 89E3 D7FD C0D0`