1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77
|
East of the Sun & West of the Moon
==================================
The following is an overview of some of the utilities Stem provides.
* :ref:`connection-resolution`
.. _connection-resolution:
Connection Resolution
---------------------
Connection information is a useful tool for learning more about network
applications like Tor. Our :func:`stem.util.connection.get_connections`
function provides an easy method for accessing this information, with a few
caveats...
* Connection resolvers are platform specific. We `support several
<../api/util/connection.html#stem.util.connection.Resolver>`_ but not not
all, most notably Windows (:trac:`9850`).
* By default Tor runs with a feature called **DisableDebuggerAttachment**. This
prevents debugging applications like gdb from analyzing Tor unless it is run
as root. Unfortunately this also alters the permissions of the Tor process
/proc contents breaking numerous system tools (including our resolvers). To
use this function you need to either run as root (discouraged) or add
**DisableDebuggerAttachment 0** to your torrc.
Please note that if you operate an exit relay it is **highly** discouraged for
you to look at or record this information. Not only is doing so eavesdropping,
but likely also a violation of wiretap laws.
With that out of the way, how do you look up this information? Below is a
simple script that dumps Tor's present connections.
::
import sys
from stem.util.connection import get_connections, get_system_resolvers
from stem.util.system import get_pid_by_name
resolvers = get_system_resolvers()
if not resolvers:
print "Stem doesn't support any connection resolvers on our platform."
sys.exit(1)
picked_resolver = resolvers[0] # lets just opt for the first
print "Our platform supports connection resolution via: %s (picked %s)" % (', '.join(resolvers), picked_resolver)
tor_pids = get_pid_by_name('tor', multiple = True)
if not tor_pids:
print "Unable to get tor's pid. Is it running?"
sys.exit(1)
elif len(tor_pids) > 1:
print "You're running %i instances of tor, picking the one with pid %i" % (len(tor_pids), tor_pids[0])
else:
print "Tor is running with pid %i" % tor_pids[0]
print "\nConnections:\n"
for conn in get_connections(picked_resolver, process_pid = tor_pids[0], process_name = 'tor'):
print " %s:%s => %s:%s" % (conn.local_address, conn.local_port, conn.remote_address, conn.remote_port)
::
% python example.py
Our platform supports connection resolution via: proc, netstat, sockstat, lsof, ss (picked proc)
Tor is running with pid 17303
Connections:
192.168.0.1:59014 => 38.229.79.2:443
192.168.0.1:58822 => 68.169.35.102:443
|