def diagnose(): """Run diagnostics and return the results.""" results = [] results.append(action_utils.diagnose_port_listening(9050, "tcp4")) results.append(action_utils.diagnose_port_listening(9050, "tcp6")) results.append(action_utils.diagnose_port_listening(9040, "tcp4")) results.append(action_utils.diagnose_port_listening(9040, "tcp6")) results.append(action_utils.diagnose_port_listening(9053, "udp4")) results.append(action_utils.diagnose_port_listening(9053, "udp6")) results.extend(_diagnose_control_port()) output = actions.superuser_run("tor", ["get-ports"]) ports = json.loads(output) results.append([_("Tor relay port available"), "passed" if "orport" in ports else "failed"]) if "orport" in ports: results.append(action_utils.diagnose_port_listening(ports["orport"], "tcp4")) results.append(action_utils.diagnose_port_listening(ports["orport"], "tcp6")) results.append([_("Obfs3 transport registered"), "passed" if "obfs3" in ports else "failed"]) if "obfs3" in ports: results.append(action_utils.diagnose_port_listening(ports["obfs3"], "tcp4")) results.append([_("Obfs4 transport registered"), "passed" if "obfs4" in ports else "failed"]) if "obfs4" in ports: results.append(action_utils.diagnose_port_listening(ports["obfs4"], "tcp4")) results.append(_diagnose_url_via_tor("http://www.debian.org", "4")) results.append(_diagnose_url_via_tor("http://www.debian.org", "6")) results.append(_diagnose_tor_use("https://check.torproject.org", "4")) results.append(_diagnose_tor_use("https://check.torproject.org", "6")) return results
def diagnose(): """Run diagnostics and return the results.""" results = [] results.append(action_utils.diagnose_port_listening(4242, 'tcp4')) results.append(action_utils.diagnose_port_listening(4242, 'tcp6')) return results
def diagnose(): """Run diagnostics and return the results.""" results = [] results.append(action_utils.diagnose_port_listening(9091, "tcp4")) results.append(action_utils.diagnose_port_listening(9091, "tcp6")) results.extend(action_utils.diagnose_url_on_all("https://{host}/transmission", check_certificate=False)) return results
def diagnose(): """Run diagnostics and return the results.""" results = [] results.append(action_utils.diagnose_port_listening(8000, 'tcp4')) results.append(action_utils.diagnose_port_listening(8000, 'tcp6')) results.extend(action_utils.diagnose_url_on_all( 'http://{host}/plinth/', check_certificate=False)) return results
def diagnose(): """Run diagnostics and return the results.""" results = [] results.append(action_utils.diagnose_port_listening(64738, "tcp4")) results.append(action_utils.diagnose_port_listening(64738, "tcp6")) results.append(action_utils.diagnose_port_listening(64738, "udp4")) results.append(action_utils.diagnose_port_listening(64738, "udp6")) return results
def diagnose(): """Run diagnostics and return the results.""" results = [] results.append(action_utils.diagnose_port_listening(8118, 'tcp4')) results.append(action_utils.diagnose_port_listening(8118, 'tcp6')) results.append(action_utils.diagnose_url('https://www.debian.org')) results.extend(diagnose_url_with_proxy()) return results
def diagnose(): """Run diagnostics and return the results.""" results = [] results.append(action_utils.diagnose_port_listening(53, 'tcp6')) results.append(action_utils.diagnose_port_listening(53, 'udp6')) results.append(action_utils.diagnose_port_listening(53, 'tcp4')) results.append(action_utils.diagnose_port_listening(53, 'udp4')) return results
def diagnose(): """Run diagnostics and return the results.""" results = [] results.append(action_utils.diagnose_port_listening(8112, 'tcp4')) results.append(action_utils.diagnose_port_listening(8112, 'tcp6')) results.extend(action_utils.diagnose_url_on_all( 'https://{host}/deluge', extra_options=['--no-check-certificate'])) return results
def diagnose(): """Run diagnostics and return the results.""" results = [] results.append(action_utils.diagnose_port_listening(8000, 'tcp4')) results.append(action_utils.diagnose_port_listening(8000, 'tcp6')) results.extend( action_utils.diagnose_url_on_all('http://{host}/plinth/', check_certificate=False)) return results
def diagnose(): """Run diagnostics and return the results.""" results = [] results.append(action_utils.diagnose_port_listening(8112, 'tcp4')) results.append(action_utils.diagnose_port_listening(8112, 'tcp6')) results.extend( action_utils.diagnose_url_on_all( 'https://{host}/deluge', extra_options=['--no-check-certificate'])) return results
def diagnose(): """Run diagnostics and return the results.""" results = [] results.append(action_utils.diagnose_port_listening(389, 'tcp4')) results.append(action_utils.diagnose_port_listening(389, 'tcp6')) results.append(_diagnose_ldap_entry('dc=thisbox')) results.append(_diagnose_ldap_entry('ou=people')) results.append(_diagnose_ldap_entry('ou=groups')) return results
def diagnose(): """Run diagnostics and return the results.""" results = [] results.append(action_utils.diagnose_port_listening(9050, 'tcp4')) results.append(action_utils.diagnose_port_listening(9050, 'tcp6')) results.append(action_utils.diagnose_port_listening(9040, 'tcp4')) results.append(action_utils.diagnose_port_listening(9040, 'tcp6')) results.append(action_utils.diagnose_port_listening(9053, 'udp4')) results.append(action_utils.diagnose_port_listening(9053, 'udp6')) results.extend(_diagnose_control_port()) output = actions.superuser_run('tor', ['get-ports']) ports = [line.split() for line in output.splitlines()] ports = {port_type: int(port) for port_type, port in ports} results.append([ _('Tor relay port available'), 'passed' if 'orport' in ports else 'failed' ]) if 'orport' in ports: results.append( action_utils.diagnose_port_listening(ports['orport'], 'tcp4')) results.append( action_utils.diagnose_port_listening(ports['orport'], 'tcp6')) results.append([ _('Obfs3 transport registered'), 'passed' if 'obfs3' in ports else 'failed' ]) if 'obfs3' in ports: results.append( action_utils.diagnose_port_listening(ports['obfs3'], 'tcp4')) results.append([ _('Obfs4 transport registered'), 'passed' if 'obfs4' in ports else 'failed' ]) if 'obfs4' in ports: results.append( action_utils.diagnose_port_listening(ports['obfs4'], 'tcp4')) results.append(_diagnose_url_via_tor('http://www.debian.org', '4')) results.append(_diagnose_url_via_tor('http://www.debian.org', '6')) results.append(_diagnose_tor_use('https://check.torproject.org', '4')) results.append(_diagnose_tor_use('https://check.torproject.org', '6')) return results
def diagnose(): """Run diagnostics and return the results.""" results = [] interfaces = _get_shared_interfaces() addresses = _get_interface_addresses(interfaces) for address in addresses: results.append(action_utils.diagnose_port_listening(53, 'tcp', address)) results.append(action_utils.diagnose_port_listening(53, 'udp', address)) results.append(_diagnose_dnssec('4')) results.append(_diagnose_dnssec('6')) return results
def diagnose(): """Run diagnostics and return the results.""" results = [] interfaces = _get_shared_interfaces() addresses = _get_interface_addresses(interfaces) for address in addresses: results.append(action_utils.diagnose_port_listening(53, "tcp", address)) results.append(action_utils.diagnose_port_listening(53, "udp", address)) results.append(_diagnose_dnssec("4")) results.append(_diagnose_dnssec("6")) return results
def diagnose(): """Run diagnostics and return the results.""" results = [] results.append(action_utils.diagnose_port_listening(9050, 'tcp4')) results.append(action_utils.diagnose_port_listening(9050, 'tcp6')) results.append(action_utils.diagnose_port_listening(9040, 'tcp4')) results.append(action_utils.diagnose_port_listening(9040, 'tcp6')) results.append(action_utils.diagnose_port_listening(9053, 'udp4')) results.append(action_utils.diagnose_port_listening(9053, 'udp6')) results.extend(_diagnose_control_port()) output = actions.superuser_run('tor', ['get-ports']) ports = [line.split() for line in output.splitlines()] ports = {port_type: int(port) for port_type, port in ports} results.append([_('Tor relay port available'), 'passed' if 'orport' in ports else 'failed']) if 'orport' in ports: results.append(action_utils.diagnose_port_listening(ports['orport'], 'tcp4')) results.append(action_utils.diagnose_port_listening(ports['orport'], 'tcp6')) results.append([_('Obfs3 transport registered'), 'passed' if 'obfs3' in ports else 'failed']) if 'obfs3' in ports: results.append(action_utils.diagnose_port_listening(ports['obfs3'], 'tcp4')) results.append([_('Scramblesuit transport registered'), 'passed' if 'scramblesuit' in ports else 'failed']) if 'scramblesuit' in ports: results.append(action_utils.diagnose_port_listening( ports['scramblesuit'], 'tcp4')) results.append(_diagnose_url_via_tor('http://www.debian.org', '4')) results.append(_diagnose_url_via_tor('http://www.debian.org', '6')) results.append(_diagnose_tor_use('https://check.torproject.org', '4')) results.append(_diagnose_tor_use('https://check.torproject.org', '6')) return results
def diagnose(): """Run diagnostics and return the results.""" results = [] results.append(action_utils.diagnose_port_listening(9050, 'tcp4')) results.append(action_utils.diagnose_port_listening(9050, 'tcp6')) results.append(action_utils.diagnose_port_listening(9040, 'tcp4')) results.append(action_utils.diagnose_port_listening(9040, 'tcp6')) results.append(action_utils.diagnose_port_listening(9053, 'udp4')) results.append(action_utils.diagnose_port_listening(9053, 'udp6')) results.extend(_diagnose_control_port()) output = actions.superuser_run('tor', ['get-status']) ports = json.loads(output)['ports'] results.append([_('Tor relay port available'), 'passed' if 'orport' in ports else 'failed']) if 'orport' in ports: results.append(action_utils.diagnose_port_listening(ports['orport'], 'tcp4')) results.append(action_utils.diagnose_port_listening(ports['orport'], 'tcp6')) results.append([_('Obfs3 transport registered'), 'passed' if 'obfs3' in ports else 'failed']) if 'obfs3' in ports: results.append(action_utils.diagnose_port_listening(ports['obfs3'], 'tcp4')) results.append([_('Obfs4 transport registered'), 'passed' if 'obfs4' in ports else 'failed']) if 'obfs4' in ports: results.append(action_utils.diagnose_port_listening( ports['obfs4'], 'tcp4')) results.append(_diagnose_url_via_tor('http://www.debian.org', '4')) results.append(_diagnose_url_via_tor('http://www.debian.org', '6')) results.append(_diagnose_tor_use('https://check.torproject.org', '4')) results.append(_diagnose_tor_use('https://check.torproject.org', '6')) return results
def diagnose(): """Run diagnostics and return the results.""" results = [] results.append(action_utils.diagnose_port_listening(9050, "tcp4")) results.append(action_utils.diagnose_port_listening(9050, "tcp6")) results.append(action_utils.diagnose_port_listening(9040, "tcp4")) results.append(action_utils.diagnose_port_listening(9040, "tcp6")) results.append(action_utils.diagnose_port_listening(9053, "udp4")) results.append(action_utils.diagnose_port_listening(9053, "udp6")) results.extend(_diagnose_control_port()) output = actions.superuser_run("tor", ["get-ports"]) ports = [line.split() for line in output.splitlines()] ports = {port_type: int(port) for port_type, port in ports} results.append([_("Tor relay port available"), "passed" if "orport" in ports else "failed"]) if "orport" in ports: results.append(action_utils.diagnose_port_listening(ports["orport"], "tcp4")) results.append(action_utils.diagnose_port_listening(ports["orport"], "tcp6")) results.append([_("Obfs3 transport registered"), "passed" if "obfs3" in ports else "failed"]) if "obfs3" in ports: results.append(action_utils.diagnose_port_listening(ports["obfs3"], "tcp4")) results.append([_("Scramblesuit transport registered"), "passed" if "scramblesuit" in ports else "failed"]) if "scramblesuit" in ports: results.append(action_utils.diagnose_port_listening(ports["scramblesuit"], "tcp4")) results.append(_diagnose_url_via_tor("http://www.debian.org", "4")) results.append(_diagnose_url_via_tor("http://www.debian.org", "6")) results.append(_diagnose_tor_use("https://check.torproject.org", "4")) results.append(_diagnose_tor_use("https://check.torproject.org", "6")) return results
def diagnose(): """Run diagnostics and return the results.""" results = [] results.append(action_utils.diagnose_port_listening(5222, 'tcp4')) results.append(action_utils.diagnose_port_listening(5222, 'tcp6')) results.append(action_utils.diagnose_port_listening(5269, 'tcp4')) results.append(action_utils.diagnose_port_listening(5269, 'tcp6')) results.append(action_utils.diagnose_port_listening(5280, 'tcp4')) results.append(action_utils.diagnose_port_listening(5280, 'tcp6')) results.extend(action_utils.diagnose_url_on_all('http://{host}/jwchat')) return results
def diagnose(): """Run diagnostics and return the results.""" return [action_utils.diagnose_port_listening(1194, 'udp4')]