FlowRadar VPN Detection Testing Manual
This manual provides instructions for testing the FlowRadar VPN detection challenge using Docker and Docker Compose.
Overview
- Tests are designed to evaluate the effectiveness of your VPN detection implementation.
- Uses Docker for easy submission and testing
Quick Start Guide
Prerequisites
- Docker
- Docker Compose
Step 0: Clone the Repository [skip if you cloned already]
Step 1: Provide Your submission.py Script
- Paste your
submission.pyscript into src/flr_challenge/challenge/flowradar/src folder.
Step 2: Update Configuration Files
Step 3: Setting up environmental variables
- Change
FLR_CHALLENGE_API_KEYwith your own preferred API key. You can use any string as API key, but make sure to update it in your detection scripts as well.
Step 4: Start the Challenge Server
Step 5: Test Your Detector Script
- Visit https://localhost:10001/docs
- Authenticate using provided authentication API that you put into the
.envwithFLR_CHALLENGE_API_KEYvariable.
- Test your detection files by running the
/scoreendpoint
Important Notes
- The server runs on port 10001 by default
- Make sure port 10001 is available on your system
- All interactions are logged for analysis. Miners can check logs by running
docker compose logs -f - All commands must be executed from challenge's root directory.
- If you want score justification, you can check all results with
resultsendpoint after running thescoreendpoint.
Troubleshooting
If you encounter issues:
- Check if Docker is running
- Verify port 10001 is not in use
- Check Docker logs using
docker compose logs - Ensure you have proper permissions to run Docker commands
- If you got lower or higher score than expected, you can check the justification of your score by running
resultsendpoint after running thescoreendpoint. You can also check the logs for more details on how your detection script performed against the test cases.