10-08-2005, 01:32 PM
Try information from this site and keep us posted if it works.
http://server.abkb.info/bypass-proxy-server.html
http://server.abkb.info/bypass-proxy-server.html
Proxy Problems in Brisbane? This may help you..
|
10-08-2005, 01:32 PM
Try information from this site and keep us posted if it works.
http://server.abkb.info/bypass-proxy-server.html
10-08-2005, 01:53 PM
This one may help as well..
http://www.zensur.freerk.com/ We should all have access to access what ever information we may want or need. Nothing like freedom
10-08-2005, 02:32 PM
Sadly both are already blocked for me anyway Thanks for trying though.
10-08-2005, 02:46 PM
Its blocked over here as well
Im quit busy at college and sometimes I need to browse some websites for researches but its really pathetic to know that many websites are blocked for no proper reasons.
Is it 2008 yet..?
10-08-2005, 03:27 PM
. Introduction
1.1 About Internet censorship In the last 10 years the Internet grew very, very fast. It is a bunch of thousands of little networks put together. Billion computers are connected and it is basically not controlled or even owned by a government or company. There are no laws, everybody can put his webpages online which can be accessed by everybody on the world who is sitting in front of a computer with Internet access. I believe that this can and will change the world as we know it today. But there are several governments who think that this unlimited access to information is dangerous for their citizens. These are for example China, Saudi localia, Bahrain, Cuba, Jordan, Tunisia, Burma, Singapore, Uzbekistan, Yemen, Kuwait, Vietnam, Syria, Iran, Australia and parts of Africa. and even in countries like Australia, Switzerland and in some parts of Germany they censor websites. This ranks from a very easy to circumvent DNS blocking of only 2 Nazi sites in parts of Germany to a government office with 30.000 employees only working in blocking thousands of websites, services and ports in China. Though the blocking methods are different there are also different ways to bypass them. I will try to show you how to access the website of Amnesty International, BBC, Google and other blocked sites in your country. I made this website in very basic HTML, so that you can even view it with a very old computer. Please share this information, link the site, copy it, mirror it, print it (I didn't "hide" any links, so that no link is lost when you print it) and teach your friends and relatives! More info: http://www.encyclopedia-online.info/Cens...cyberspace 1.2 My reasons for writing this Well, I'm living in Germany, which is not very famous for it's censoring. But the local government from one of the 16 German states (NRW) tries to introduce censorship by blocking 2 US Nazi sites. Sure, I really don't like those guys but in my opinion no government or even a system administrator got the right to choose which information a individual have access to. What websites are next? Who chooses which websites will be blocked? Additionally, my school blocks some websites and so I became interesting in this topic. 1.3 How to get this file As you are reading this you actually found this file somewhere. The most updated version you can get here: European mirror: http://www.zensur.freerk.com/ - (Lambdanet - Erfurt, Germany) American mirror: http://nocensor.citizenlab.org/ - (University of Toronto - Toronto, Canada) Asian/Pacific mirror: http://blocks.orcon.net.nz/ - (Orcon ISP - Auckland, New Zealand) SSL mirror: https://secure.sslpowered.com/bpass/ (Netfirms, Toronto, Canada) and https://ssl-account.com/zensur.freerk.com/ Dynamic IP mirror: http://maybe-yours.dyndns.org/ (please email me!) eMail autoresponder: index.htm@zensur.freerk.com (just send an empty email, you will instantly get this text as plain HTML in return) Google Cache: http://www.google.com/search?q=cache:www...reerk.com/ - (maybe some days old) 1.4 License Permission is hereby granted, free of charge, to any person obtaining a copy of this document, to deal with this document without restriction, including without limitation the rights to use, copy, modify, translate, merge, publish, distribute, and/or sell copies of the document, and to permit persons to whom the document is furnished to do so, provided that the author (Freerk) and at least two mirror server of the original text (see: 1.3 How to get this file) appear in all copies of the document. Basicaly this means that you can do anything with this text as long as you mention my name and a way to obtain this original file. First I wanted to publish this paper under the GNU Free Documentation License (http://www.gnu.org/licenses/fdl.html) but I think the licence is to restrictive and complicated (see also: Why You Shouldn't Use the GNU FDL - http://home.twcny.rr.com/nerode/neroden/fdl.html). So I made up my own one based on the X11 licence (http://www.x.org/Downloads_terms.html). -------------------------------------------------------------------------------- back to top 2. Possible weaknesses You have to choose to bypass the Internet censorship or not. I only show you how to do it, I can't take any responsibility. In several censor countries you will go to jail if they catch you, in a lot of companies you will get fired and some schools will ban you. Of course the censors not only block Internet traffic, they are also looking at it (in countries/companies with a little Internet population) and try to find out who is bypassing their firewall how. An easy way to find out who (and how) is bypassing the firewall is by just looking for some identicators in the logfiles: Right after the Internet connection is established the user is connecting to only one server and remains connected to it all the time he's online. What a user do right after he gets an "access denied" message from his censor. (open a special website, go to a chatroom, connect to a special server...) Try to avoid getting caught this way! Please note that the proxies on my website are not checked/verified. It could be that a censoring government run those proxies just to check who is accessing which blocked information. Maybe some of them are also maintained by hackers that can look on every information that passes their servers (your credit card information, for example). So carefuly choose the server you connect to and even think twice if you use them for the transfer of private data. More infos: http://www.peacefire.org/circumventor/li...esses.html http://peek-a-booty.org/pbhtml/downloads...istcic.htm -------------------------------------------------------------------------------- back to top 3. Different kinds of censorship There are many different solutions to censor Internet traffic. Sometimes there are 2 or more combined. Please write me to freerk@gmx.net which blocking methods are used in your country, which ISP are you using and the ways that work for you to bypass it, it would be very useful for other users! More info: http://www.encyclopedia-online.info/Cens...cyberspace 3.1 Blocked URL's via the DNS-server This is used for example from some German providers. It is a very cheap and easy censoring method and the same is true for bypassing it. First, I will explain what the Domain Name System is: Every computer on the Internet has an unique address, a little bit like a telephone number. These are 4 numbers from 0 to 255 separated with a dot. For example: 62.141.48.209 is the IP address for www.freerk.com. Because of remembering such a number is very difficult, the DNS was invented. This service maps an URL to it's IP address. If you type www.freerk.com into your browser, the request is send to the DNS-server that was automatically given to you by your ISP on dialing into the Internet. A lot of addresses are already cached, so the DNS-server sends the IP address for the URL back to you. If the DNS-server has no cached information on the site requested by you, he asks on of the 13 root servers, which know all addresses. If the DNS-server from your provider is censoring, he just refuse to send you the real IP-address. He sends you nothing or an IP from a "sorry" website. More info: http://www.encyclopedia-online.info/DNS 3.2 Forced proxy server / transparent proxy You have to specify a proxy server in your 'Internet Explorer' settings in order to get a connection to the Internet. Sometimes, the ISP is using a transparent proxy. With these you can't see easily if there is a proxy or not. Every request you send to or receive from the Internet is checked at this server and redirected to you (well, or not...). 3.3 Keyword filter This means that all Internet traffic goes through the servers of the censor, who is scanning the content for 'bad words'. This dynamic filtering is true for most filters in schools, libraries and companies. If the site contains bad words it is blocked. The person who is offering the blocked information could prevent the censoring by "hide" the content inside of images. For the user there is almost no difference, but it is difficult for a computer program to "read" the text inside an image. Also SSL encrypted traffic (a URL starting with https://...) can't be scanned easily. You can test which keywords are blocked on your connection on http://www.zensur.freerk.com/kword/ there you can enter the keyword(s) you want to test an click on "send" when you get the message "You entered [your word here]" in return everything is fine, but if you get an error message you know which words are blocked. 3.4 Blocked ports Ports are like doors for a special service to a server or PC. They rank from 0 to 65535. The standard ports are from 0 to 1024, these are the well known ports. The official list you can get under http://www.iana.org/assignments/port-numbers and a description on http://www.encyclopedia-online.info/Port_(computing). If a censor blocks a port, every traffic on this port is dropped, so its useless for you. Most censors blocks the ports 80, 1080, 3128 and 8080, because these are the common proxy ports. Because all of the proxies on common ports are useless for you, you have to find proxies that are listening on an uncommon port. These are very difficult to find. You can easily test which ports are blocked on your connection. Just open the DOS-prompt, type telnet login.icq.com 80 and hit enter. The number is the port you want to test. If you get some wired symbols in return everything is ok, if it says "timeout" or something similar, that port is blocked by your ISP. Here are the most important ports for us: 20+21 - FTP (file transfer) 22 - SSH (secure remote access) 23 - telnet (remote access) and also Wingates (special kind of proxies) 25 - SMTP (send email) 53 - DNS (resolves an URL to an IP) 80 - HTTP (normal web browsing) and also a proxy 110 - POP3 (receive email) 443 - SSL (secure HTTPS connections) 1080 - Socks proxy 3128 - Squid proxy 8000 - Junkbuster proxy 8080 - a proxy 3.5 Censorware on the client (child protection e.t.c) Normally the censorship is implemented on servers from the ISP or government, but in some schools, private homes and some companies the blocking software is installed on every PC. More info: http://www.peacefire.org/ http://www.encyclopedia-online.info/Censorware http://www.cexx.org/censware.htm http://www.epinions.com/cmsw-Kids-Topics-2 http://www.securiteam.com/securityreview...assed.html 3.5.1 NetNanny More info: http://www.netnanny.com/index.html http://peacefire.org/censorware/Net_Nanny/ 3.5.2 CyberSitter More info: http://www.cybersitter.com/ http://www.spectacle.org/alert/peace.html http://www.peacefire.org/censorware/CYBERsitter/ 3.5.3 AOL Parental Control More info: http://www.aol.com/info/parentcontrol.html 3.5.4 CyberPatrol More info: http://www.cyberpatrol.com/ http://www.peacefire.org/censorware/Cyber_Patrol/ 3.5.5. SurfControl More info: http://www.surfcontrol.com/ http://peacefire.org/censorware/SurfWatch/ 3.6 Censorware on the server (inside of networks) This are programs that are mostly installed on servers in schools, libraries, companies or countries with a little Internet population. 3.6.1 Bess/N2H2 Bess is a proxy filter that is often used in schools/universities and companies. It can easily bypassed with Webproxies. More info: http://www.n2h2.com/products/bess_home.php http://www.peacefire.org/censorware/BESS/ 3.6.2 DansGuardian It's a Open Source Webfilter. Free for non-commercial use and thus it is widely spread in universities, schools and libraries. It works as a Proxy with URL and keyword filtering (and also with the PICS-Standard). It's often used on a IPCop machine, however, the author from DansGuardian doesn't like it. More Info: http://dansguardian.org/ 3.6.3 WebSense More Info: http://www.websense.com/ http://www.peacefire.org/censorware/WebSENSE/ 3.6.4 WebWasher More Info: http://www.webwasher.com/ 3.6.5 SmartFilter More Info: http://www.securecomputing.com/index.cfm?skey=85 http://www.peacefire.org/censorware/SmartFilter/ 3.6.6 squidGuard More Info: http://www.squidguard.org/ 3.6.7 new_new 3.7 Whitelist Most Internet filters works with a blacklist, which means that access to all sites is allowed, except some special sites (well, sometimes there are a lot exceptions...). A whitelist works the other way around: Access to all sites is blocked, except some special ones. For a normal ISP it is almost impossible to offer, because the Internet is nearly worthless. The whitelist scheme is used by free Internet terminals that are sponsored by a company which allows users the free access to their e-commerce site. This filter scheme is the most difficult to circumvent. Some time ago, there was a German ISP who had a completely free 0800-dial in number. Once you dialed in, you only could surf to amazon.de and about 10 more e-commerce sites. But you could also connect to the other customers of the ISP. So somebody with a flatrate connected to both his normal ISP and the 0800-free ISP and set up a proxy. So all the users of the free ISP could use that proxy to connect to other sites. More info: http://www.encyclopedia-online.info/White_list 3.8 IP blocking on the routers -------------------------------------------------------------------------------- back to top 4. Different ways to bypass censorship Since you can't directly access a server that is blocked you have to send the request to a non blocked server which redirects the traffic to the real site you want to visit. There are different types of these "gatekeepers". 4.1 Using a different ISP Well, it's as easy as it sounds: Just change your Internet Service Provider! For example only in 'Nordrhein-Westfalen' (a state of Germany) there is a censoring firewall, you can just subscribe to an ISP outside that state. But normally the censorship counts for all the country. One possibility is to try out an ISP outside the country. That costs a lot, but that way you do have a normal Internet access and don't have to worry about getting around filters. This could be a normal dialup provider in an neighbor country or better a 2-way Internet access via satellite like http://www.europeonline.com/, http://www.remoteworkcentral.com/, http://registrierung.tiscali.de/produkte...tellit.php, http://www.gilat.de/, http://www.hns.com/, http://www.vsatnet.com/, http://www.starband.com/, http://www.wildblue.com/, http://www.skycasters.com/, http://www.directduo.com/, http://www.orbitsat.com/, http://www.ottawaonline.com/ and so on, just search with a search engine for '2-way Internet via satellite [your country or neighbor country]' or something like that. 4.2 Using a not censoring DNS-server Normally, you automatically would use the DNS-server of your ISP to resolve domain names like www.freerk.com to 62.141.48.209. Internally, only these IP-addresses are used to send/receive data in the Internet. If your DNS-server is censoring, you simply can use another DNS-server. Under Windows, just right-click in your system panel on the 'network' icon and select properties of the TCP/IP-protocol. In Linux you have to edit the '/etc/resolv.conf' file. Use the server that is (virtual) your nearest. If you want to setup your own DNS-server use Bind (http://www.isc.org/products/BIND/). The list of the 13 official root servers is located here: ftp://ftp.rs.internic.net/domain/named.root for redundancy it would be good to ad the alternative root servers located in Europe from ORSN: ftp://ftp.orsn.org/orsn/orsn.hint. Non censoring DNS-Servers: dns2.de.net - 194.246.96.49 (Frankfurt, Germany) ns1.de.eu.orsn.net - 217.146.139.5 (Hildesheim, Germany) resolver.netteam.de - 193.155.207.61 (Alfter-Impekoven, Germany) sunic.sunet.se - 192.36.125.2 (Stockholm, Sweden) master.ns.dns.be - 193.109.126.140 (Leuven, Belgium) ns1.lu.eu.orsn.net - 195.206.104.98 (Belvaux, Luxembourg) merapi.switch.ch - 130.59.211.10 (Zurich, Switzerland) prades.cesca.es - 192.94.163.152 (Barcelona, Spain) michael.vatican.va - 212.77.0.2 (Vatican City, Italy) dns.inria.fr - 193.51.208.13 (Nice, France) ns0.ja.net - 128.86.1.20 (London, UK) nic.aix.gr - 195.130.89.210 (Athens, Greece) ns.ati.tn - 193.95.66.10 (Tunis, Tunisia) ns1.relcom.ru - 193.125.152.3 (Moscow, Russia) trantor.umd.edu - 128.8.10.14 (College Park, MD, USA) ns1.berkeley.edu - 128.32.136.9 (Berkeley, CA, USA) merle.cira.ca - 64.26.149.98 (Ottawa, Canada) ns2.dns.br - 200.19.119.99 (Sao Paulo, Brasil) ns2.gisc.cl - 200.10.237.14 (Santiago, Chile) ns.uvg.edu.gt - 168.234.68.2 (Guatemala, Guatemala) ns1.retina.ar - 200.10.202.3 (Buenos Aires, Argentina) ns.unam.mx - 132.248.253.1 (Mexico City, Mexico) ns.wide.ad.jp - 203.178.136.63 (Osaka, Japan) ns.twnic.net - 192.83.166.11 (Taipei, Taiwan) ns3.dns.net.nz - 203.97.8.250 (Wellington, New Zealand) box2.aunic.net - 203.202.150.20 (Melbourne, Australia) It's also possible to act as a manual DNS server by yourself. Just use the ping or traceroute service on a non censoring machine to get the IP of your desired server. Then use the IP instead of the URL in your browser. You will always get an IP, but it won't work every time to access the website via the IP, because a lot of webhosters host up to 500 or more websites on one server with one IP. But it will work fine with bigger websites. http://195.193.168.164/ - Rotterdam, Netherlands (JAVA VISUALROUTE) https://www.velia.net/tools/traceroute.php - Hanau, Germany (HTTPS encrypted) http://www.traceroute.org/ - About 1000 public ping/traceroute gateways sorted by country More info: http://www.encyclopedia-online.info/DNS http://www.encyclopedia-online.info/Root_nameserver 4.3 Using a non censoring proxy server You can put a proxy server between your Internet connection and the site you want to visit. You send your request for a special website to that proxy server, which request the page from the Internet and deliver it to you. Normally, those servers cache the requested pages, so that on the next request he can deliver the page directly from the cache. That would be faster and cheaper. We use those servers to bypass censorship. For the eyes/computers of our ISP/Government we are only connecting to the proxy, they can't easily see, that we are connecting to a "bad site". But sometimes the standard proxy ports (80, 1080, 3128 and 8080) are blocked. In that case you have to use the proxies that are listening on an uncommon port. More info: http://www.encyclopedia-online.info/Proxy_server 4.3.1 Standard proxy Standard Proxies you can find everywhere on the net. Almost every provider offer a proxy for their customers. Here are a few, its in the widely spread "hostname:port" format. These proxies are mostly not anonymous! pdns.nd-shokusan.co.jp:80 proxy.ia2.marketscore.com:80 proxy.or3.marketscore.com:80 ce420f8a.gw209.dsl.airmail.net:80 www-proxy.HB1.srv.t-online.de:80 gas90.gas.cz:3128 kupl1.ittc.ku.edu:3128 mail.jobclub-ps.de:3128 mail.libreriaregional.com:3128 mail.pegasus-sewing.com.hk:3128 pl1.cs.utk.edu:3128 proxy.telcel.net.ve:3128 vn1.cse.wustl.edu:3128 Planetlab CoDeeN Project (http://codeen.cs.princeton.edu/ - Very fast, you can also use them on port 3127. No POST allowed, so you only can view/download webpages and use simple forms that use the GET method (like search engines) but you can not use bigger forms that use POST (like buy stuff at Amazon)). planlab1.cs.caltech.edu:3128 planetlab2.cse.msu.edu:3128 planetlab2.cs.purdue.edu:3128 planetlab2.cs.nwu.edu:3128 planetlab1.ucsd.edu:3128 planetlab-1.Stanford.EDU:3128 planetlab1.lcs.mit.edu:3128 planetlab1.eecs.umich.edu:3128 planetlab1.csres.utexas.edu:3128 planetlab1.cs.wayne.edu:3128 planetlab1.cs.Virginia.EDU:3128 planetlab1.cs.umass.edu:3128 planetlab1.cs.uiuc.edu:3128 Planetlab1.CS.UCLA.EDU:3128 planetlab1.cs.ubc.ca:3128 planetlab-1.CS.Princeton.EDU:3128 planetlab1.cs.duke.edu:3128 planetlab1.cs.cornell.edu:3128 planetlab1.cs.arizona.edu:3128 planetlab1.comet.columbia.edu:3128 PLANETLAB-1.CMCL.CS.CMU.EDU:3128 planetlab1.cis.upenn.edu:3128 planetlab-02.bu.edu:3128 planetlab01.cs.washington.edu:3128 planet2.cs.rochester.edu:3128 planet1.scs.cs.nyu.edu:3128 planet1.cs.ucsb.edu:3128 planet1.cc.gt.atl.ga.us:3128 lefthand.eecs.harvard.edu:3128 4.3.2 Uncommon port proxy Due to the fact that several censors block the common proxy ports (80, 1080, 3128 and 8080) to prevent circumvention you have to use proxies that are listening on a uncommon port. For example 8000 for the Junkbuster proxy or 6588 for the AnalogX proxy. You get a weekly updated list of Proxies that are listening on a non standard port here: http://www.web.freerk.com/proxylist.htm 4.3.3 Socks proxy More info: http://www.ufasoft.com/socks/ http://proxylbsa.netwu.com/ 4.3.4 Set up an own proxy server More info: http://www.gcd.org/sengoku/stone/ http://www.junkbusters.com/ijb.html http://www.boutell.com/rinetd/ 4.3.5 Special proxy / tunnel tools 4.3.5.1 JAP JAP is an free and open source anonymity tool invented by a German university. It sends your traffic encrypted through different mixes, so that bsaolutely nobody, not even the owner of on of the mixes know who is accessing which site. This is also on of the best tools to circumvent censorship. Just follow the installation instructions on http://anon.inf.tu-dresden.de/index_en.html or http://www.anon-online.org/index_en.html on installing the Java client (available for Windows, Unix, Linux, OS/2, Macintosh and others). Here is a list of the included servers and on which port they are connecting to: The InfoService - infoservice.inf.tu-dresden.de:6543 Dresden-Dresden - mix.inf.tu-dresden.de:6544 Dresden-ULD - mix.inf.tu-dresden.de:26544 New York-Berlin-Dresden - class25.scs.cs.nyu.edu:6544 Regensburg-HU/IWI - in: 132.199.134.2:3000 --- out: dali.wiwi.hu-berlin.de [141.20.103.68] Not working at the moment: Dresden-Luebeck - xx:9544 Luebeck-Berlin-Dresden - fddi-passat.mesh.de:6544 4.3.5.2 Httport http://www.htthost.com/ 4.3.5.3 Localproxy http://proxytools.sourceforge.net/ 4.3.5.4 HttpTunnel http://www.http-tunnel.com/ http://www.nocrew.org/software/httptunnel.html http://www.infoanarchy.org/wiki/wiki.pl?Httptunnel 4.3.5.5 Hopster Hopster is a commercial tool to circumvent firewalls in schools, companies e.t.c. The free version is only limited to a 4kb/s transfer rate (speed of a 56k modem). Just download the <1 MB Setup file and install it. It will test your connection/firewall and than configure everything automatically |
Possibly Related Threads… | |||||
Thread | Author | Replies | Views | Last Post | |
Brisbane Airport problems | jfish1936 | 1 | 5,388 |
04-09-2008, 12:51 PM Last Post: jfish1936 |
|
Problems Persist For Saudi Women Married to Non-Saudis | Yusufaustralia | 3 | 7,242 |
01-28-2006, 09:10 PM Last Post: gangster |
|
Loging in Problems?? And forum problems in general. | Leon | 2 | 5,787 |
04-06-2004, 12:00 PM Last Post: Anonymous |
Users browsing this thread: |
3 Guest(s) |