TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Tunneling traffic through DNS, a.k.a free internet in cafes/airports

112 pointsby matiabout 16 years ago

12 comments

fdbabout 16 years ago
This is a great hack, although it requires a lot of work. I have it installed on my server and my Mac, and surfing/e-mailing works fine.<p>I have been toying with the idea of having the client part ported to my iPhone, so I can use paywall wifi directly from a mobile device. This would require porting the Perl client code over to C.
评论 #513147 未加载
breilyabout 16 years ago
This is also possible by tunneling through ICMP: <a href="http://www.cs.uit.no/~daniels/PingTunnel/" rel="nofollow">http://www.cs.uit.no/~daniels/PingTunnel/</a>
评论 #513267 未加载
ewsabout 16 years ago
I use &#60;a href=code.kryo.se/iodine&#62;iodine&#60;/a&#62; as a wrapper for this, and I use it <i>very</i> frequently (as I fly internationally at least once every few weeks). It usually sits as a service on my home server. So far the only airport where I didn't make it to work was in Miami (where I connected though a socks tunnel though my iphone 3g anyways).<p>dns tunelling is slow, but handy for console/screen situations. I usually use it to download the newspaper before getting into the plane (a bunch of wgets) and refresh the rss feeds on newsbeuter.
woobyabout 16 years ago
Use Kismac to collect MAC addresses with significant packets in/out, clone a MAC, ssh -D9091 to my remote server, tunnel everything through my local SOCKS5 port 9091. Works well enough for me.
评论 #513936 未加载
adatta02about 16 years ago
I might be wrong, but wouldn't this not help the situation at airports where the AP resolves all DNS requests to a page that is like "pay for service!"?<p>I was under the impression that in those configurations the AP intercepts all the DNS packets and responds with a fixed IP.<p>It would be nice to get around port blocking filters though...
评论 #512463 未加载
oldgreggabout 16 years ago
I've set this up and it's pretty slow. Cool hack though. Better off with 3G card or tethering bluetooth on a 2G network. Useful with international travel though where phones get sketchy...
lackerabout 16 years ago
Won't this be too slow to be useful for anything except a proof of concept?
评论 #512074 未加载
评论 #511989 未加载
jorgemabout 16 years ago
&#62;&#62; I offer to set up a subdomain for you which delegates all requests (see above) to your fake nameserver.<p>Isn't that just like publishing-to-all-hackers your "not so secure" server?
chris11about 16 years ago
Does anyone know how secure this is? I'm assuming that the traffic is unencrypted, so technically your packets could be intercepted.
评论 #512601 未加载
aleccoabout 16 years ago
It's a great way to bypass firewalls. Wasn't this used in a worm in the 90s?
ethosabout 16 years ago
&#62;...called OzymanDNS ...<p>Ozymandias? Haha, is that a Watchmen reference? If so, how apropos. "Quis custodiet ipsos custodes?" Not the folks running open hotspots.
lowkeyabout 16 years ago
I refuse to call myself a hacker until I can test this. Hot!