TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Tunneling traffic through DNS, a.k.a free internet in cafes/airports

112 点作者 mati大约 16 年前

12 条评论

fdb大约 16 年前
This is a great hack, although it requires a lot of work. I have it installed on my server and my Mac, and surfing/e-mailing works fine.<p>I have been toying with the idea of having the client part ported to my iPhone, so I can use paywall wifi directly from a mobile device. This would require porting the Perl client code over to C.
评论 #513147 未加载
breily大约 16 年前
This is also possible by tunneling through ICMP: <a href="http://www.cs.uit.no/~daniels/PingTunnel/" rel="nofollow">http://www.cs.uit.no/~daniels/PingTunnel/</a>
评论 #513267 未加载
ews大约 16 年前
I use &#60;a href=code.kryo.se/iodine&#62;iodine&#60;/a&#62; as a wrapper for this, and I use it <i>very</i> frequently (as I fly internationally at least once every few weeks). It usually sits as a service on my home server. So far the only airport where I didn't make it to work was in Miami (where I connected though a socks tunnel though my iphone 3g anyways).<p>dns tunelling is slow, but handy for console/screen situations. I usually use it to download the newspaper before getting into the plane (a bunch of wgets) and refresh the rss feeds on newsbeuter.
wooby大约 16 年前
Use Kismac to collect MAC addresses with significant packets in/out, clone a MAC, ssh -D9091 to my remote server, tunnel everything through my local SOCKS5 port 9091. Works well enough for me.
评论 #513936 未加载
adatta02大约 16 年前
I might be wrong, but wouldn't this not help the situation at airports where the AP resolves all DNS requests to a page that is like "pay for service!"?<p>I was under the impression that in those configurations the AP intercepts all the DNS packets and responds with a fixed IP.<p>It would be nice to get around port blocking filters though...
评论 #512463 未加载
oldgregg大约 16 年前
I've set this up and it's pretty slow. Cool hack though. Better off with 3G card or tethering bluetooth on a 2G network. Useful with international travel though where phones get sketchy...
lacker大约 16 年前
Won't this be too slow to be useful for anything except a proof of concept?
评论 #512074 未加载
评论 #511989 未加载
jorgem大约 16 年前
&#62;&#62; I offer to set up a subdomain for you which delegates all requests (see above) to your fake nameserver.<p>Isn't that just like publishing-to-all-hackers your "not so secure" server?
chris11大约 16 年前
Does anyone know how secure this is? I'm assuming that the traffic is unencrypted, so technically your packets could be intercepted.
评论 #512601 未加载
alecco大约 16 年前
It's a great way to bypass firewalls. Wasn't this used in a worm in the 90s?
ethos大约 16 年前
&#62;...called OzymanDNS ...<p>Ozymandias? Haha, is that a Watchmen reference? If so, how apropos. "Quis custodiet ipsos custodes?" Not the folks running open hotspots.
lowkey大约 16 年前
I refuse to call myself a hacker until I can test this. Hot!