<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>How To Survive The Claire Perry Internet &#187; DNS</title>
	<atom:link href="/tag/dns/feed/" rel="self" type="application/rss+xml" />
	<link>https://survivetheclaireperryinter.net</link>
	<description></description>
	<lastBuildDate>Fri, 16 Oct 2015 09:30:30 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.8</generator>
	<item>
		<title>Building a SOCKS5 Proxy with a Digital Ocean Server to Bypass UK Internet Filters</title>
		<link>https://survivetheclaireperryinter.net/2014/01/10/building-a-socks5-proxy-with-a-digital-ocean-server/</link>
		<comments>https://survivetheclaireperryinter.net/2014/01/10/building-a-socks5-proxy-with-a-digital-ocean-server/#comments</comments>
		<pubDate>Fri, 10 Jan 2014 07:05:14 +0000</pubDate>
		<dc:creator><![CDATA[Op]]></dc:creator>
				<category><![CDATA[Censorship Evasion]]></category>
		<category><![CDATA[Filter bypass]]></category>
		<category><![CDATA[Filter Evasion]]></category>
		<category><![CDATA[Surveillance Avoidance]]></category>
		<category><![CDATA[Block]]></category>
		<category><![CDATA[BT]]></category>
		<category><![CDATA[Bypass]]></category>
		<category><![CDATA[bypass bt filter]]></category>
		<category><![CDATA[DNS]]></category>
		<category><![CDATA[Evasion]]></category>
		<category><![CDATA[Filter]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[not free]]></category>
		<category><![CDATA[Proxy DNS Query]]></category>
		<category><![CDATA[proxy resolve dns]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[Sky]]></category>
		<category><![CDATA[sky broadband shield]]></category>
		<category><![CDATA[socks list proxy]]></category>
		<category><![CDATA[TalkTalk]]></category>
		<category><![CDATA[talktalk dns server]]></category>
		<category><![CDATA[talktalk homesafe]]></category>
		<category><![CDATA[Virgin]]></category>
		<category><![CDATA[webproxy]]></category>

		<guid isPermaLink="false">https://survivetheclaireperryinter.net/?p=125</guid>
		<description><![CDATA[&#215;This article is for use on a Linux/Mac computer (desktop / laptop etc). A Windows guide will be available at a later date. If you don&#8217;t currently run Linux on your desktop I would strongly suggest it. Try Fedora or Ubuntu. If you don&#8217;t want to run Linux permanently but do want to try this<br /><a class="moretag" href="/2014/01/10/building-a-socks5-proxy-with-a-digital-ocean-server/">Continue reading...</a>]]></description>
				<content:encoded><![CDATA[<div class="alert bluth red"><button type="button" class="close" data-dismiss="alert">&times;</button>This article is for use on a Linux/Mac computer <em>(desktop / laptop etc)</em>. A Windows guide will be available at a later date.</div>
<p>If you don&#8217;t currently run Linux on your desktop I would strongly suggest it. Try <a href="https://fedoraproject.org/en_GB/get-fedora">Fedora</a> or <a href="http://www.ubuntu.com/">Ubuntu</a>. If you don&#8217;t want to run Linux permanently but do want to try this method then a <a href="https://en.wikipedia.org/wiki/Live_CD">Live Boot CD</a> of Fedora or Ubuntu <em>(or any other Linux OS of your choice)</em>  would be an ideal method.</p>
<p>Servers in datacenters are extremely unlikely to experience filtering so by tunnelling your connection through to a server you can browse the Internet without worrying if your connection is being restricted or surveilled.</p>
<p>IMAGE</p>
<h2>Signing up with Digital Ocean</h2>
<p>Navigate to <a href="https://www.digitalocean.com/">www.DigitalOcean.com</a> and click the Signup button at the top of the page. Enter an email address and a password. You may want to use an anonymous email provider such as Hushmail.com to protect your privacy and a strong password you&#8217;ve not used anywhere else. <strong>Important:</strong> The email address must be real as your server password will be emailed to you.</p>
<p><a class="lightbox" href="/wp-content/uploads/2014/01/signup.jpg"><img class="aligncenter size-medium wp-image-128" alt="signup" src="/wp-content/uploads/2014/01/signup-300x241.jpg" width="300" height="241" /></a>Once logged in you&#8217;ll have access to the initial control panel;<a class="lightbox" href="/wp-content/uploads/2014/01/logged_in.png"><img class="aligncenter size-medium wp-image-129" alt="logged_in" src="/wp-content/uploads/2014/01/logged_in-300x166.png" width="300" height="166" /></a></p>
<p>Click get started which will take you to the billing page, you can either use a credit card<em> (you may want to use an anonymous Visa / Mastercard, search online for keywords such as prepaid, anonymous etc)</em> or PayPal.</p>
<p>Once your payment is processed and cleared <em>(check <a href="https://cloud.digitalocean.com/billing">billing</a> for tracking your pre-paid balance if using PayPal) </em> or refresh the <a href="https://cloud.digitalocean.com/droplets">droplets</a> page to see the below;<a class="lightbox" href="/wp-content/uploads/2014/01/paid.jpg"><img class="aligncenter size-medium wp-image-130" alt="paid" src="/wp-content/uploads/2014/01/paid-300x175.jpg" width="300" height="175" /></a></p>
<p>Click <strong>Create Droplet</strong>!</p>
<p>Choose a friendly name for the server <em>(aka Droplet)</em>, this name is not important feel free to use how-to.survivetheclaireperryinter.net if you want to. Leave the Size option alone <em>(or if a larger size is selected change to to 512Mb/20Gb/1Tb as this is only $5 / £3 a month).</em> For lower latency and a reduced chance of NSA eavesdropping choose an Amsterdam datacenter <em>(not necessary but recommended)</em>.<a class="lightbox" href="/wp-content/uploads/2014/01/details1.jpg"><img class="aligncenter size-medium wp-image-131" alt="details1" src="/wp-content/uploads/2014/01/details1-286x300.jpg" width="286" height="300" /></a></p>
<p>Scroll down for more settings. For the purposes of this tutorial choose CentOS and then the latest CentOS version <em>(currently 6.4)</em> then click <strong>Create Droplet</strong>. <a class="lightbox" href="/wp-content/uploads/2014/01/details2.jpg"><img class="aligncenter size-medium wp-image-133" alt="details2" src="/wp-content/uploads/2014/01/details2-300x265.jpg" width="300" height="265" /></a></p>
<p>After a few seconds of watching the following screen your server will be created and you should have received an email with your root password.<a class="lightbox" href="/wp-content/uploads/2014/01/building.jpg"><img class="aligncenter size-medium wp-image-134" alt="building" src="/wp-content/uploads/2014/01/building-300x54.jpg" width="300" height="54" /></a></p>
<p>Behold your new server, make note of the IP address at the top near the word active. In this case the IP address is <strong>95.85.54.190</strong><a class="lightbox" href="/wp-content/uploads/2014/01/complete.jpg"><img class="aligncenter size-medium wp-image-135" alt="complete" src="/wp-content/uploads/2014/01/complete-300x102.jpg" width="300" height="102" /></a>Check your inbox and you should have an email with the IP address, the user name <em>(root)</em> and your password. It&#8217;s very important you don&#8217;t write a blog post and publish your username and password because bad things will happen to your server<a class="lightbox" href="/wp-content/uploads/2014/01/email.jpg"><img class="aligncenter size-medium wp-image-136" alt="email" src="/wp-content/uploads/2014/01/email-300x197.jpg" width="300" height="197" /></a></p>
<p>&nbsp;</p>
<p>Now we&#8217;re ready to create a proxy.</p>
<h2>Testing the Proxy / Tunnel</h2>
<p>Assuming you are logged into your Linux computer load up a terminal.<a class="lightbox" href="/wp-content/uploads/2014/01/terminal_1.png"><img class="aligncenter size-medium wp-image-137" alt="terminal_1" src="/wp-content/uploads/2014/01/terminal_1-300x215.png" width="300" height="215" /></a>Type the following;</p>
<pre class="bash">ssh -D 8080 root@95.85.54.190</pre>
<p> Replace the IP address with your own. You&#8217;ll be informed that the authenticity of the host can&#8217;t be established which is true because you don&#8217;t know what the RSA key fingerprint is. You can choose to accept it and continue or be paranoid and bail. If you chose to continue you will be prompted for you password that was sent by email.<a class="lightbox" href="/wp-content/uploads/2014/01/terminal_2.png"><img class="aligncenter size-medium wp-image-142" alt="terminal_2" src="/wp-content/uploads/2014/01/terminal_2-300x215.png" width="300" height="215" /></a></p>
<p>Load up another terminal <em>(or a tab)</em> and type the following;</p>
<pre class="bash">curl --socks5-hostname 127.0.0.1:8080 http://wtfismyip.com/json</pre>
<p>You should see the following output indicating that your ISP is <strong>Digital Ocean</strong>.<a class="lightbox" href="/wp-content/uploads/2014/01/terminal_3.png"><img class="aligncenter size-medium wp-image-140" alt="terminal_3" src="/wp-content/uploads/2014/01/terminal_3-300x215.png" width="300" height="215" /></a></p>
<p>&nbsp;</p>
<p>You could immediately configure your browser etc to use these settings but you should try and be a bit more thorough.</p>
<h2>Configuring the Proxy / Tunnel for long term use</h2>
<p>Exit all of the terminals opened in the previous step which will close all tunnels and SSH sessions and we&#8217;ll get started on making this a little more secure.</p>
<p>First things first is to change the root password from the one that was emailed to you. Load up a terminal and ssh in;</p>
<pre class="bash">ssh <a href="mailto:root@95.85.54.190">root@95.85.54.190</a></pre>
<p>Once logged in change the password with the passwd command. Ensure you use a different password to anything else you have.<a class="lightbox" href="/wp-content/uploads/2014/01/terminal_4.png"><img class="aligncenter size-medium wp-image-147" alt="terminal_4" src="/wp-content/uploads/2014/01/terminal_4-300x215.png" width="300" height="215" /></a>The root user is the most powerful user on a Linux server and can delete anything and everything so you really don&#8217;t want to be using it for everyday tasks. For creating the tunnel we want to use a non-privileged user. To do this simply type the following <em>(feel free to replace the name tunnel with your name or anything, it&#8217;s just a username and isn&#8217;t important)</em>;</p>
<pre class="bash">useradd tunnel</pre>
<p>Now change the password for this user by passing the username to the passwd command used earlier, make sure you use a strong password and one that isn&#8217;t that same as any of your others;</p>
<pre class="bash">passwd tunnel</pre>
<p><a class="lightbox" href="/wp-content/uploads/2014/01/terminal_5.png"><img class="aligncenter size-medium wp-image-148" alt="terminal_5" src="/wp-content/uploads/2014/01/terminal_5-300x215.png" width="300" height="215" /></a></p>
<p>Load up a new tab on your local machine and try logging in as your new user;</p>
<pre class="bash">ssh tunnel@<a href="mailto:root@95.85.54.190">95.85.54.190</a></pre>
<p><a class="lightbox" href="/wp-content/uploads/2014/01/terminal_6.png"><img class="aligncenter size-medium wp-image-149" alt="terminal_6" src="/wp-content/uploads/2014/01/terminal_6-300x215.png" width="300" height="215" /></a></p>
<p>&nbsp;</p>
<p>You&#8217;re now ready to setup a tunnel/SOCKS proxy you can use with your browser.</p>
<p>Exit all your terminals again and this time issue the command;</p>
<pre class="bash">ssh -D 8080 tunnel@<a href="mailto:root@95.85.54.190">95.85.54.190</a></pre>
<p>In a new terminal check that the proxy is working by issuing the CURL command again;</p>
<pre class="bash">curl --socks5-hostname 127.0.0.1:8080 http://wtfismyip.com/json</pre>
<p>For this example I&#8217;m going to use Firefox but feel free to try it out with others. In the address bar type <strong>about:config</strong>, you&#8217;ll be presented with the following screen;</p>
<p><a class="lightbox" href="/wp-content/uploads/2014/01/firefox_dragons.jpg"><img class="aligncenter size-medium wp-image-150" alt="firefox_dragons" src="/wp-content/uploads/2014/01/firefox_dragons-300x92.jpg" width="300" height="92" /></a></p>
<p>&nbsp;</p>
<p>Assuming you are going to be careful click the button.</p>
<p>In the Search bar at the top type <strong>proxy</strong>, then look for the strings <strong>network.proxy.socks</strong> and <strong>network.proxy.socks_port</strong>, type in the values from the command above (127.0.0.1 and 8080). If your ISP filters DNS then you may want to toggle <strong>network.proxy.socks_remote_dns</strong> too <em>(don&#8217;t forget to change your name servers!)</em>.</p>
<p>Finally change <strong>network.proxy.type</strong> to <strong>1</strong>.</p>
<p><a class="lightbox" href="/wp-content/uploads/2014/01/firefox_about_config.png"><img class="aligncenter size-medium wp-image-151" alt="firefox_about_config" src="/wp-content/uploads/2014/01/firefox_about_config-300x216.png" width="300" height="216" /></a>To test, simply load up a new Firefox tab and attempt to access a blocked page.</p>
<p>So there you have it, an easy way to get past any Web filtering and as an added bonus since your traffic is encrypted between your computer and your server in Amsterdam neither your ISP nor the UK Government can monitor it.</p>
<div class="alert bluth yellow"><button type="button" class="close" data-dismiss="alert">&times;</button>Traffic egressing the server can still be tracked and recorded. With the right combination of warrants and traffic capture at the Digital Ocean datacenter coupled with your home ISP logs illegal activity can still be traced back to you! Only use this to method to bypass filters,</div>
<p>Upcoming articles include creating a dedicated Raspberry PI proxy for use with multiple devices <em>(phones, tablets, Windows PCs etc)</em> and setup guides for other server providers. Make sure you follow <a href="https://twitter.com/stcpi">@STCPI</a> on Twitter for updates!</p>
]]></content:encoded>
			<wfw:commentRss>https://survivetheclaireperryinter.net/2014/01/10/building-a-socks5-proxy-with-a-digital-ocean-server/feed/</wfw:commentRss>
		<slash:comments>4</slash:comments>
		</item>
		<item>
		<title>Basic DNS Filter Evasion: HOSTS file</title>
		<link>https://survivetheclaireperryinter.net/2014/01/08/basic-dns-filter-evasion-hosts-file/</link>
		<comments>https://survivetheclaireperryinter.net/2014/01/08/basic-dns-filter-evasion-hosts-file/#comments</comments>
		<pubDate>Wed, 08 Jan 2014 13:53:18 +0000</pubDate>
		<dc:creator><![CDATA[Op]]></dc:creator>
				<category><![CDATA[Censorship Evasion]]></category>
		<category><![CDATA[Filter Evasion]]></category>
		<category><![CDATA[Block]]></category>
		<category><![CDATA[BT]]></category>
		<category><![CDATA[Censorship]]></category>
		<category><![CDATA[DNS]]></category>
		<category><![CDATA[Evasion]]></category>
		<category><![CDATA[Filter]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Sky]]></category>
		<category><![CDATA[Windows]]></category>

		<guid isPermaLink="false">https://survivetheclaireperryinter.net/?p=94</guid>
		<description><![CDATA[Background: Various ISPs such as Sky and BT use DNS manipulation to spoof responses that forwards requests to their proxy server instead of the correct response. Taking BT as an example a request for a blocked site has been seen to return an IP from within this netblock instead; inetnum: 213.120.234.0 - 213.120.235.255 netname: BT-UKIP-IPV4-INFRASTRUCTURE<br /><a class="moretag" href="/2014/01/08/basic-dns-filter-evasion-hosts-file/">Continue reading...</a>]]></description>
				<content:encoded><![CDATA[<h2>Background:</h2>
<p>Various ISPs such as Sky and BT use DNS manipulation to spoof responses that forwards requests to their proxy server instead of the correct response.</p>
<p>Taking BT as an example a request for a blocked site has been seen to return an IP from within this netblock instead;</p>
<p><code>inetnum: 213.120.234.0 - 213.120.235.255<br />
netname: BT-UKIP-IPV4-INFRASTRUCTURE<br />
descr: POP<br />
country: GB<br />
admin-c: BS1474-RIPE<br />
tech-c: BS1474-RIPE<br />
status: ASSIGNED PA<br />
remarks: Please send abuse notification to abuse@bt.net<br />
remarks: New netname<br />
mnt-by: BTNET-MNT<br />
mnt-lower: BTNET-MNT<br />
mnt-routes: BTNET-MNT<br />
source: RIPE # Filtered<br />
</code></p>
<p>Sky commonly reports back with IPs from;</p>
<p><code>inetnum: 90.207.238.128 - 90.207.238.191<br />
netname: SKY-IRONMAN-VIRTUALISATION-LAN<br />
descr: Sky Network Services<br />
country: GB<br />
admin-c: BBH-RIPE<br />
tech-c: BBH-RIPE<br />
status: ASSIGNED PA<br />
mnt-by: BSKYB-BROADBAND-MNT<br />
source: RIPE # Filtered<br />
</code></p>
<p>Initial research indicates that even attempting to use 3rd Party DNS servers on some ISPs elicits a spoofed response which indicates that these ISPs are intercepting and monitoring ALL DNS queries you make. This presents a variety of concerns such as the accuracy of SPF, DNS-SEC or TXT responses but that&#8217;s a topic for another time.</p>
<h2>Circumnavigation:</h2>
<p>If you discover that you are getting faked responses and are unable to reach the correct webserver follow the steps below.</p>
<ul>
<li>Get the A Record
<ul>
<li>Navigate to a website such as <a href="http://www.dnsstuff.com/tools">http://www.dnsstuff.com/tools</a></li>
<li>Look for the DNS Lookup tool<br />
<a class="lightbox" style="line-height: 1.5;" href="/wp-content/uploads/2014/01/dns_lookup.png"><img class="alignnone size-medium wp-image-98" alt="dns_lookup" src="/wp-content/uploads/2014/01/dns_lookup-300x196.png" width="300" height="196" /></a></li>
<li>In the text box enter the URL you are trying to reach <em>(e.g. www.google.com)</em></li>
<li>Select <strong>A</strong> from the record type</li>
<li>Submit the request and make a note of the <strong>IP address</strong> returned.</li>
</ul>
</li>
<li>Edit the Hosts file
<ul>
<li>Windows
<ul>
<li>Start notepad.exe as an Administrator</li>
<li>Open C:\Widnows\System32\drivers\etc\hosts</li>
<li>Add the URL and the IP address in the format shown below;<br />
<code>173.194.34.67 www.google.com</code></li>
<li>Save the file ensuring that a file suffix <strong>isn&#8217;t</strong> appended</li>
</ul>
</li>
<li>Linux / Mac
<ul>
<li>Open /etc/hosts as the superuser with your editor of choice (vim!)</li>
<li>Add the URL and the IP address in the format shown below;<br />
<code>173.194.34.67 www.google.com</code></li>
<li>Save the file ensuring that a file suffix <strong>isn&#8217;t</strong> appended</li>
</ul>
</li>
</ul>
</li>
<li>Testing
<ul>
<li>Load up a cmd prompt (Ctrl + R, type cmd, press return)</li>
<li>Type <code>nslookup www.google.com</code></li>
<li>Ensure you receive the IP address you entered in the hosts file</li>
</ul>
</li>
</ul>
<p>&nbsp;</p>
<p>If the ISP is using BGP filtering methods, Deep Packet Inspection <em>(DPI)</em> or a transparent proxy then this still may not work as they&#8217;ll detect traffic going to the blocked IP subnet and act accordingly.</p>
<p>Keep an eye on our <a href="/top-ways-to-evade-filters/">How to Evade Blocks</a> page and follow <a href="http://twitter.com/STCPI">@STCPI</a> on Twitter for more methods to discover and evade Internet censorship.</p>
]]></content:encoded>
			<wfw:commentRss>https://survivetheclaireperryinter.net/2014/01/08/basic-dns-filter-evasion-hosts-file/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
