And what solution could be applied when SSL access is also blocked on proxy?
]]>[…] öffentlich zugänglich ist, seine Pakete anvertraut. Wie das ganze genau funktioniert, finde man hier. Tags » Autor: Nino Datum: Mittwoch, 14. Oktober 2009 11:36 Trackback: Trackback-URL […]
]]>@ Luke Maciak:
Your main page is unblocked now, but the “Older Entries” link to the second page of articles is blocked since (I guess) it contains this article. The block seems to be automatically following that “offending” link. So it’s mostly back to normal.
Note, despite this, this specific post of yours isn’t blocked. Only when it appears along with other entries. Websense must not crawl very deeply.
]]>Aw, crap. Sigh… Well, it’s not like I wasn’t blocked before. I think some schools blocked me for obscene language and other similar infractions. :P
Yeah. I’m sure this can be exploited in various nasty ways.
@ Kenny:
Actually, the firewall I was behind was blocking outbound pings. You could ping stuff on the local network, but not outside. I’m fairly sure it was specifically to prevent this type of thing. :P
@ Brian:
Sigh… I’m 99.9% sure this is spam, but I’ll allow it because it’s on topic.
]]>If you are looking to find a list of working http proxies, you can look here: http://www.pxylst.info
Proxies are scanned hourly to ensure that they are working!
]]>You should also consider setting up Ping Tunnel some time when you’re not behind the firewall. TCP tunnelled over ICMP.
It’s very useful for networks where even HTTP is blocked (or requires payment).
]]>I wouldn’t get too comfortable with this method. While it is a great way for you to be productive, it also allows malware to make it’s way out as well. Many companies are starting to pay attention to what goes through their proxies. SSH stands out like a sore thumb.
]]>I just noticed something: posting this tunneling information on your blog may have an annoying consequence. Your blog is suddenly blocked here at work by Websense under the category “Proxy Avoidance”. Maybe (hopefully) this isn’t permanent and will go away when the corkscrew link drops off the main page, or else people like me will always have to tunnel our way here when visiting from work.
]]>SSH tunnels are wonderful things. They make holes big enough to fly an airplane through. On occasion I have even SSHed back through an SSH tunnel.
I too just run my home ssh server on port 443 all the time. That way I am always prepared to route around almost anything. This also has the added bonus of greatly reducing the attacks on my ssh server, especially when I run an ssh honeypot on 22.
]]>@ reacocard:
That’s how I do it too. Work’s nice because not many admins are going to block 443, so I should be able to tunnel home from anywhere (in theory).