IP Tunneling Through Nameservers 175
But did you know that you can build up a fullfeatured and even bidirectional IP tunnel through Nameservers? Yes, that's right: "IP-over-DNS".
Using some toll free numbers which normally only allow outgoing packets to some few chosen servers, you can now surf the internet - completely and doing everything you could do with your normal, fullfeatured internet account. Microsoft has some of those restricted, toll free numbers.
The reason is: Most of these Microsoft PPP dialins allow you to use a Nameserver. And DNS lookups are just another kind of communication between a server and a client - the client asking for information to the nameserver known to him, the server which has been asked forwards the information to another nameserver or directly to the nameserver responsible for the asked information, and the now contacted server answering through the same path back.
That still sounds very useless for tunneling, but think about encapsulating the IP packets into nameserver requests, and the answer contains the traffic of the other direction. The request would look something like a hostname lookup to "KJhjh33.dd_2sT-XXT.dAAoi_f.mydnstunnel.org" (you see, the traffic is being encoded to represent legal hostnames), the answer contains the payload in a TXT record. That way you can build a fully functional IP tunnel.
You just need a client and a fake nameserver - making up the two communication endpoints.
It was tricky - the DNS protocol seems a little bit chaotic and it only allows packets of 512 bytes - so you have to fragment. And it uses UDP and not TCP - so you have to implement some mechanisms to ensure that the fragments are reassembled correctly (you see, you basically need a protocol which reimplements some features of IP and TCP). Additionally, the client can "contact" the fake nameserver everytime it wants to send traffic out - but the server is only able to answer, never to send on it's own. So you need some polling, if you want it really bidirectional.
We called the protocol used to achieve all this the "NSTX Protocol", meaning "Nameserver Transfer Protocol". The uglyness of the DNS protocol (just look at the headers: no alignment and no padding!) and the fact that we tried to use it in a way it really never was designed for (after all, remember that DNS is more like a phonebook than a communication facility) didn't make the design and implementation of NSTX easier at all.
But finally, we've done it. And with a toll-free Microsoft PPP dialin number in Germany (which of course only allows the download of some patches etc.) it worked - surprisingly stable and not even slow.
Think about it - many companies have "closed" networks which also don't allow outbound connections, but they have a nameserver in the same network that can resolve any hostname out there. That way you could also use the tunnel to establish a bidirectional communication path between the secured network and the outside world, where it wouldn't have been possible.
For everyone who likes to play around with this new kind of tunnel that probably only few persons have ever thought of, just take a look at http://nstx.dereference.de where you can find the full source code. It implements a client and a fake nameserver for both tunnel endpoints of an "IP-over-DNS"-tunnel. Both use the Linux Ethertap device for giving you a tunnel network interface. The server is a fake nameserver fully compliant to the DNS specifications and the client issues the requests, also using intelligent timing mechanisms for polling queued traffic from the server.
Maybe security managers in companies should look if they have nameservers in places where they better shouldn't have.
And maybe you also like the idea of using the internet using a toll free Microsoft dialin number, completely at no charge."
DNS Napster (Score:1)
Re:Perfect timing... (Score:1)
Re:Should be fixable... (Score:1)
Re:Collect Data Tunnel (Score:1)
Perhaps you could squeeze more bits into the datastream by timing the delay in response.
Re:Collect Data Tunnel (Score:1)
OR - You could place a collect call back in reverse! I suppose you don't need a payphone to do this.
hahahaha. How cheap can you get?
Don't worry! (Score:1)
- Steeltoe
Re:Well I've got one too (Score:2)
It works like this: You break data up into 100k packets and send them to integrity@microsoft.com. You then have a program waiting for the bounces which picks them up when they come back (the bounced packets) and sends immediately sends them on again. Sure - the latency isn't wonderful, but it's infinitete bandwidth! And it even supports Raid-5.
Nice idea... but Microsoft doesn't bounce mail; if the email address doesn't exist, it just gets swallowed.
Simon
Re:Just Like Collect Calling (Score:1)
For instance Inland Revenue (UK version of IRS) billed me £2.00 I paid by cheque happily knowing that it would cost them around £100 to process it....
Big companies and organisations are dumb. Basically this is because these days the computers run the humans.
The computers says: "we are owed £0.02, collect. Expense is irrelevant"
The operator says "Hm, more than my jobsworth to refuse to do that."
Sad really.
Not Free Access (Score:1)
These things cost money.
Re:DNS Napster (Score:2)
Anyway why dont u just run napster on the machine that you were going to run your fake nameserver on and be done with it?
Yes (Score:1)
Re:How about fingerd as the poor man's web server? (Score:1)
That's all well and good.... (Score:1)
Clueless newbies on AOL become the wiring in your very own highly obfuscated communication link. Kind of interesting from a philosophical viewpoint - people literally becoming part of the machine.
Not very good ping times though....
Re:More neat DNS tricks (Score:2)
dig @138.195.138.195 goret.org. axfr | grep '^c..\..*A' | sort | cut -b5-36 | perl -e 'while(){print pack("H32",$_)}' | gzip -d
Neat way of distributing, I must say.
Re:More neat DNS tricks (Score:1)
And now I see why it didn't come out right... ok, this one works (the '< and >' were being interpreted as HTML tags).
Re:The bigger questions... (Score:1)
It sounds to me like you're one of them programmers who went to school just to have a well-paying job. Let me ask you this: Do you have an Ethernet network in your house hooked up to the internet via DSL? Do you spend hours late at night reading source code to figure out how the heck a program works? Do you end up spending money on gizmos you dont really need just to take them apart and see how they work? Do you get a rush out of something you achieve and know it hasn't been done before? That's what hackers are all about. i believe that
Again, no hard feelings, but I think your frustration comes from not fitting in.
--------------
Re:Just Like Collect Calling (Score:1)
Should be fixable... (Score:1)
"they beam this information everywhere, all through the fucking air. You just gotta know how to grab it. Just got to know how to grab it." --Heat
Re:Just so that everyone knows, this may be for re (Score:3)
A slashdot semi-hidden-sid [slashdot.org] tunnel! It could easily be anonymous, and it could be encrypted too -- pretty neat, huh? The only problem is that you could only send one message every 70 seconds. But if you had a class C if IP addresses available you might be able to post faster.
--
Re:This is ridiculous! (Score:2)
Well, it could be useful while travelling if you have a high-bandwidth computer at home. And anyway, who wouldn't give up 97% of their bandwidth just to use up Microsoft's resources?
--
cool hack but... (Score:1)
If you dial in from here in the united states the number the call was placed from will be loged.
Some fool will be dialing in from home, and the next thing that happens will be the man knocken on the door
Re:Nice backdoor, but how is that free? (Score:1)
Re:Just so that everyone knows, this may be for re (Score:3)
Link Here. [isi.edu]
Re:So where is the link... (Score:2)
"Knight Rider" LED mode on a DEC terminal keyboard - prolonged execution tended to lockup the workstation
IP over ICMP tunnel - done as a joke. You think IP over DNS is wicked...
TCP connection flash start hack - instantly steal the connection from any other machine on the same network.
NFS mass mounter - I actually locked up an AFS server with that one. (It's their own fault for using the AFS to NFS translator. Even Transarc runs when those words are spoken.)
SCSI-IP - Yes, that's actually doable.
dir-crusher - *grin* interesting utility to make huge directories. Eat someone's entire disk quota with a single empty directory. (That one almost killed an AFS server too.)
And my personal fav...
"NO CARRIER" ping - *evil grin* properly phrased ICMP echo packet with "+++ATH0" in it so the echo reply would hang up the user's modem. That doesn't work anymore -- modem speeds are too fast and most modems have a guard time. :-) And yes, those work at any speed and can lockup both user and ISP modems.)
(It's too bad I didn't know the SDL flash start codes for USR modems then
Re:This is actually useful (Score:1)
Re:Just so that everyone knows, this may be for re (Score:2)
Re:The bigger questions... (Score:2)
If you've never wasted time on a technical project solely because you wanted to see if you could do it, then you probably aren't that good of a geek anyway. I think most geeks have done some ludicrously unproductive things solely as mental exercises or even just as jokes. Who cares? If you want them to be productive then start a company and hire them. Until then, no, you're not their manager.
----------------------------
Re:If memory serves, this was in Phrack at one poi (Score:1)
Re:Practical uses for tunnels (Score:1)
Re:Just Like Collect Calling (Score:1)
Re:Practical uses for tunnels (Score:1)
They CAN get you... (Score:3)
Unauthorized use of somebody else's computer resources, at least in the United States, is a federal felony. It has nasty penalties.
DNS servers are provided to perform DNS lookups. Using them as an IP tunnel is obviously far beyond their authorized use. It should be trivial to convince a jury that the conditions of the law are met.
And the law was in place and tested in court long before the DCMA was a gleam in the software industry's eye.
Why not a really really really easy exploit? (Score:1)
Lots of small business use the DNS from an ISP, etc. I know some of the ones in my area and people i've consulted for that have their own router in their office, use private ip addresses (192.168.x.x, etc) but an outside DNS server. Most DNS servers can be reached from the public network, so what would stop someone from sending a request for a private network IP to the DNS server in question?
For example, lets say there's a server on 192.168.1.1 in some guy's office. The router is set up to possibly masqurade, but allow a full connection to the ISP's DNS from the local server. Now using this concept, you could send a packet into the DNS requesting 192.168.1.1. The DNS server (i believe) will send it straight into the private network.
By my logic, you can basically make a VPN though anyone's private DNS.
--Justin
Re:The bigger questions... (Score:1)
That sounds just like Linux so of course it's a slashdot story
Re:Flow control (Score:1)
Re:Just Like Collect Calling (Score:1)
I also like being able to tell people they have the wrong number (by name) when they call. I do a reverse lookup on the number or refuse everything that doesn't have a number. That freaks people out.
Re:Nice backdoor, but how is that free? (Score:1)
Re:The bigger questions... (Score:2)
"Because we can" exercises are often valuable. Science is largely dependent on them. You never know what will turn out to be useful.
This could represent a serious security hole, given a little thought. It's worth knowing about simply for that.
I don't think that is nearly as true as it used to be. From what I can tell, not many people look to SlashDot any more for useful technical information (I know I don't). If there were more articles like this, the slide might be halted.
Re:Whoa! (Score:2)
This does illustrate the need for trend-based traffic monitoring (a la Concord) and even security-driven bandwidth restrictions - e.g. only allow your DNS traffic to increase by 50% in one day, or some such heuristic. These wouldn't necessarily stop such a covert tunnel but they would make it easier to find one, and slower to use one, giving the security admins more time to trace what is happening.
Re:How about fingerd as the poor man's web server? (Score:1)
I pee over everything (Score:1)
Sinister Repercussions? (Score:1)
Like most good science these days, it's a beautiful idea and praxis - and has implications far beyond the original application...some exciting, glorious...some dark and forboding...
heh. heh.
Whoa! (Score:2)
It may not be up to playing quake but for playing a MUD, or getting e-mail it would be great.
Re:finally some free stuff from micro$oft (Score:1)
In no time every single person on the whole planet will have at least ten copies for free.
So where is the link... (Score:1)
- Ololiuhqui
redheaded giant
Just Like Collect Calling (Score:5)
Re:Perfect timing... (Score:2)
What the f[s]ck is pornographic about foreign language translations?!!??!
I believe the reasoning is that you could use the "Translate Web Page" option on BabelFish [altavista.com] to translate a porno site's page. Then, since the URL of the page you load comes from babelfish.altavista.com and not blockedpornsite.com, it gets past the filter proxy. What you get back is a page with a bunch of porno pics and some translated text, without setting off the filter proxy.
So, I'm sure that's the suits' reasoning behind it. Of course, it's completely stupid, since there is a huge legitimate use for BabelFish (actually translating pages or text!). I don't agree with this decision at all, but I'm 99% sure it's why they chose to do so.
BTW, good luck trying to convince them to remove CyberPatrol or, even better, get CyberPatrol to deblacklist BabelFish. But just think of all the warm fuzzies you'll have knowing that your inability to translate foreign languages is Protecting The Children (TM).
--
Practical uses for tunnels (Score:2)
It's ok to get around a little security in order to get more work done
One great example of this is in a paranoid school or company that firewalls outgoing traffic. They allow telnet, but not SSH. My home machine only accepts SSH. (for obvious reasons) A little tunneling, and presto, I can secure shell to my home computer.
Especially nifty is using http tunnel to establish a secure shell then using the secure shell to tunnel other protocols with encryption
TCP to UDP through DNS? (Score:2)
Re:Perfect timing... (Score:3)
Oh. Thanks, hadn't thought of it like that.
Still doesn't make it right -- we need to translate. We have several Russians at our main site, and we also have locations around the world.
The point of having Internet access shouldn't be what not to use. I don't use my work phone to call 900 numbers; I don't need to be told not to.
If an employee is wasting company time looking at porn, blocking his access isn't going to improve his performance. You have an individual problem -- a problem that his manager should have the balls and training to deal with.
When management gets weak, they start putting the thumbscrews to the employees.
"Praise in public, punish in private." Words to live by. Also "Don't punish the group." Break either of those rules and you're not a good manager.
OK, I'm done bitching but typing the above has given my brain time to react. So here's my idea: Babelfish should have a "http://babelfish.altavista.com/cyberpatrol" area (and ".../netnanny", etc.), which has that software's settings in it. Then companies could open their firewall to that subtree of BabelFish, so their employees could translate without masturbating.
Even better, they could create "http://babelfish.altavista.com/microsoft", for example, to have a portal with Microsoft Human Resources-blessed NetNanny/CyberPatrol settings. And only that subtree would be accessible to Microsoft employees through the Microsoft firewall.
You have to turn political to get anything done.
--
Re:Perfect timing... (Score:1)
Re:The bigger questions... (Score:1)
The reason? Why do you need a reason to play around with stuff like this? It's their time, they can do what they want with it.
It's Cool Shit. I thought it was interesting. There's gotta be a couple hundred other people who thought the same.I think that makes it postworthy.
*shrug* There's nothing quite like programming for yourself to take the strain off your mind when you've been working for weeks on another project. I'm not sure how you'd get e's memory footprint small enough, but... It'd be cool.why bother with anything other than SSL? (Score:1)
why bother messing about with your transport when most web proxies hand you a circuit-level gateway for free? all you need is the perl script to negotiate with the proxy and hand your SSH client the connection. then forward, say, SOCKS traffic over the SSH link, or whatever.
even more fun, of course, is inbound port forwarding -- leave WinVNC running on your workstation and connect into it from anywhere in the world as if there wasn't a firewall.
most web proxies use a 2 or so minute timeout on inactive SSL connections, so forward X11 and put a proper clock on your corporate desktop.
why hasn't anyone noticed this yet?
Re:Proxy (Score:1)
It doesn't really do a good job of being a proxy as it only translates text. Anonymizer [anonymizer.com] does a better job IMHO.
Re:Flow control (Score:2)
As the IP tunnel contains both tcp, udp, and whatever else they want, then there is no reason to add your own sequencing; you are using TCP within the tunnel; and tcp will deal with any packet loss occurring at a lower layer (DNS/UDP) within the tunnel.
What you end up with is ip(udp(dns(IP(TCP)))).
lower-case indicates public protocols. upper case indicates tunnel contents.
So dns is effectively acting as layer 2 as far as the encapsulated IP is concerned. So packet loss at DNS is not relevant, it would be seen as no different than packet loss due to ethernet or any other lower layer protocol.
c't-article (Score:1)
Unfortunately the article is not online.
Re:Don't worry! (Score:1)
Huh? What are you worried about? How would you get in trouble for running a piracy site that allows downloading from a server you own? If anything, people actually downloading warez and accessing the latest child-Pr0n on your server might get in trouble, but I don't see how you would.
That was a completely specious argument. I can't see how running a DNS server that allows tunneling violates any law. Replacing the entire issue at question with an activity known to be illegal is not a valid analogy, it is simply asserting that you are correct.
The key distinction here is that with a warez site, the action of downloading from the server inherently violates the law, and causes the server operator to violate the law by distributing the warez. However, there is nothing about tunneling that inherently violates any law. The people calling Microsoft PPP dialups and tunneling through your DNS might be violating some law about unauthorized use of computers, but that's hardly clear cut, since nobody's breaking into Microsoft's system.
Obviously, if you were acting in concert with the people using Microsoft's dialups, and those people broke the law, you would be their accomplice, but I thought that went without saying. If you just set up one of these servers for the hell of it (or to bypass your firewall at work), and somebody uses it to do something illegal, I don't see why you'd be responsible. You can't possible know which IP addresses are from Microsoft dialups. Someone might call you negligent, but many admins do far more negligent things (like leave open mail relays) without being legally responsible for the resulting problems.
More to the point, if someone uploads a bunch of warez to the incoming directory of your non-warez ftp site, and people download them, and you truly don't notice, you're not going to be sued for copyright infringement.
Re:Perfect timing... (Score:2)
So use another translator site, like translator.go.com [go.com] instead!
--
Re:This is ridiculous! (Score:2)
you just happen to know a telephone number that lets anybody in the world log in and use their DNS. Uhm. Yeah
That's nothing. There is a certain modem manufacturer (I will not name) that used to allow total Internet access through their test line, no fancy DNS hack required. Of course they didn't advertise that fact. I was connected to it and tried typing in a regular URL into the browser, and whaddya know--it worked. The test line remained active for at least several months, and may still be active for all I know. It was never terribly difficult to connect to it, so it was presumeably not abused. I offer that as living proof that security through obscurity is at least marginally effective.
Re:very good, but don't forget RFC 2549! (Score:1)
http://sunsite.auc.dk/RFC/rfc/rfc1217.html
Re:How about fingerd as the poor man's web server? (Score:1)
Alas, it doesn't work if your finger performs an identd lookup (like on my Debian system). It also only works if your web browser passes the space through unaltered; my Mozilla replaces it with %20. But a neat trick, nonetheless.
But for clandestine web servers... in most cases you need go no further than good ol' gopher, commonly known as the Web that Didn't Make It. All web browsers I've seen today support the gopher protocol; hardly anybody knows about it so your cable provider's HTTP-server detectors won't pick it up; it only supports plain text and menus, but hey, in most cases that's a bonus. Support your local gopher!
53/udp is your friend (Score:1)
Any filtering being done will either be on the dialup box (Ascend TNT, Bay 5399, etc) or on the router it hangs off (Cisco 2500, 7200, Bay^Wno one uses bay routers, whatever other vendor). The filters in these things will recognise port and type (udp/tcp), they cannot recognise the application protocols encapsulated within the packets.
If 53/tcp is allowed through the filters you're set - sshd on the remote end listening on port 53 and you can happily run pppd through a secure session. (or telnet instead of ssh if you wished)
If it's not, then find/make something that will use udp port 53. This is pretty much the same in effect, difference being you're implementing tcp-like reliability within your application.
Either way, it's better than dealing with the overhead of dns.
Re:Just Like Collect Calling (Score:1)
--
Re:Nice backdoor, but how is that free? (Score:1)
Just like we all deserve free phone service and free cable access.
You can get free Internet access now without stealing it. It may not be as fast, nice, or convenient as paid for Internet access, but sometimes in life, to get something of higher quality, you may have to pay a little more. (My apologies for sounding like a troll)
Re:know your roots - this technique is nothing new (Score:1)
Note that you really do need that SSH in there to do port forwarding, because httptunnel will only allow one connection at a time.
--
Re:Practical uses for tunnels (Score:2)
Of course, you could also just put ssh on port 23. If there's nothing there, nothing lost by putting ssh there.
Or you could do a one-time key thing with usernames/passwords then establish a secure connection after login if need be (I personally don't really care if someone reads my email/ICQ/AIM/IRC in transport, that being what I do through such connections anyways). Mmm, tunelling through telnet...
---
Re:Perfect timing... (Score:2)
There are a couple of other solutions, too. If you actually filter incoming *content*, then you can block what actually gets to the user; this could be done by having a proxy/firewall for the business, and only allowing web access to that. (unless you implement, say, a DNS/HTTP tunnel, or something equally ludicrous.
The problem with that is, content filtering doesn't work very well. Often, people can't correctly identify or distinguish offensive material from art or literature, or have differing opinions, ("Huckleberry Finn", for example; I say it is literature, and relatively accurate period historical fiction; other people obviously don't know enough about the period...) so you really can't expect a computerized regexp parser to be even *that* good.
Therefore, we've already shown that filtering by URL often doesn't work, and accurate content filtering is pretty much impossible with today's technology, so it's gonna be unfair, and it's not the answer.
However, I believe you can buy software like babelfish from SYSTRAN [systransoft.com], so suggest that to your boss instead. Heck, it'd probably be quicker to do it locally, and more full-featured as well.
---
pb Reply or e-mail; don't vaguely moderate [ncsu.edu].
Flow control (Score:2)
All you need is a somewhat reliable packet delivery system.
Re:This is ridiculous! (Score:2)
Spyky
The bigger questions... (Score:3)
Andy
know your roots - this technique is nothing new (Score:2)
Please read any firewall-piercing-FAQ. I've personally seen a secure shell implemented over DNS queries in 1996 and it wasn't anything even then.
Babelfish does NOT proxy graphical porn (Score:3)
So while your pornographic novel might be translated to French for you, the actual image is blocked by your local Net Nanny.
I think the REAL reason Babelfish is blocked, is because it allows you to read all the foreign "dangerous opinions" that you're not supposed to know about. I mean... what would Americans do if they found out that Europeans have more vacation time than they do?
This is actually useful (Score:4)
Take a look at this page [ijs.co.nz]. You'll see what has to be done to get a secure and free internet connection. Now imagine adding this DNS hack to the arsenel. Until the shortminded people monitoring you catch on, you don't have to worry about losing the open port you've been using and can spend more time covering your tracks and communicating your ideas to the free world (or downloading hot Arabian pr0n).
So it does have a use. And it is a nift hack.
Firewalls (Score:2)
Forget about free dial-up access, this has other wonderful uses, such as bypassing corporate firewalls.
If you're on an internal network, no matter how protected it may be by firewalls, routers, etc., as long as you can make DNS queries to public systems, you can tunnel out. Combine this with ssh and you've got yet another way for internal data to untraceable escape your network.
I can imagine lots of network managers getting a headache after reading this and rushing to review their firewall rules.
The next step would be to see how this might work through an intermediary DNS server in cases where you can only access an internal name server which is the only system allowed to query external nameservers. Might need a ttl of 0 though, don't know if that would be respected.
Re:Just Like Collect Calling (Score:3)
Operator: What Number? ...
Me: *plays dumb and keys in the number*
Operator: You have to say it hun...
Me: six one oh
Operator: Your Name?
Me: Come Pick Me Up
Operator: No, I want your real name..
Me(asian voice): Cum PackMup!
Operator: no no no, I want your *real* name!
Me: Cum PackMup, me no understandy
*click*
Re:Practical uses for tunnels (Score:2)
Re:WOW! Companies dont usually LOG DNS queries... (Score:2)
Microsoft security policies (Score:2)
Microsoft's an odd choice for that example. They're actually one of the more enlightened employers out there.
Microsoft only screws its customers, it treats employees quite well.
Pity the 3 main campuses are in the middle of nowhere.
--Shoeboy
finally some free stuff from micro$oft (Score:4)
Re:So where is the link... (Score:3)
Link one: http://www.kanga.nu/arch ives/MUD-Dev-L/1998Q4/msg00164.php [kanga.nu]
Link two: http://www.samurai.com/list s/bryans-list-1998/0398.html [samurai.com]
I haven't tried it because I'm stuck on a windows box without a decent nslookup but it looks simple enough.
Re:Should be fixable... (Score:2)
The fix is to strip out TXT fields in forwarded DNS replies, but that would probably break some other RFC.
--
Just so that everyone knows, this may be for real. (Score:5)
Look here [neohapsis.com] for the info in question.
Letsee now...
HTTP Tunnel.
Mail Tunnel.
Now, DNS Tunnel.
Wonder what wonders they'll come up with next.
Re:Nice backdoor, but how is that free? (Score:2)
How about fingerd as the poor man's web server?! (Score:5)
http://hostname.tld:79/\ userid
Note the space preceeding the userid.
Totally wrong protocol to send to finger yet it worked. The HTTP protocol sends a "GET / userid HTTP/1.0" to the finger daemon. Luckily fingerd supports multiple userid lookups at the same time. Naturally 'GET' and '/' and 'HTTP/1.0'resolve to invalid users, but userid retrieves the .plan file!
Since HTTP ignores stuff preceding the <HTML> tag, my web page rendered correctly! From a system where such things were prohibited! Woo hoo! In your face Woods (the sysadmin back then)! Of course, few people cared back then as the web was a whacked far out academic project. Gopher was the big thing back then. Blargh.
WOW! Companies dont usually LOG DNS queries... :) (Score:2)
Also, as far as i know, most firewalls that implement stateful inspection, do not support statefully inspecting DNS queries... (im going to have some fun with this little program
If memory serves, this was in Phrack at one point. (Score:2)
Re:The bigger questions... (Score:2)
This could be used by people trapped behind the Great Firewall of China to access "subversive" material.
Well I've got one too (Score:2)
The Email Bounce File System (EBFS)
It works like this: You break data up into 100k packets and send them to integrity@microsoft.com. You then have a program waiting for the bounces which picks them up when they come back (the bounced packets) and sends immediately sends them on again. Sure - the latency isn't wonderful, but it's infinitete bandwidth! And it even supports Raid-5.
Somebody once mentioned to me that this wouldn't work on some systems, that mail gets cached somewheree on the way, but the point is, it's not on my hardware, so why should I care?
Right?
Right?
Not really an issue for proxy based ones (Score:2)
It won't break anything. Things will still work - http, ftp, smtp. Because they are all via proxies. The proxies do the work.
Right now I just allow it for convenience.
The viable way to tunnel through this is via http or ftp, however if username-password authentication is required (like it is here), such abuse is unlikely.
In fact with the username-password system, you don't really need to bother filtering out sites, you just warn the relevant users if they're going too far - e.g. if warez/mp3 sites keep popping up in the logs and the pipe is congested, and the bosses start to notice and ask questions...
Cheerio,
Link.
This is ridiculous! (Score:3)
So, you can use this 31337 Xploit to gain free Internet access... assuming you're already paying for a static IP, and you just happen to know a telephone number that lets anybody in the world log in and use their DNS. Uhm. Yeah.
I guess this is cool just for the sheer niftiness of running data through DNS; I'm sure this will soon be implemented as yet another steganographic protocol, but this isn't too useful, even for ripping off Microsoft.
Not quite free, but can be "free" access anywhere (Score:3)
But it would be useful if you had one of these set up, since then you could use it for your own "free internet access" in other cities if you travelled a lot.
Also, there is another useful application of this: If you set up the target location of one of these in another country, one that doesn't cooperate with foreign authorities in tracking people down, you could have a way to communicate with the rest of the world in an (almost) untracable way.
For example, Mr. A and Mr. B are planning a revolution in a totalitarian state. It's too dangerous for them to use standard internet access, since it can be traced right back to them.
Instead, they get one of these DNS tunnels set up in some country that has no ties (or, even better, animosity) with their current country.
Then Mr. A and Mr. B can call up toll free numbers in various countries and transfer email back and forth in untracable ways to organize the revolution.
Damn! What a cool hack! (Score:4)
Don't get me wrong, I am all for maximizing the available anonymity of the net, but we really need a hack that has the same effect, but which uses a standard server.
All in all, I'll buy the person who though of this a beer any time he or she is in town...
Geeze... (Score:2)
Sometimes the current legal climate, re DeCSS, the CueCat, et al, makes me wish all the good hackers knew how to stay underground instead of posting websites everywhere saying "700k 4t m3! 1 m4d3 4n 0p3n 50urc3 h4xxx0r!!!" It's the kind of thing that causes bad laws to be passed.
(before you flame, realize my tounge is planted halfway in cheek....)
Re:finally some free stuff from micro$oft (Score:2)
Re:So basically....you're wrong (Score:3)
I for one applaud all sorts of cracking and abuse on the internet because it only leads to a better stronger entity. The more people go about messing with everyone elses equipment/software the more those people will improve on their goods. Its called natural selection. Those companies that cannot make a better piece of equipment/software will fail and die. Which is how it should be in a capitalist economy. There is no point in a company succeeding through shoddy gear.
My piece is said.
Re:Just Like Collect Calling (Score:2)
A similar scheme: several websites (such as webwirelessnow.com [webwirelessnow.com]) are offering interesting free services for cell phone users who can recieve text messages for free.
First, the user signs up on the website and gives their phone number, what types of news they're interested in, what stocks they want to keep track of, etc. Then whenever they want updated information, they call a phone number belonging to the company and hang up immediately after the first ring. This is enough time for the internet company to determine the phone number of the caller, and within a minute the cell phone user recieves a text message with the desired information.
--
Re:Practical uses for tunnels (Score:2)
--
Re:TCP to UDP through DNS? (Score:2)
--
AARRGH!! (Score:2)
I'm not sure if there was any translation going on, but it seems plausible.
--Shoeboy
Re:The bigger questions... (Score:2)
BTW, one of the reasons Slashdot is as popular as it is is because they know which articles are most interesting to the bulk of their readers--why do people still keep second guessing them?
numb