So do this:. Here's an example:. The proxy authentication feature is very new and has not been tested extensively so your mileage may vary. If you encounter any problems when trying to use this feature please email me. It would be helpful if you could include the following information:. The problems are sporadic, and I believe that they are related to the round-robin setup that I was testing it again. Your mileage may vary. The main author is Pat Padgett. But none of the contact info left work anymore, so a name is all we have.
Bryan Chan created this repository and tweaked the code a little bit. Skip to content. Star Branches Tags. Or even just let those users alone.
Users aren't stealing service if it's not even the same service. It's much slower than buying wifi from the captive portal. DNS tunnelling is not fast or convenient. Places deploying captive portals have probably looked at the risk to their business from it and have decided not to worry about it.
I can't believe that using a slow DNS connection, intentionally made public, to tunnel traffic would be considered theft or criminal. How many free samples do I have to eat before I'm a theif?
I don't believe I'm a thief until the offer for free samples is rescinded. I would imagine at the very least you would degrade DNS resolution times for legitimate users since there would be a lot more requests than usual. The free service is just for the light. Can I use my solar powered calculator under a street light? Or is that theft of service too? The light is free. The electricity isn't. I suppose adblock is theft too?
Opinion differs, but many ad-supported sites would say yes. I'm not sure if it has every been tested in court.
Happy to be corrected if I'm wrong, though! Apart from the theft angle it's also knowingly and maliciously circumventing access control systems. That's usually covered under anti-hacking laws. I'm floored that this is apparently how people are reasoning about the world now. Especially on HN. There is no circumventing of any access control here. If a service is giving a public access point, on public spectrum, and they let you connect, and they allow you to use DNS, you should be able to use DNS however their access control systems allow you to use it.
Now if you find an exploit in their captive portal that allows you access to their service, then sure, that's illegal, because you're breaking into something. You can't circumvent access controls if the access control list is wide open. The intent is that you have to pay to use the WiFi. Even if you find a clever technical way to circumvent that that, the judge will see what you were trying to do: avoid paying for the service is offered.
The court is not a computer and a judge will use their human brain to make a judgement of your intent. Is it also theft if I run sshd on udp 53 and I happen to be able to connect? How about if I run sshd on tcp 22 and it's not blocked? Is it illegal if I just want to see if a dns change I made has propagated and I query an A record?
It seems obvious to me that a judge would say "It's not theft if you're giving it away. If you have a problem with how people are using your free service, add restrictions.
Case dismissed. My intent is to have free DNS access to communicate with my server. The service provider intended to provide a public access point with free DNS and no restrictions on its use.
The conclusion should be obvious. Consider a toll booth without a barrier commonly known as iPass lanes in some parts. The intention is that you have to pay when passing through. There's no technical measure in place to prevent you from not driving through without paying.
Indeed, sometime I'm also floored about the lack of openness here. As I often say, self-proclaimed nerds who can't imagine life without a big brother taking care of things love to complain and complain and complain. The ages of relying on oneself and technology seems gone. Quite the opposite -- there is complete openness in this thread about the technical aspects of the circumvention or use of the technique, plus open and timely reminders regarding the potential legal ramifications of executing this technique in certain jurisdictions.
Why would it be illegal? Maybe unwise, or against your employer's policy, but not illegal. As best as I can tell from this thread, if you make use of any service in any way that could be interpreted as unintended by the service provider, you're a criminal. It makes me wonder if using 1. That is not the case, at least in most occidental jurisdictions. There is no basis to say these actions, or using a different DNS, is criminal.
You need to clone the repo and then you need to go into the corkscrew source directory and run. If you want to go more in depth about the configuration, please have a look at the INSTALL file which gives general information about the build system. NOTE : Command line syntax has changed since version 1. Please notice that the proxy port is NOT optional anymore and is required in the command line.
After creating this file you will need to ensure that the proper perms are set so nobody else can get your username and password by reading this file. So do this:. Here's an example:. The proxy authentication feature is very new and has not been tested extensively so your mileage may vary. If you encounter any problems when trying to use this feature please email me.
It would be helpful if you could include the following information:. The problems are sporadic, and I believe that they are related to the round-robin setup that I was testing it again. Your mileage may vary.
The main author is Pat Padgett. But none of the contact info left work anymore, so a name is all we have. Bryan Chan created this repository and tweaked the code a little bit. As I tried to use this project, I had a few hurdles on the path and so I've tried to improve the experience for future users by modernizing the documentation:.
I am trying to use the auth option, but it doesn't work, unforunatelly, this is all I get, no more verbose errors:. When I try to connect for example via firefox or any other SW that ask me for proxy credentials, I just give it user and password that is written on first line in file "proxy" and it works. Hello bryanpkc, could you please tag the 2.
This will help the downstream distribution of the software. The buffer cannot be free d in the function, so I made the caller manage it so it could be. Compiling on osx had this warning:. Valgrind noted a printf of an uninitialized value, descr in fprintf.
0コメント