On Wed, Jul 30, 2008 at 8:21 PM, der Mouse <[EMAIL PROTECTED]> wrote: >... I took a wild guess that > they had simply opened UDP port 53, set up an IP-in-UDP tunnel on port > 53, and bing! instant connectivity back home. > ... > Of course, this would have been fairly easy to defeat, if they had > wanted to
this has been one of my favorite ways to tunnel, (along with ICMP :). most of the large hotspot vendors have locked their captive portal configuration with a transparent DNS proxy, so your normal DNS requests are sent out, while attempts to piggyback openvpn over UDP 53 or such will fail. on the other hand, kaminsky showed us the bandwidth potential of a lot of RR's in the hands of a determined individual.. *grin* best regards, _______________________________________________ Fun and Misc security discussion for OT posts. https://linuxbox.org/cgi-bin/mailman/listinfo/funsec Note: funsec is a public and open mailing list.
