Electronic Frontiers Australia has moved its website to the United States in response to Australian
Internet censorship legislation which commences on 1st January 2000. http://www.efa.org.au/Publish/PR991221.html
-----------------------------------------------------------------
Blinded by Smoke: The Hidden Agenda of the Online Services Bill 1999 (An article on the broad definition of the
R classification) http://rene.efa.org.au/liberty/blinded.html
...
Email "unsubscribe" to [EMAIL PROTECTED] to be removed.
Or go to this web page: http://listmaster.iinet.net.au/list/stop-censorship
Some submissions on the Internet Industry Association's (IIA) 'Internet Industry Code of Practice' (5): A Code For Industry Self Regulation In Areas of Internet Content, Privacy, E-Commerce, and Related
Areas": http://www2.hunterlink.net.au/
~ddhrg/iia/codev5.html
Prosecution of student editors of Rabelais, the La Trobe University student newspaper - Fight Censorship in Australia: http://rene.efa.org.au/censor/rabelais_dc.html, http://rene.efa.org.au/censor/rabelais.html (On 24 March 1999, the charges against the former editors
of Rabelais were dropped by the Director of Public Prosecutions (DPP), without explanation)
"Electronic Frontiers Australia today called for the resignation of the Minister for Communications, Information
Technology and the Arts, Senator Richard Alston
... There is absolutely no evidence of demand by the community for more censorship. In fact, the opposite is the
case. ...
It is quite obvious that a significant factor in the introduction of this legislation was the government's need
to gain Senator Harradine's crucial vote for its GST and Telstra agendas.§ The government has shown it is
prepared to sell out both free speech and a burgeoning industry in order to meet other political objectives.":
_______________
§ The Liberal Party webpage of Senator Alston states: "... It is the Howard Government that is tackling
the big issues ..... and [giving] Australians the chance to own more stakes in Telstra - a privatisation that will
wipe out nearly 40 per cent of Government debt.":
http://vic.liberal.org.au/ senate/info/alston.html
* Lists of public proxies
2 (all are on common ports)
->PAGE 3 (bypassing national censoring proxy arrays, etc.)
Proxies on uncommon ports, Port 81 & 8081 proxies. Information on how to use Proxy Hunter 3.
->PAGE 4 Some information on using shell accounts to run proxy
programs, and on making lists of hostnames a little safer.
Port 80 proxies are often not valuable, and that is one port used by hackers.
A lot of people use public proxies just to bypass slow not-optional ISP caching proxies and get speed improvements
perhaps by even using proxies in very distant countries. There never seems to be any complaints from using public
proxies. In theory ISPs could be accepting of having customers bypass a slow caching proxy when it is most loaded
and most slow.
Censorship of the Internet in Belarus, Burma, Central Asia, China, Cuba, Iran, Iraq, Libya,
North Korea, Saudi Arabia, Sierra Leone, Sudan, Syria, Tunisia, Vietnam: http://www.rsf.fr/uk/alaune/ennemisweb.html (Reporters Sans Frontieres, RSF)
Soros Foundation: Descriptions on the Internet in 15 countries, and information
on censorship in China, Singapore, & Tunisia: http://www.soros.org/censorship/
How to disable client-side censoring proxy programs (including BESS, CYBERsitter, Net Nanny, I-Gear, SmartFilter, and WebSENSE): www.peacefire.org.
Note: A significant fraction of the proxies listed hasve since gone bad. To find the fastest proxies, a method
is: copy the data off the page, convert it to IP numbers using Plookup, and then sort and test the interfaces
or proxies using Proxy Hunter.
Public Proxies 1
Group 26: Library proxies that allow bodies of academic electronic journals to be read (GMT 13-March-2000)
Found by testing known proxies. Proxy Hunter was used, and it check scan PDF files it might download. One port 8081 library proxy was found.
MOST PROXIES ARE ON PAGE 2:
http://www.ijs.co.nz/proxies2.htm (page is large)
The SORM page (83KB. Some links to free Java
and Perl proxy software that might be of interest to writers of proxies. Also info on using Apache 1.3.x as a caching
proxy in Windows 95, Delegate, and other items.
Finding the fastest proxies from a list of proxies
Proxies from this website can be copied into a text editor, e.g. NoteTab.
The ". "s could be removed and the file could be saved under the name "a.txt",
say. Plookup.exe can then convert hostnames in the file to IP numbers, and produce a file
suitable for Proxy Hunter 2.8:
"script.com -f A-P.TXT plookup -p -f a.txt".
"teew.com plookup -p -f a.txt >a-p.txt".
Proxy
Hunter Warning: Use of Proxy Hunter can lead to incoming complaints.
RFC Reducing The Quantity Of Firewall Administrators' Complaints
Proxy Hunter can sort lists of proxies by their speed (and determine if port-address pairs actually proxy).
Proxy Hunter 2.8 or 3b5 can be downloaded here: http://member.netease.com/~windzh/software/proxyht/download.htm.
Notes the on use of version 3 (Chinese version) are on pg4 (a must read if searching
on uncommon ports would be done). (Windows 95, English version, GUI, [Microsoft Visual C++].
Pfinder 2.0 , a Socks Proxy finder: download: pfinder.exe
(28K, ver 2.0bld9.29[10Jul99], GUI); homepage. A person in China mentioned this to me by e-mail and a homepage was not found. [The author of Proxy Hunter
might know how to contact the author of PFinder]. Unlike Proxy Hunter, PFinder is not able to read a file of IP
numbers. One person said it found more proxies (unchecked).
Plookup. Can clean up mixed lists of IP numbers and hostnames. It produces the lists on this page.
Proxy Hunter reads and outputs only IP numbers, and Plookup can get hostnames into and out of that format. Download
here: http://www.ijs.co.nz/code/ (Windows 95, command line, Ada 95).
qWeb: http://www.q32.com/qweb.htm, code+documentation.
Can download a web page through a proxy. This program is what the author uses to check whether proxies are anonymous
or not. qWeb can download a single 'show headers' environment checker webpage through many proxies (inside
DOS windows). It can be used when searching for SSL Tunnelling proxies, or chaining [URL-gluing] proxies.
Perl CGI Proxy 'CGIProxy' software to remove question marks from URLs: .../code/
Reliable Multiplexing of TCP over UDP or TCP
(for proxies)
Web-Browsing can be multiplexed and wrapped with GET head when outgoing. It is becoming common for webbrowing
to be monitored.
Related info: SSL "Reverse Proxies" (proxies that imitate being a webserver to a client
program, e.g. Apache SSL): Netscape. Load balancing: http://www.WebTechniques.com/features/1998/05/engelschall/engelschall.shtml
(A reverse proxy can shift an obscured website's URLs from http to https and make links in the site's pages invalid)
Information on how to use SecureCRT and SSHD to browse to blocked websites using compression, is on proxies3.htm
Some SSL to not-SSL converting proxy programs for Windows 95 (The programs listed here are similar. None of SSR, Bjorb, Stunnel was
observed actually encapsulating any SSL encrypted TCP/IP data inside http packets so that it could pass through
an ordinary proxy. Stunnel is planned to not get such a feature (2-July-99).)
Feb-2000. Zebedee
of Jan 2000 can run as a very compressing encrypting proxy transporting adequately webpages with images. Zebedee
is a competitor to the ssh/sshd programs. The bug in the 1st version has been fixed.
Timing tests showed Blowfish did not slow throughput and that BZip2 was faster than the Zlib
that used in SSHD.
It is designed to port forward X11 VNC I/O. [Dec-99].
SSHD has a bug which is that it won't run in user mode if a shadow
password exists. That can mean that people that do ssh telnet in but that do not have the superuser password, can't
port forward over any port except port 22 (unless another sshd is made to run for them).
SSR 4:http://www.celocom.se/. By Celocom Communications.
I failed to get this program to talk to itself inside a single Win9x machine. The SSR 4 proxy can decrypt
SSL encrypted http which had been created by Stunnel. Also, Bjorb and Stunnel can decrypt Stunnel encrypted http
data (when not given a certificate/key).
Ptunnel (for research): http://www.ijs.co.nz/code/. (proxies TCP/IP & prints it). Encrypted TCP/IP data lacking headers can be observed with Ptunnel,
and not with any Junkbuster proxy when the data lacks http headers.
Commercial services allowing browsing with encrypted client to server connections:
The Magus Network (http://www.magusnet.com/) has SSL https proxies which
are based on the Delegate software. Persons using that (commercial) service may initially access websites using
URLs like these: "https://xxx.magusnet.com:P/-_-http://www.dest.com",
"https://xxx.magusnet.com:P/-_-ftp://www.dest.com". The Magusnet
https Delegate proxy (or proxies) do in fact rewrite URLs, so links in pages can be followed with a single left-button
click. If, for example, a webpage being served, started out containing this link <A HREF="http://yahoo.com/">Yahoo</A>
then the Magusnet Delegate proxy would be rewrite that part of the page to a form resembling: <A HREF="https://xxx.magusnet.com:port/-_-http://yahoo.com/">Yahoo</A>.
Some other proxies that rewrite URLs, are listed on the Sorm page: link.
Note: Proxies are said to be in New Zealand if their IP number is in one of the ranges listed
in the file at ftp://ftphost.waikato.ac.nz/pub/netinfo/nzgate/docs/nzip.latest. [Ranges for China & Hong Kong are listed at http://member.netease.com/~windzh/software/proxyht/warn.htm]. The proxies in
this section are all actually inside New Zealand. (17-Mar-99)
(All the NZ proxies in the main list of 1835 proxies are listed here (IP numbers were checked against the ranges).
[Hostnames of ihug.co.nz weren't checked.]
NZ proxies that proxy 'http:' webpages
removed, out of date
Notation used at this website
":A" : Anonymous, Not ":C". The distant website is not sent headers that disclose
the identity of any computer on the near side. (On this page, ":A" ignores whether the "referer"
header is disclosed.).
":C" : 'Caching', Not ":A". The proxy is likely a caching proxy. A proxy would be given
a "C" if computers beyond the proxy, can find out the country or IP number or hostname of a machine on
the near side of the proxy.
[AnonyMouse e-mailed information about which proxies were not-anonymous (or caching) on about 20-April and also
information of that sort was received on 12-May-99.] [The letter used on this webpage used to be
"o", and then "d", and recently "c". Uppercase "C" is selected as it is
easy to see and the letter suggests the word "caching".]
H: = transparent for "http:" webpages. E.g. H:A, H:C. S: = transparent for "https:" webpages (SSL tunnelling). E.g. S:A, S:C :no = didn't proxy when tested :X, :o are not used on this page. It is not obvious which is which.
Notes 2
Proxies 4 All, Proxys4all, Proxys Four All, Proxies For All
Some information on public proxies, browsing anonymously, and proxy software, how to test lists of proxies and
so on, is at this page: http://www.ijs.co.nz/sorm.htm#ProxyHunting.
ISPs with slow non-optional caching proxies
Some ISPs, transfer internal port 80 ... browsing traffic into a slow caching proxy. A fix may be to use another
port 80 proxy known to or controlled by the ISP, or to use some distant proxy not located on port 80.
Details on configuring SQUID to be a transparent caching proxy is here: Transparent
Caching/Proxying.
A page allowing containing links that will perform traceroutes of www.* addresses
of New Zealand ISPs: traceroute-isps.htm. (traceroutes are from http://voa.his.com/)
Mr David Irving
Argued the defense in an issue of defamation with Ms Lipstadt.
Some more links on Jewish topics and so on, are on sorm2.htm.
A network person in Georgia, in a school group in DeKalb county, (i.e. Andy)
did apparently bemoan a proxies site harshly off the Internet. (VirtualAve, however, was the implementor of the
decision). There is every chance that DeKalb county is repentant in misconfiguring their proxies (to borrow an
idea from the bible). One use of Socks proxies is to allow use of Napster, the songs MP3 finding program.
Here is a TheCorporation.com special report on proxy use in the Americas: "Internet® Technologies Aid In
Classroom Education", http://www.thecorporation.com/news/stories/educate.html (pictures show transferring human knowledge without transferring germs to trainee network
abuse specialists & administrators, 20-Feb-2000).
The Internet can affect the "psychology of nations, the psychology of the individual",
noted G. Yemelyanov of FAPSI, on Russian TV (Russia TV channel, 10:00 GMT 20-May-97, Moscow):
http://www.info-sec.com/internet/internet_zk.html-ssi)
Ports containing proxies are not ports that might be tried if the possibility of intruding into
a computer system was being intended. The CERT Incident Note IN-99-01 at http://www.codetalker.com/advisories/cert/in-99-01.html describes the ports
the program sscan checks on. [...Sscan checks these ports: 1 (tcpmux), 21 (ftp), 22 (ssh), 23 (telnet), 25 (smtp),
53 (domain), 79 (finger), 80 (www), 110 (pop3), 111 (sunrpc),
139 (netbios-ssn), 143 (imap), 1114 (Linux mSQL), 2766 (Solaris listen/nlps_server), 6000 (x11).]
Eight Steps to A Working Intrusion Detection System: http://www.nswc.navy.mil/ISSEC/CID/step.htm (98-07-01)
Development of Java+Perl proxy stopped: Zebedee proxy (UK, Mr Winton) is interesting (Bzip2 proxy
with Blowfish, no UDP, and small bugs) [Dec-99].
The eXTReMe Tracking counter system
Click on the image to view a report on the usage of this page
..