←back to thread

134 points samray | 4 comments | | HN request time: 0.642s | source
1. roygbiv2 ◴[] No.45537602[source]
Iodine has done this for many years. https://github.com/yarrick/iodine
replies(2): >>45537660 #>>45540001 #
2. BehindTheMath ◴[] No.45537660[source]
I haven't used iodine, but this seems simpler. Iodine wraps requests with actual DNS requests. In this case that wasn't needed, because port 53 wasn't filtered at all. So all they needed was a simple proxy on port 53.
replies(1): >>45539956 #
3. krautsauer ◴[] No.45539956[source]
iodine automatically checks several modes a "simple" proxy on port 53 being one of them. If you're trying to sneak traffic through this kind of block, it is really the first tool to try.
4. kangs ◴[] No.45540001[source]
Dan Kaminski popularized this in 2007-8 or so. Not that it didn't exist here and there, but he made the perhaps first public version of a dns tunnel (ozyman). he inspired iodine and others and was a fairly well known guy.

Dan passed away in 2021, rip.

if you search for it its hard to find. his blog is down (hea dead...), and many companies and people talked about it on his behalf to drive traffic (hi duo sec..), so you can see the internet forget, rediscover, and rewrite some history even in a few years.