←back to thread

137 points samray | 1 comments | | HN request time: 0.207s | source
Show context
roygbiv2 ◴[] No.45537602[source]
Iodine has done this for many years. https://github.com/yarrick/iodine
replies(2): >>45537660 #>>45540001 #
BehindTheMath ◴[] No.45537660[source]
I haven't used iodine, but this seems simpler. Iodine wraps requests with actual DNS requests. In this case that wasn't needed, because port 53 wasn't filtered at all. So all they needed was a simple proxy on port 53.
replies(1): >>45539956 #
1. krautsauer ◴[] No.45539956[source]
iodine automatically checks several modes a "simple" proxy on port 53 being one of them. If you're trying to sneak traffic through this kind of block, it is really the first tool to try.