Я тут в поисках долгоживущих соксов/ прокси. Страна DE и другие. Кто продает? Подскажите. Если не подскажите так, то можно и за символическую сумму. /ПМ
теоретически можно взять абузоустойчивый домен, зарезервировать себе сайт вида rbfghnnfj.de поставить туда скрипт и коннектиться по логину-паролю
+1 автору темы. подскажите сервис по соксам с хорошей выборкой по Европе. из представленных на форуме мало что подходит. Сокс5 и суперсокс не надо)
Теоретически да, если днсы сервера будут располагаться в де. Тут самы оптимальный вариант взять де впс на вин основе, и работать через удаленный раб стол. Тс если интересно могу в лс скинуть, где можешь взять такой впс до 30 уе.
Мну не какие варианты не подходят. Нужно около 350 штук в мясяц. Тут само выгодно это свой трой поднять.
если ты хочешь добиться долгожевучести, при поднятии своего троя, то будь готов выложить на крипт немало денег.
seproxysoft.com Купил подписку и забыл о проблемах навсегда - выбор просто ОГРОМНЫЙ. Софтина ихняя тоже вроде неплохо работает ничего не палится и не проскакивает (проверял на whoer.net) Всем советую
долгоживущие. Я лично подымаю на шеллах. Живут ~пол года. Правда вручную замучаешься. Код: #!/usr/bin/perl #sss.pl v0.1.4 (03/05/10) use warnings; use strict; =head1 NAME Simple SOCKS5 Server for Perl =head1 DESCRIPTION SSS is a Simple SOCKS Server written in perl that implements the SOCKS v5 protocol. It will accept username/password authentication. The script runs in the background as a daemon. =head2 HISTORY Originally I was looking for a simple SOCKS5 Server (with user/pass auth) that would run as a non-root user on FreeBSD. I checked the FreeBSD ports for various SOCKS5 solutions and tried them all, only to discover that each one had a reason why it would not work, or why I could not use it. I figured this could be done in perl, but found that there was no well maintained perl based solutions. I hacked together this solution (with help from public domain scripts) and cleaned it up, ready for release. Its simple, a feature I intend to maintain, however there is scope for much more potential, especially with user feedback. You can read the full story here: http://www.hm2k.com/posts/freebsd-socks-proxy-for-mirc =head2 INSTALL wget http://ssspl.svn.sourceforge.net/viewvc/ssspl/sss.pl chmod 755 sss.pl OR http://ssspl.svn.sourceforge.net/viewvc/ssspl.tar.gz?view=tar tar zxvf ssspl.tar.gz chmod 755 ssspl/sss.pl =head2 USAGE You run the script using the following command: ./sss.pl local_host> local_port> [auth_loginauth_pass)] Note: the auth_pass must be an md5 (hex) hash eg: ./sss.pl hostname.example.com 34567 test:ae2b1fca515949e5d54fb22b8ed95575 Once up and running you can use the server in mIRC using the following command: /firewall [-cmN[+|-]d] [on|off] server> port> userid> password> For more information on this command issue: /help /firewall in mIRC. eg: /firewall -m5 on hostname.example.com 34567 test testing =head1 PREREQUISITES Operating System: Tested on FreeBSD 6.x and CentOS 4.x, should work on others. Required modules: CIO::Socket::INET>, CDigest::MD5>. =head1 CHANGES v0.1.4 (03/05/10) - Improved documentation and logging subs v0.1.3 (24/11/09) - Improved documentation and code - PID is displayed during fork - Added logging (for Katlyn`) v0.1.2 (27/02/09) - Fixed a bug (Thanks Andreas) v0.1.1 (02/10/08) - Improved documentation v0.1 (12/09/08) - Initial release. =head1 TODO * Restrict IP access to the listening port Reeve> * Need a log format, see: http://en.wikipedia.org/wiki/Common_Log_Format * Mozilla Firefox support/GSSAPI authentication support OutCast3k, kingvis> ** See: http://forums.mozillazine.org/viewtopic.php?f=38&t=847655 ** Alternative: http://blogs.techrepublic.com.com/security/?p=421 * IPv6 support * BIND method * UDP ASSOCIATE method * pid file mrakus> * perl threads instead of fork()? mrakus> =head2 FAQ * Why is there multiple processes in my process list? ** Each new connection spawns a new process, so it is easier to manage. * Why does $serverip in mIRC return 255.255.255.255? ** 255.255.255.255 is the default value of a non-resolved address (INADDR_NONE). ** mIRC does not need to resolve the IRC server address. ** See: http://tinyurl.com/yjs8kyf * Why is DCC SEND or DCC CHAT is not working? ** It should work, contact me to diagnose further. ** See: http://www.mirc.com/help/help-dcc.txt * How do I create an md5 hash? ** In mIRC do: //echo -a $md5(password) ** You can visit: http://pajhome.org.uk/crypt/md5/ ** I also added a -getmd5 option which you can use * Why doesnt this work with Mozilla Firefox? ** Because Mozilla wont add SOCKS5 username/password auth support ** Because Ive not added GSSAPI support yet (donations please) =head2 NOTES * http://en.wikipedia.org/wiki/SOCKS * http://ftp.icm.edu.pl/packages/socks/socks4/SOCKS4.protocol * http://ftp.icm.edu.pl/packages/socks/socks4/SOCKS4A.protocol * http://tools.ietf.org/html/rfc1928 * http://tools.ietf.org/html/rfc1929 * http://tools.ietf.org/html/rfc1961 * http://tools.ietf.org/html/rfc3089 * http://tools.ietf.org/html/draft-ietf-aft-mcast-fw-traversal-01 * http://tools.ietf.org/html/draft-ietf-aft-socks-chap-01 * http://tools.ietf.org/html/draft-ietf-aft-socks-eap-00 * http://tools.ietf.org/html/draft-ietf-aft-socks-ext-00 * http://tools.ietf.org/html/draft-ietf-aft-socks-gssapi-revisions-01 * http://tools.ietf.org/html/draft-ietf-aft-socks-maf-01 * http://tools.ietf.org/html/draft-ietf-aft-socks-multiple-traversal-00 * http://tools.ietf.org/html/draft-ietf-aft-socks-pro-v5-04 * http://tools.ietf.org/html/draft-ietf-aft-socks-v6-req-00 * http://tools.ietf.org/html/draft-ietf-aft-socks-ssl-00 * http://www.iana.org/assignments/socks-methods * http://developer.mozilla.org/index.php?title=En/Integrated_Authentication =head1 COPYRIGHT Copyright (c) 2008-2010, a href="http://www.hm2k.com/">HM2K/a>. All rights reserved. Released as Open Source under the BSD License. =head1 LICENSE Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. * Neither the name of the author nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. =head1 CREDITS Satanic Socks Server v0.8.031206-perl datapipe.pl by CuTTer Also, thanks to #perlhelp @ EFnet =pod OSNAMES any =pod SCRIPT CATEGORIES Networking =cut ## Settings our $daemon = 1; #run as a daemon or not (0/1) our $logging = 0; #logging on or off (0/1) our $logfile = sss.log; ## Language my $lang_daemon="Process (%s) has entered into background. "; my $lang_usage="Usage: $0 local_host> local_port> [auth_loginauth_pass)] ". "Note: the auth_pass must be an md5 (hex) hash ". "eg: $0 localhost 34567 test:098f6bcd4621d373cade4e832627b4f6 "; my $lang_bind="Could not bind to %s:%s "; my $lang_sockopen="Could not open a socket to %s:%s "; my $lang_file_open="Could not open log file."; ## Usage if (!$ARGV[1]) { die $lang_usage; } ## Requirements # Install using: perl -MCPAN -einstall %module use IO::Socket::INET; use Digest::MD5 qw(md5_hex); ##-md5 option if ($ARGV[0] eq -getmd5) { shift; print md5_hex(shift); exit(0); } ## Arguments our $local_host = shift; our $local_port = shift; our $auth_login = shift; our $auth_pass; #Parse auth part if ($auth_login && $auth_login =~ m/:/) { ($auth_login,$auth_pass)=split, $auth_login); } #Open listening port $SIG{CHLD} = IGNORE; my $bind = socks_open( Listen=>5, LocalAddr=>$local_host.:.$local_port, ReuseAddr=>1) or die sprintf($lang_bind,$local_host,$local_port); #Run as daemon if ($daemon) { our $pid=fork(); if ($pid) { printf($lang_daemon,$pid); close(); exit(); } } # Start client our $client; while($client = $bind->accept()) { $client->autoflush(); if (fork()){ socks_close($client); } else { socks_close($bind); new_client($client); exit(); } } # New client subroutine sub new_client { my($t, $i, $buff, $ord, $success); my $client = shift; socks_sysread($client, $buff, 1); if (ord($buff) != 5) { return; } #must be SOCKS 5 socks_sysread($client, $buff, 1); $t=ord($buff); unless(socks_sysread($client, $buff, $t) == $t) { return; } $success=0; for($i=0; $i $t; $i++) { $ord = ord(substr($buff, $i, 1)); if ($ord == 0 && !$auth_login) { socks_syswrite($client, "x05x00", 2); $success++; last; } elsif ($ord == 1 && $auth_login) { #GSSAPI auth support #socks_syswrite($client, "x05x01", 2); #$success++; #last; } elsif ($ord == 2 && $auth_login) { unless(do_login_auth($client)){ return; } $success++; last; } } if ($success) { $t = socks_sysread($client, $buff, 3); if (substr($buff, 0, 1) eq "x05") { if (ord(substr($buff, 2, 1)) == 0) { # reserved my($host, $raw_host) = socks_get_host($client); if (!$host) { return; } my($port, $raw_port) = socks_get_port($client); if (!$port) { return; } $ord = ord(substr($buff, 1, 1)); $buff = "x05x00x00".$raw_host.$raw_port; socks_syswrite($client, $buff, length($buff)); socks_do($ord, $client, $host, $port); } } } else { socks_syswrite($client, "x05xFF", 2); } socks_close($client); } # Do login authentication subroutine sub do_login_auth { my($buff, $login, $pass); my $client = shift; socks_syswrite($client, "x05x02", 2); socks_sysread($client, $buff, 1); if (ord($buff) == 1) { socks_sysrea