Monday, June 29, 2009

Sock 5 list

75.49.225.33:45971
24.124.46.22:55561
24.190.78.101:18579
70.138.108.214:1111
98.218.97.145:32671
78.232.92.5:4163
24.14.181.163:32677
139.78.28.225:8916

Friday, June 26, 2009

Stunnel -- Universal SSL Wrapper

Stunnel is a program that allows you to encrypt arbitrary TCP connections inside SSL (Secure Sockets Layer) available on both Unix and Windows. Stunnel can allow you to secure non-SSL aware daemons and protocols (like POP, IMAP, LDAP, etc) by having Stunnel provide the encryption, requiring no changes to the daemon's code.

The Stunnel source code is not a complete product -- you still require a functioning SSL library such as OpenSSL or SSLeay in order to compile stunnel. This means that stunnel can support whatever (and only) that which your SSL library can, without making any changes in the Stunnel code.

The Stunnel source code is available under the GNU General Public License, meaning it is free to use in both commercial and non commercial applications as you see fit, as long as you provide source code (and any modifications) with the software. Your compiled Stunnel binary is 'restricted' by whatever license your chosen SSL library is under, however both OpenSSL and SSLeay are open source and similarly liberal in their licensing.



visit : http://www.stunnel.org/

Saturday, June 20, 2009

OpenVPN

OpenVPN

OpenVPN is a free and open source virtual private network (VPN) program for creating point-to-point or server-to-multiclient encrypted tunnels between host computers. It is capable of establishing direct links between computers across network address translators (NATs) and firewalls. It was written by James Yonan and is published under the GNU General Public License (GPL).

Introduction

OpenVPN allows peers to authenticate each other using a pre-shared secret key, certificates, or username/password. When used in a multiclient-server configuration, it allows the server to release authentication certificate for every client, using signature and Certificate authority. It uses the OpenSSL encryption library extensively, as well as the SSLv3/TLSv1 protocol. It is available on Solaris, Linux, OpenBSD, FreeBSD, NetBSD, Mac OS X, and Windows 2000/XP/Vista. It contains many security and control features. It is not a "web-based" VPN, and is not compatible with IPsec or any other VPN package. The entire package consists of one binary for both client and server connections, an optional configuration file, and one or more key files depending on the authentication method used. It is sometimes used by computer gamers as a way of accessing LAN games over the internet.

Encryption

OpenVPN uses the OpenSSL library to provide encryption of both the data and control channels. It lets OpenSSL do all the encryption and authentication work, allowing OpenVPN to use all the ciphers available in the OpenSSL package. It can also use the HMAC packet authentication feature to add an additional layer of security to the connection (referred to as an "HMAC Firewall" by the creator). It can also use hardware acceleration to get better encryption performance.

Authentication

OpenVPN has several ways to authenticate peers to one another. OpenVPN offers pre-shared secret key, certificate-based, and username/password-based authentication. Preshared secret key is the easiest, with certificate based being the most robust and feature-rich. The username/password is a new feature (version 2.0) that can be used with or without a client certificate (the server still needs a certificate). The source tarball includes a sample Perl script to verify the username/password with PAM and a C auth-pam plugin.

Networking

OpenVPN can run over UDP (preferred, and default) or TCP. It multiplexes all communications over a single TCP/UDP port. It has the ability to work through most proxy servers (including HTTP) and is good at working through NAT and getting out through firewalls. The server configuration has the ability to "push" certain network configuration options to the clients. These include IP addresses, routing commands, and a few connection options. OpenVPN offers two types of interfaces for networking via the Universal TUN/TAP driver. It can create either a layer-3 based IP tunnel (TUN), or a layer-2 based Ethernet TAP that can carry any type of Ethernet traffic. OpenVPN can optionally use the LZO compression library to compress the data stream. Port 1194 is the official IANA assigned port number for OpenVPN. Newer versions of the program now default to that port. A feature in the 2.0 version allows for one process to manage several simultaneous tunnels, as opposed to the original "one tunnel per process" restriction on the 1.x series.

OpenVPN's use of common network protocols (TCP and UDP) makes it a desirable alternative to IPsec in situations where an ISP may block specific VPN protocols in order to force users to subscribe to a higher-priced, "business grade," service tier.

Security

OpenVPN offers several internal security features. It runs in userspace, instead of requiring IP stack (and therefore kernel) operation. OpenVPN has the ability to drop root privileges, use mlockall to prevent swapping sensitive data to disk, and enter a chroot jail after initialization.

OpenVPN offers support of smart cards via PKCS#11 based cryptographic tokens.

http://en.wikipedia.org/wiki/OpenVPN

Proxifier - Bypass firewall and proxy, tunnel connections through an HTTPS and SOCKS proxy

Proxifier is a program that allows network applications that do not support working through proxy servers to operate through an HTTPS or SOCKS proxy or a chain of proxy servers.

There are many network applications that do not support working through proxy servers and thus cannot be used behind a LAN or firewall(s). These can compromise corporate privacy and lead you to many other restrictions. Proxifier solves all of these problems and gives you the opportunity to work with your favorite software without any restrictions. Additionally, it lets you gain extra control over network security, create a proxy tunnel and add more power to network functionality.


Introduction

Proxifier is a program that allows network applications that do not support working through proxy servers operate through a HTTP or SOCKS proxy server or a chain of proxy servers.

With Proxifier you can easily tunnel all connections on the system or separate applications.

Proxifier allows you to:

  • Run any network applications through proxy server; no special configuration is required for the software.
  • Access the Internet from restricted local area network through a proxy server gateway.
  • Bypass firewall restrictions (connect to restricted ports).
  • Use three types of proxy servers: SOCKS v4, SOCKS v5, and HTTP.
  • "Tunnel" the entire system (force all network connections in the system work through a proxy server).
  • Resolve DNS names through a proxy server.
  • Use flexible Proxification Rules.
  • Secure privacy by hiding your IP address.
  • Work through a chain of proxy servers using different protocols.
  • Use NTLM authentication on HTTP proxy
  • View information on current connections (addresses, rate, data transfer, connection time, etc.) in real-time.
  • View information on bandwidth usage as a colored diagram in real-time.
  • Maintain log files.
  • Log incoming and outgoing traffic.
  • Get detailed reports on network errors.
  • … and much more.

Proxifier Portable Edition:

  • Has most of Proxifier Standard Edition features.
  • Doesn't require installation on a local machine.
  • Can be run from removable media such as USB stick, Floppy, etc…
  • Can be run from Guest and Restricted user accounts.
  • Keeps all settings in the file, doesn't use system registry.

Friday, June 19, 2009

UPDATE LIST PROXY, JUNE

64.29.151.29 80
64.29.148.38 80
64.29.148.16 80
64.29.148.47 80
91.206.100.11 3128
74.208.46.168 3128
200.181.49.179 8080
115.146.20.63 80
64.29.148.49 80
212.3.135.112 3128
190.30.214.78 808
187.27.183.129 6588
78.29.34.42 808
200.97.124.214 6588
77.252.139.242 3128
64.29.148.39 80
218.169.190.153
64.29.148.25 80
189.15.7.154 6588
201.92.69.87 6588
189.46.19.140 6588
187.26.192.0 6588
203.218.86.151 808
201.68.167.16 6588
200.170.221.10 3128
200.225.171.96 6588
89.107.195.55 88
190.134.26.88 6588
201.75.23.86 3128
117.198.228.135
123.203.170.16 8088
114.137.62.15 808
201.68.42.123 6588
117.195.165.65 6588
59.93.138.3 6588
123.201.1.234 6588
125.99.20.147 6588
115.187.33.245 6588
117.197.15.50 6588
78.156.242.191 3128
87.254.152.112 6588
123.201.86.107 6588
115.240.42.196 8080
89.112.9.90 6588
123.238.143.0 6588
219.84.2.4 808
219.78.51.43 808
89.124.235.131 8080
92.45.12.2 3128
60.48.245.106 3128