Total Pageviews

Saturday 18 June 2016

利用spiped+socks代理服务器程序翻墙

首先登陆linux vps,
wget https://www.tarsnap.com/spiped/spiped-1.5.0.tgz
tar zxvf spiped-1.5.0.tgz
cd spiped-1.5.0
make
make install

root@AR:~/spiped-1.5.0# which spiped
/usr/local/bin/spiped
(说明spiped安装成功。)
root@AR:~/spiped-1.5.0# spiped 
usage: spiped {-e | -d} -s <source socket> -t <target socket> -k <key file>
    [-DFj] [-f | -g] [-n <max # connections>] [-o <connection timeout>]
root@AR:~/spiped-1.5.0# dd if=/dev/urandom bs=32 count=1 of=spiped.key
(此命令会在当前目录下,生成spiped.key文件)
root@AR:~/spiped-1.5.0# spiped -d -s 0.0.0.0:8025 -t 127.0.0.1:20080 -k spiped.key
(此命令的意思是在服务器0.0.0.0上监听8025端口,收到连接请求后,转发到同一台机子的20080端口,而在20080端口上运行的是一个socks代理服务器程序mocks,然后通过这个socks代理服务器程序去访问目标网站。mocks的搭建,见此:http://briteming.blogspot.com/2012/02/socks-server-mocks.html)
服务器端就搭建好了。

在客户机器上。(linux desktop os或者mac)
linux desktop os下,spiped的编译同linux vps上的操作是一样的。
mac下,则运行brew install spiped即可。
yudeMacBook-Air:~ brite$ which spiped
/usr/local/bin/spiped
(说明spiped安装成功。)
yudeMacBook-Air:~ brite$ spiped -e -s '[0.0.0.0]:8089' -t '[your_vps_ip]:8025' -k ~/spiped.key
(此命令的意思是在本地机器监听8089端口,收到连接请求后,转发到你的vps的8025端口。)
yudeMacBook-Air:~ brite$

然后设置本地机器的浏览器的socks5代理为127.0.0.1:8089,即可翻墙。

项目地址:
https://github.com/morgante/spiped-docker/tree/master/spiped-1.3.1
https://github.com/morgante/spiped-docker
https://www.tarsnap.com/spiped/
相关帖子:http://briteming.blogspot.com/2016/06/socksspiped.html
这类类似的翻墙思路有好多:
stunnel+socks代理服务器程序/http代理服务器程序翻墙
(http://briteming.blogspot.com/2012/01/vpsstunnel.html,
http://briteming.blogspot.com/2016/03/vpsstunnel.html)

obfstunnel+socks代理服务器程序翻墙
(briteming.blogspot.com/2016/04/obfstunnelsockshttp.html)

obfsproxy+socks代理服务器程序翻墙
(http://briteming.blogspot.com/2016/03/obfsproxysockshttp.html)

gotunnel+socks代理服务器程序翻墙
(http://briteming.blogspot.com/2015/09/gotunnel.html)

qtunnel+socks代理服务器程序翻墙
(http://briteming.blogspot.com/2015/10/goqtunnel.html)

kcptun+socks代理服务器程序翻墙
(briteming.blogspot.com/2016/05/kcptunsocks.html)

利用usocks+后端的socks proxy(或http proxy)翻墙
(https://briteming.blogspot.com/2016/06/usockssocks.html)

利用CRedir+后端的socks proxy(或http proxy)翻墙
(https://briteming.blogspot.com/2021/07/credir-crypted-port-redirector.html)