<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
					xmlns:content="http://purl.org/rss/1.0/modules/content/"
					xmlns:wfw="http://wellformedweb.org/CommentAPI/"
					xmlns:dc="http://purl.org/dc/elements/1.1/"
				  >
<channel>
<title>NEVERFEAR (Post Comments)</title>
<link>http://neverfear.org</link>
<description><![CDATA[NEVERFEAR.org weblog feed for post comments]]></description>
<image><title>NEVERFEAR (Post Comments)</title>
<link>http://neverfear.org</link>
<url>http://neverfear.org/favicon.ico</url>
</image>
<language>en-uk</language>
<pubDate>Tue, 14 Apr 2026 17:54:13 +0000</pubDate>
<item>
<title>Comment on Using ICMP tunneling to steal Internet</title>
<link>http://neverfear.org/blog/view/9/Using_ICMP_tunneling_to_steal_Internet/comments#comment_242</link>
<pubDate>Thu, 24 May 2012 00:45:28 +0000</pubDate>
<description><![CDATA[<p>Is ICMP tunneling generally fast? and what is the speed?</p>
]]></description>
<author>martinoware@gmail.com</author>
<guid isPermaLink="true" >http://neverfear.org/blog/view/9/Using_ICMP_tunneling_to_steal_Internet/comments#comment_242</guid>
</item>
<item>
<title>Comment on Using ICMP tunneling to steal Internet</title>
<link>http://neverfear.org/blog/view/9/Using_ICMP_tunneling_to_steal_Internet/comments#comment_236</link>
<pubDate>Sat, 07 Apr 2012 22:35:11 +0000</pubDate>
<description><![CDATA[<p>Thanks - fixed.</p>
]]></description>
<author>doug@neverfear.org</author>
<guid isPermaLink="true" >http://neverfear.org/blog/view/9/Using_ICMP_tunneling_to_steal_Internet/comments#comment_236</guid>
</item>
<item>
<title>Comment on Using ICMP tunneling to steal Internet</title>
<link>http://neverfear.org/blog/view/9/Using_ICMP_tunneling_to_steal_Internet/comments#comment_235</link>
<pubDate>Fri, 06 Apr 2012 17:31:27 +0000</pubDate>
<description><![CDATA[<p>PDF link not working</p>
]]></description>
<author>X</author>
<guid isPermaLink="true" >http://neverfear.org/blog/view/9/Using_ICMP_tunneling_to_steal_Internet/comments#comment_235</guid>
</item>
<item>
<title>Comment on Using ICMP tunneling to steal Internet</title>
<link>http://neverfear.org/blog/view/9/Using_ICMP_tunneling_to_steal_Internet/comments#comment_197</link>
<pubDate>Tue, 24 May 2011 09:46:09 +0000</pubDate>
<description><![CDATA[<p>Yeah, this is quite a nice utility, but unfortunately it does not work on my USB Internet.</p>

<p>I guess it is because it is not able to receive echo request but can only send a request and get a response. It would be great if you do commit your idea and even get into the team! :D I'm not good enough at network programming to dive in, but I would think that there should be no need for the proxy to send an echo request to the client. I really think the client should just keep sending echo packets and just decide what to do based on the response.</p>
]]></description>
<author>thomassabocharms@gmail.com</author>
<guid isPermaLink="true" >http://neverfear.org/blog/view/9/Using_ICMP_tunneling_to_steal_Internet/comments#comment_197</guid>
</item>
<item>
<title>Comment on Using ICMP tunneling to steal Internet</title>
<link>http://neverfear.org/blog/view/9/Using_ICMP_tunneling_to_steal_Internet/comments#comment_181</link>
<pubDate>Sun, 13 Feb 2011 17:30:29 +0000</pubDate>
<description><![CDATA[<p>Wow, can noobz lso try dis???, cn u run hide ip while pinging?
Keep it up Fbt ubt</p>
]]></description>
<author>Genieas</author>
<guid isPermaLink="true" >http://neverfear.org/blog/view/9/Using_ICMP_tunneling_to_steal_Internet/comments#comment_181</guid>
</item>
<item>
<title>Comment on Using ICMP tunneling to steal Internet</title>
<link>http://neverfear.org/blog/view/9/Using_ICMP_tunneling_to_steal_Internet/comments#comment_152</link>
<pubDate>Wed, 23 Jun 2010 00:56:01 +0000</pubDate>
<description><![CDATA[<p>i am using internet connection with dynamic client ip address.
can you introduction how to setup ptunnel in server side and client side. i want to using ptunnel with openvpn in client side. thank you.</p>
]]></description>
<author>transformerx@ymail.com</author>
<guid isPermaLink="true" >http://neverfear.org/blog/view/9/Using_ICMP_tunneling_to_steal_Internet/comments#comment_152</guid>
</item>
<item>
<title>Comment on Using ICMP tunneling to steal Internet</title>
<link>http://neverfear.org/blog/view/9/Using_ICMP_tunneling_to_steal_Internet/comments#comment_151</link>
<pubDate>Tue, 22 Jun 2010 17:28:32 +0000</pubDate>
<description><![CDATA[<p>Yeah, this is quite a nice utility, but unfortunately it does not work on my USB Internet.</p>

<p>I guess it is because it is not able to receive echo request but can only send a request and get a response.
It would be great if you do commit your idea and even get into the team! :D I'm not good enough at network programming to dive in, but I would think that there should be no need for the proxy to send an echo request to the client.
I really think the client should just keep sending echo packets and just decide what to do based on the response.</p>

<p>Right now, I'm tunneling TCP over DNS... pretty slow, but it works for now.</p>
]]></description>
<author>elie.zedeck@gmail.com</author>
<guid isPermaLink="true" >http://neverfear.org/blog/view/9/Using_ICMP_tunneling_to_steal_Internet/comments#comment_151</guid>
</item>
<item>
<title>Comment on Using ICMP tunneling to steal Internet</title>
<link>http://neverfear.org/blog/view/9/Using_ICMP_tunneling_to_steal_Internet/comments#comment_144</link>
<pubDate>Tue, 04 May 2010 07:44:32 +0000</pubDate>
<description><![CDATA[<p>You may also find the perl proxy module to be useful</p>

<blockquote>
  <p>http://search.cpan.org/~book/HTTP-Proxy-0.24/lib/HTTP/Proxy.pm</p>
</blockquote>
]]></description>
<author>lims</author>
<guid isPermaLink="true" >http://neverfear.org/blog/view/9/Using_ICMP_tunneling_to_steal_Internet/comments#comment_144</guid>
</item>
<item>
<title>Comment on Using ICMP tunneling to steal Internet</title>
<link>http://neverfear.org/blog/view/9/Using_ICMP_tunneling_to_steal_Internet/comments#comment_90</link>
<pubDate>Wed, 06 Jan 2010 21:49:37 +0000</pubDate>
<description><![CDATA[<p>you still need at least one remote computer that have an internet connection right? well i don't have that... so i can't use this ping tunnel... thx btw</p>
]]></description>
<author>manda2aja@yahoo.com</author>
<guid isPermaLink="true" >http://neverfear.org/blog/view/9/Using_ICMP_tunneling_to_steal_Internet/comments#comment_90</guid>
</item>
<item>
<title>Comment on Using ICMP tunneling to steal Internet</title>
<link>http://neverfear.org/blog/view/9/Using_ICMP_tunneling_to_steal_Internet/comments#comment_64</link>
<pubDate>Sat, 12 Sep 2009 00:17:52 +0000</pubDate>
<description><![CDATA[<p>where i can find "proxy.example.com" and "portal.example.com"
i don't understand in point 1 making ptunnel</p>
]]></description>
<author>Sakti</author>
<guid isPermaLink="true" >http://neverfear.org/blog/view/9/Using_ICMP_tunneling_to_steal_Internet/comments#comment_64</guid>
</item>
<item>
<title>Comment on Using ICMP tunneling to steal Internet</title>
<link>http://neverfear.org/blog/view/9/Using_ICMP_tunneling_to_steal_Internet/comments#comment_17</link>
<pubDate>Tue, 29 Jan 2008 07:55:35 +0000</pubDate>
<description><![CDATA[<p>I use the combination ssh as socks server and the <a href="http://tsocks.sourceforge.net/">tsocks-wrapper</a> for all tunnel-tcp-connections.</p>
]]></description>
<author>sven@remote.org</author>
<guid isPermaLink="true" >http://neverfear.org/blog/view/9/Using_ICMP_tunneling_to_steal_Internet/comments#comment_17</guid>
</item>
<item>
<title>Comment on Using ICMP tunneling to steal Internet</title>
<link>http://neverfear.org/blog/view/9/Using_ICMP_tunneling_to_steal_Internet/comments#comment_15</link>
<pubDate>Tue, 29 Jan 2008 01:24:48 +0000</pubDate>
<description><![CDATA[<p>You can use ssh tun features over icmp tunneling, for having unlimited access to the intertubes!</p>

<p>Look up the <code>-w</code> option in <code>ssh(1)</code> and <code>PermitTunnel</code> in <code>sshd_config(5)</code>. You of course have to take one minute to set up routes etc, but the result is that you say goodbye to proxies, socks and all that cheesy setup.</p>

<p>Have fun. Steal much.</p>
]]></description>
<author>fv@linuxvar.it</author>
<guid isPermaLink="true" >http://neverfear.org/blog/view/9/Using_ICMP_tunneling_to_steal_Internet/comments#comment_15</guid>
</item>
<item>
<title>Comment on Using ICMP tunneling to steal Internet</title>
<link>http://neverfear.org/blog/view/9/Using_ICMP_tunneling_to_steal_Internet/comments#comment_16</link>
<pubDate>Mon, 28 Jan 2008 20:40:23 +0000</pubDate>
<description><![CDATA[<p><strong>You can use the SSH connection as a SOCKS proxy:</strong></p>

<ul>
<li><code>$ ssh -D 8080 localhost -p 8765</code></li>
<li>Then set your browser to use port 8080 as a SOCKS5 proxy.</li>
<li>The interweb!</li>
</ul>

<p>Or setup a SOCKS proxy on your 'proxy' host and tunnel directly to it with:</p>

<pre class="text" style="font-family:monospace;">$ sudo ptunnel -x mypassword -p myproxy -lp 8765 -da localhost -dp 8080</pre>

<p>**My setup:***</p>

<p>Router at home (Linksys router with OpenWRT firmware)</p>

<ul>
<li>cronjob to update my <a href="http://freedns.afraid.org">dynamic dns</a> record 'proxy.mydomain'</li>
<li><code># ipkg install ptunnel</code></li>
<li><code># ptunnel -x mypassword -f ptunnel.log &amp;</code></li>
</ul>

<p>On client system (Debian)</p>

<ul>
<li><code>$ sudo aptitude install ptunnel</code></li>
<li><code>$ sudo ptunnel -x mypassword -p proxy.mydomain -lp 8765 -da localhost -dp 22</code></li>
<li><code>$ ssh -D 8080 localhost -p 8765</code></li>
<li>Install FoxyProxy extension in Firefox</li>
<li>Configured SOCKS5 proxy: localhost:8080</li>
</ul>
]]></description>
<author>sean@recountal.org</author>
<guid isPermaLink="true" >http://neverfear.org/blog/view/9/Using_ICMP_tunneling_to_steal_Internet/comments#comment_16</guid>
</item>
</channel>
</rss>