General > General Technical Chat
ISP blocking Chinese websites WTF!
<< < (16/17) > >>
rhb:

--- Quote from: magic on April 15, 2023, 04:00:50 am ---IOW, no one has any idea what's going on and your "obvious evidence" is contrary statements from different representatives of the same company.

tcpdump time? traceroute/tracepath?

--- End quote ---

I ran nslookup, traceroute & ping using addresses from 8.8.4.4 (google).   Ping worked, traceroute timed out a 30 hops most of which were obfuscated.   Two supervisors said they could access the site, but rhe next one denied it all.  The last one refused to try to connect.
SiliconWizard:
Anyway, ISPs blocking chinese websites is a joke compared to what the RESTRICT act is planning. :popcorn:
magic:
Well, ping working means the IP is reachable.

Could there be some TCP problem? From here I can do the following:

--- Code: --- $ telnet 23.227.38.74 80
Trying 23.227.38.74...
Connected to 23.227.38.74.
Escape character is '^]'.
GET / HTTP/1.0

HTTP/1.1 400 Bad Request
Date: Sun, 16 Apr 2023 20:28:01 GMT
Content-Type: text/html
Content-Length: 155
Connection: close
Server: cloudflare
CF-RAY: 7b8f2c1b8b39bf35-WAW

<html>
<head><title>400 Bad Request</title></head>
<body>
<center><h1>400 Bad Request</h1></center>
<hr><center>cloudflare</center>
</body>
</html>
Connection closed by foreign host.
--- End code ---

It looks like cloudflare doesn't exactly like my manually type request for some reason, but the connection clearly works.
rhb:
My take is they are blocking port 80.
magic:
Based on what exactly?

These are the TCP ports that work for me. I tried telneting to each of them and the result was the same.
Including port 443 - they send a message about unencrypted request on HTTPS port.

--- Code: ---$ nmap 23.227.38.74

Starting Nmap 6.40 ( http://nmap.org ) at 2023-04-17 09:33 CEST
Nmap scan report for shops.myshopify.com (23.227.38.74)
Host is up (0.031s latency).
Not shown: 996 filtered ports
PORT     STATE SERVICE
80/tcp   open  http
443/tcp  open  https
8080/tcp open  http-proxy
8443/tcp open  https-alt

Nmap done: 1 IP address (1 host up) scanned in 10.59 seconds
--- End code ---

Also install tcptraceroute and try it to port 80 (or others above) on this IP. This works for me, I get the full path from my home router through my ISP and some other networks all the way to shopify. Note that ordinary traceroute uses UDP or ICMP ping, which doesn't tell you much about what happens to TCP packets.
Navigation
Message Index
Next page
Previous page
There was an error while thanking
Thanking...

Go to full version
Powered by SMFPacks Advanced Attachments Uploader Mod