| General > General Technical Chat |
| ISP blocking Chinese websites WTF! |
| << < (16/17) > >> |
| rhb:
--- Quote from: magic on April 15, 2023, 04:00:50 am ---IOW, no one has any idea what's going on and your "obvious evidence" is contrary statements from different representatives of the same company. tcpdump time? traceroute/tracepath? --- End quote --- I ran nslookup, traceroute & ping using addresses from 8.8.4.4 (google). Ping worked, traceroute timed out a 30 hops most of which were obfuscated. Two supervisors said they could access the site, but rhe next one denied it all. The last one refused to try to connect. |
| SiliconWizard:
Anyway, ISPs blocking chinese websites is a joke compared to what the RESTRICT act is planning. :popcorn: |
| magic:
Well, ping working means the IP is reachable. Could there be some TCP problem? From here I can do the following: --- Code: --- $ telnet 23.227.38.74 80 Trying 23.227.38.74... Connected to 23.227.38.74. Escape character is '^]'. GET / HTTP/1.0 HTTP/1.1 400 Bad Request Date: Sun, 16 Apr 2023 20:28:01 GMT Content-Type: text/html Content-Length: 155 Connection: close Server: cloudflare CF-RAY: 7b8f2c1b8b39bf35-WAW <html> <head><title>400 Bad Request</title></head> <body> <center><h1>400 Bad Request</h1></center> <hr><center>cloudflare</center> </body> </html> Connection closed by foreign host. --- End code --- It looks like cloudflare doesn't exactly like my manually type request for some reason, but the connection clearly works. |
| rhb:
My take is they are blocking port 80. |
| magic:
Based on what exactly? These are the TCP ports that work for me. I tried telneting to each of them and the result was the same. Including port 443 - they send a message about unencrypted request on HTTPS port. --- Code: ---$ nmap 23.227.38.74 Starting Nmap 6.40 ( http://nmap.org ) at 2023-04-17 09:33 CEST Nmap scan report for shops.myshopify.com (23.227.38.74) Host is up (0.031s latency). Not shown: 996 filtered ports PORT STATE SERVICE 80/tcp open http 443/tcp open https 8080/tcp open http-proxy 8443/tcp open https-alt Nmap done: 1 IP address (1 host up) scanned in 10.59 seconds --- End code --- Also install tcptraceroute and try it to port 80 (or others above) on this IP. This works for me, I get the full path from my home router through my ISP and some other networks all the way to shopify. Note that ordinary traceroute uses UDP or ICMP ping, which doesn't tell you much about what happens to TCP packets. |
| Navigation |
| Message Index |
| Next page |
| Previous page |