… or at least, an attempt to create a list.
Checks once a day if the hosts (URLs) in the hosts directory are accessible and commits the output in three files (testResults/).
results_ok.csv => list of hosts accessible (header 200 OK reply)
results_nok.csv => list of hosts unaccessible (no reply)
results.csv => list of all hosts
Mind that it only check HTTP header responses, and doesn't actually check the content of the returned page (e.g. altered page content)
It's currently running and checking from 3 locations; Belgium, The Netherlands, and China. If you want additional countries to be monitored, I will need access to a shell (see below).
Submit URLs, IPs or domains to [email protected]. I'll probably create some small submit page in the future.
Alternatively, you can create a ticket (https://github.com/Tuinslak/GFW-URL-checker/issues) on Github.
I'm looking for additional Unix/Linux shells all around the world (but preferably countries that apply censorship). All I need is wget, git and cron installed, 10ish mb quota, and a bit of your CPU time and networking. Contact me on the e-mail above. These can be ARM shells (such as Guruplug/Sheevaplug).
I got annoyed not being able to share certain sites with people residing in China.
I then decided to find simple ways to by-pass the GFW using OpenVPN + Squid proxy and a PAC file redirecting only blocked URLs through the proxy. But I didn't have a complete list of blocked URLs and wasn't able to find one on the net, so I tried to populate my own.
Knowledge is power.
Chinese gov blocks sites using several methods,
- IP and/or DNS blocking
- Incorrect DNS replies (solvable by using different DNS server, such as 85.12.6.171)
- URL filtering (Wikipedia for example)
- Packet filtering (plain HTTP only? FTP seems to work) > snif content on certain keywords (e.g. try downloading Alexa 1m list: http://yeri.be/j1 - conn. reset at certain byte)
- Connection RST (reset) > different host replies RST packet, making your PC believe you are unable to connect (most common)
--
Maintained by Yeri Tiete (aka Tuinslak)
Blog: http://yeri.be