Is It Blocked In Russia?

Hi. I have problems with access to nextcloud.com This is due to the lock-in in Russia? If so please transfer the resource to another ip?

ihorcss ~ # curl nextcloud.com
<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> 
<html><head>
<title>302 Found</title>
</head><body>
<h1>Found</h1>
<p>The document has moved <a href="https://nextcloud.com/">here</a>.</p>
<hr>
<address>Apache/2.4.18 (Ubuntu) Server at nextcloud.com Port 80</address>
</body></html>

ihorcss ~ # ping nextcloud.com
PING nextcloud.com (165.227.162.232) 56(84) bytes of data.
64 bytes from nextcloud.com (165.227.162.232): icmp_seq=1 ttl=61 time=40.0 ms
64 bytes from nextcloud.com (165.227.162.232): icmp_seq=2 ttl=61 time=40.1 ms 
64 bytes from nextcloud.com (165.227.162.232): icmp_seq=3 ttl=61 time=40.0 ms
64 bytes from nextcloud.com (165.227.162.232): icmp_seq=4 ttl=61 time=40.1 ms
64 bytes from nextcloud.com (165.227.162.232): icmp_seq=5 ttl=61 time=40.0 ms
64 bytes from nextcloud.com (165.227.162.232): icmp_seq=6 ttl=61 time=40.0 ms 
64 bytes from nextcloud.com (165.227.162.232): icmp_seq=7 ttl=61 time=40.1 ms
64 bytes from nextcloud.com (165.227.162.232): icmp_seq=8 ttl=61 time=40.1 ms
64 bytes from nextcloud.com (165.227.162.232): icmp_seq=9 ttl=61 time=40.0 ms
64 bytes from nextcloud.com (165.227.162.232): icmp_seq=10 ttl=61 time=40.1 ms
64 bytes from nextcloud.com (165.227.162.232): icmp_seq=11 ttl=61 time=40.1 ms
64 bytes from nextcloud.com (165.227.162.232): icmp_seq=12 ttl=61 time=40.0 ms
64 bytes from nextcloud.com (165.227.162.232): icmp_seq=13 ttl=61 time=40.0 ms
64 bytes from nextcloud.com (165.227.162.232): icmp_seq=14 ttl=61 time=40.1 ms
64 bytes from nextcloud.com (165.227.162.232): icmp_seq=15 ttl=61 time=40.1 ms
^C
--- nextcloud.com ping statistics ---
15 packets transmitted, 15 received, 0% packet loss, time 14018ms
rtt min/avg/max/mdev = 40.040/40.113/40.188/0.170 ms

You’d better move to a free country ( joke, of course )…

Better use a vpn.

1 Like

Can you open this ssl-connection? Perhaps there is only a problem with the redirection (which shouldn’t happen either).

Looks like redirection problem, code 302 is common way do redirect things, e.g. from http to https.
In Russia it is common to block IP ranges because of new Network regulation (just google it) and a lot of good services are suffering about it (they could be also blocked). User should be redirected to Landing Page saying “this content blocked blablabla” but in case of https it is done very unprofessional: some operators try to do man in the middle attack and push you some “valid” but other certificate to redirect you to landing page. With new browsers it does not work very good. Try to visit https link directly and check if redirect still happens.

do they still try to fight telegram-messenger? i have heard about russian gourvernment blocking wirde IP-ranges to fight telegram, regardless of colateral damage done to other services

Not open https://nextcloud.com.

cf. Сайт https://nextcloud.com не открывается

It is not entirely clear. When I was in Russia earlier this year, sometimes it worked (DSL or whatever it is), sometimes it did not (MTS iirc), and different with WiFi providers. So it seemed that depending on the provider one of the hops inbetween was blocked.

From Roskomnadzor I got the reply to change the IP, which is ridiculous. However, this will happen in the not so far distance anyway as we plan to move the website to another hoster. That’ll probably help. Otherwise, Roskomnadzor running Amok and banning half the IPs is just insane.

Yes, but Telegram works fine if you use Google Services, or otherweise occasionally depending on the ISP.

What can you do :frowning: Crazy people are everywhere and among all peoples. Glad You posted and take actions that will allow to access.

Don’t know what these idiots are doing more to block the Telegram, but it works without problems :slight_smile:

1 Like

Regarding this one I’m not sure if those two are related. It is not specified why it is blocked (Сайт https://nextcloud.com не открывается)
But seems long time I host Telegram-proxy for my friends in Russia. Thanks God we have a huge time shift between lands, because during the day my outgoing channel has being fully used.

UPDATE:
I google 27-31-2018/Ид2971-18 and 2-1779/2018 it is cleared against Telegram.

1 Like

The TOR browser could be an option as well.

Stuff like this makes me mad. Wrote this for anybody in the same boat. Will not only download the newest NextCloud though tor but will also verify it against the official NextCloud gpg keys. This will work on Debian and Ubuntu. Ill port it to any Linux/BSD OS if asked.

PS if there is any fuckery from Russian, Chinese etc ISPs trying to block tor Ill mix in some nice transforms to get around their lame DPI.

Just make this script executable with
chmod +x

#!/bin/sh



# Change to version of NextCloud to download if not latest.
# latest.tar.bz2 is default
nextcloudVersion='latest.tar.bz2'

# NextCloud Public Key. Or you can import it yourself from
# https://nextcloud.com/nextcloud.asc. Both should match.
gpgKey='D75899B9A724937A'


sudo apt update
sudo apt install torsocks wget 

gpg --recv-keys "$gpgKey" || gpg --keyserver pgp.mit.edu "$gpgKey"
torsocks wget "https://download.nextcloud.com/server/releases/$nextcloudVersion"
torsocks wget "https://download.nextcloud.com/server/releases/$nextcloudVersion.asc"

gpg --verify "$nextcloudVersion.asc" "$nextcloudVersion" 2>&1 | grep  \
    'Good signature' || { printf 'BAD GPG SIGNATURE\n'; exit 1; }

Mehh just wrote a version of the above script that gets around gov and ISP blocking Tor. It uses obfs4 transforms to hide your Tor traffic from their deep packet inspection. Should work everywhere. China might still be an issue though. If so Ill write one for them too using meek transforms.

#!/bin/sh



# Change to version of NextCloud to download if not latest.
# latest.tar.bz2 is default
nextcloudVersion='latest.tar.bz2'

# NextCloud Public Key. Or you can import it yourself from
# https://nextcloud.com/nextcloud.asc. Both should match.
gpgKey='D75899B9A724937A'

# If you happen to live in a shithole country that blocks tor you can circumvent
# censorship by transforming the Tor traffic between the client and the bridge.
# This way censors will see innocent looking transformed traffic instead of the actual Tor traffic.
# Sooner or later the below bridges will stop working. You can get more from the torproject.
# https://bridges.torproject.org/options

bridgeAddress1='obfs4 94.242.249.2:58809 6AF3024788A7EA8F84E3FA3F60018B62291803E4 cert=X0sDCJLKMM/EISdGDEfGrsks41UYmScjIIXQ9AZgWFVKNKS6klcNEpdF4tNXFz6kIyk4Ug iat-mode=0'
bridgeAddress2='obfs4 35.203.134.33:10022 15524C683CC872C8C8FB5B779A8D53F54F7ADCD4 cert=bXLTv0Kwt1zgPBoeVF86vC+0tYAHepR7+QMczhhTQw9hpAIhatt/Bpe6rSGY63Zh8aZ+dQ iat-mode=0'
bridgeAddress3='obfs4 188.166.252.228:9443 595770328CA95E39FF5B81013880B46CA1B29546 cert=3PjhGUq3xWDMrBAzbV1eU4zPSB3GRGBpYdXQEs9hkrwC9RSZdnEe1P+cg7VgLgYTj/2MMg iat-mode=0'



##################################

[ "$(id -u)" = 0 ] || { printf 'Must be root to run script\n'; exit 1; }

apt update
apt install torsocks wget obfs4proxy

cat >>/etc/tor/torrc<<EOF

# Using transforms to get around ISP Tor fuckery

UseBridges 1

Bridge "$bridgeAddress1"
Bridge "$bridgeAddress2"
Bridge "$bridgeAddress3"

# Set tor to use obfs4 proxy plugin
ClientTransportPlugin obfs4 exec /usr/bin/obfs4proxy
EOF

service tor restart
printf 'Waiting 30sec for Tor bootstrap'
sleep 30

gpg --recv-keys "$gpgKey" || gpg --keyserver pgp.mit.edu "$gpgKey"
torsocks wget "https://download.nextcloud.com/server/releases/$nextcloudVersion"
torsocks wget "https://download.nextcloud.com/server/releases/$nextcloudVersion.asc"

gpg --verify "$nextcloudVersion.asc" "$nextcloudVersion" 2>&1 | grep  \
    'Good signature' || { printf 'BAD GPG SIGNATURE\n'; exit 1; }
2 Likes

Everything is working fine here in Russia. It’s obviously OP’s local problem.

1 Like

What region of Russia are you from? I want to know the region where there are no problems.