In 2020 a report on Spanish censorship on womanonweb.org was published. Upon knowing it, Derechos Digitales asked us to share the knowledge, as they were planning to make a similar one about the blockage of Pikara Magazine in America. This workshop took place online in August 2020 for 4 days over a 2 weeks period, by women, for women.
As a part of feminist assembly at remote CCC, we have reflected on the experience from the process.
Since the end of January 2020, the information website on abortion Women on Web is being blocked in Spanish territory. As described in a detailed [technical report]](https://sindominio.net/sincensura/en/post/informe/) published on the 5th of May, several Internet Service Providers (ISPs) are blocking the website. In the absence of confirmation from the ISP companies, we can only speculate that this blockade could arise as an initiative of the Ministry of Health, through the Spanish Agency of Medicines and Health Products (AEMPS for its acronym in Spanish).
With this article we would like to raise awareness around the increasing level of web censorship and information control that Spanish Internet Service Providers (ISPs) have initiated. We will share all the technical details about the persistent blocking of the Women on Web website by all major Spanish ISPs.
Authors: Vasilis Ververis, Fadelkon, Ana, Bita, Samba
Blocked website: womenonweb.org
DPI middlebox vendors: Allot, Fortinet
Blocking methodologies: DNS Manipulation, HTTP Blocking, TLS Interception, TCP resets
Install & Setting up VSFTP - Very Secure File Transfer Protocol First, on the server or on the machine that shares a folder: apt install vsftpd The configuration of vsftp is in /etc/vsftpd.conf Review and change settings
vim /etc/vsftpd.conf This is an example of configuration for a server that allows RWX to all users anonymously
listen=NO listen_ipv6=YES anonymous_enable=YES anon_umask=000 local_enable=NO write_enable=YES local_umask=000 anon_upload_enable=YES anon_mkdir_write_enable=YES anon_other_write_enable=YES dirmessage_enable=YES use_localtime=YES xferlog_enable=YES connect_from_port_20=YES secure_chroot_dir=/var/run/vsftpd/empty pam_service_name=vsftpd rsa_cert_file=/etc/ssl/certs/ssl-cert-snakeoil.
With a Network through via VPN Set up access The password:
passwd Add your key ssh:
vim /etc/dropbear/authorized_keys Confirm that you have access by ssh before changing the following parameters
vim /etc/config/dropbear config dropbear option RootPasswordAuth 'off' option Port '22' Update & Install packages opkg update We will need this packages for setting up the VPN:
opkg install vim screen mtr openssl-util openvpn-openssl ca-certificates libustream-openssl ca-bundle Change hostname of the router vim /etc/config/system Reload
SSH access with HiddenService. To have access to a machine by ssh without the need to give ip static or fight with firewalls. On the machine where we need to access, we will install the tor service, add the directory and port 22 of ssh in the config, and launch the tor service.
apt install tor vim /etc/tor/torrc HiddenServiceDir /var/lib/tor/ssh_service HiddenServicePort 22 127.0.0.1:22 systemctl restart tor The hidden service hostname we will need is found by doing so: