http://www.go2proxy.org/free/forum.php?mod=viewthread&tid=46&page=1&extra=#pid49
This ssh account is just for you to create a socks5
tunnel used by your local application. Any application needs lots of
bandwidth is not allowed, such as vedio, downloading , etc. Any other
abuse will been prohibited. Read the TOS for more.
Due to prevent abusing go2proxy ssh accounts, You should apply the ssh account by following steps.
1.Firstly,
you should have a blog or a website. The content of your blog or
website should not be unlawful, harmful, threatening, abusive, tortious,
defamatory, vulgar, obscene, libelous, invasive of privacy, hateful, or
racial, ethnic or otherwise objectionable life harassment. You should
create a new article in your blog or website, copy thisapplying thread
content to the article, and publish it. Copy your new article’surl.
2.Secondly, reply this thread , and paste your new article’s url in the content.
3.Then,
the administrator of Go2proxy.org will check your new article in your
blog or website. If your blogor website is well-kowned, you will receive
an ssh account and password by an sm
(You should login go2proxy.org firstly), you can use it freely for the
following 3 months. If your blog or website is just opened recently, you
will also receive a ssh account and password, but you just can use it
freely for the following 1 month.
4.When your account is going to exceed the period of validity, if you want to continue use the account, you should send an sm to go2 to extend the validity period.
5.If
your account is abused by you or by someone else, your account will be
terminated immediately without any notice. And your blog or website will
be recorded to the blacklist of Go2proxy.org. Then any of your future
application will be rejected . So please keep your account and password
safely, and don’t abuse your ssh account.
6. The ssh server will run iptables as its firewall. The rules of iptables are followings.
iptables -A OUTPUT -p tcp --dport 22 -j DROPiptables -A OUTPUT -p tcp --dport 23 -j DROP
iptables -A OUTPUT -p tcp --dport 25 -j DROP
iptables -A OUTPUT -p tcp --dport 465 -j DROP
iptables -A OUTPUT -p tcp --dport 587 -j DROP
iptables -A OUTPUT -p udp --dport 6000:7999 -j DROP
iptables -A OUTPUT -p udp --dport 8100:9999 -j DROP
iptables -A OUTPUT -p tcp --dport 6000:7999 -m state --state NEW -j DROP
iptables -A OUTPUT -p tcp --dport 8100:9999 -m state --state NEW -j DROP