Hello

> Sent: Tuesday, December 20, 2016 at 4:50 PM
> From: "Jan Just Keijser" <janj...@nikhef.nl>
> To: "Kevin Long" <kevin.l...@haloprivacy.com>, 
> openvpn-users@lists.sourceforge.net
> Subject: Re: [Openvpn-users] Question about tls-crypt and port 443 firewall 
> ducking
>
>
> the new tls-crypt feature adds some extra hiding of OpenVPN traffic from 
> someone snooping the network. It does *NOT*, however, result in OpenVPN 
> traffic looking the same as regular TLS/HTTPS traffic. If you scan an 
> OpenVPN network connection using tcpdump/wireshark then you can see that 
> it's different from a regular HTTPS connection start. Advanced firewalls 
> can detect this difference and can/will block OpenVPN traffic based on 
> it. Currently, there's little that can be done about this.
> 
A VPN provider has come up with a solution. It works like this: First, you 
connect to a VPN server using a free open-source software called stunnel. Next, 
you launch the corresponding ovpn config file.

The provider claims the above method is able to bypass the Great Firewall of 
China.

Regards.

Sebastian

------------------------------------------------------------------------------
Developer Access Program for Intel Xeon Phi Processors
Access to Intel Xeon Phi processor-based developer platforms.
With one year of Intel Parallel Studio XE.
Training and support from Colfax.
Order your platform today.http://sdm.link/intel
_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to