Hello > Sent: Tuesday, December 20, 2016 at 4:50 PM > From: "Jan Just Keijser" <janj...@nikhef.nl> > To: "Kevin Long" <kevin.l...@haloprivacy.com>, > openvpn-users@lists.sourceforge.net > Subject: Re: [Openvpn-users] Question about tls-crypt and port 443 firewall > ducking > > > the new tls-crypt feature adds some extra hiding of OpenVPN traffic from > someone snooping the network. It does *NOT*, however, result in OpenVPN > traffic looking the same as regular TLS/HTTPS traffic. If you scan an > OpenVPN network connection using tcpdump/wireshark then you can see that > it's different from a regular HTTPS connection start. Advanced firewalls > can detect this difference and can/will block OpenVPN traffic based on > it. Currently, there's little that can be done about this. > A VPN provider has come up with a solution. It works like this: First, you connect to a VPN server using a free open-source software called stunnel. Next, you launch the corresponding ovpn config file.
The provider claims the above method is able to bypass the Great Firewall of China. Regards. Sebastian ------------------------------------------------------------------------------ Developer Access Program for Intel Xeon Phi Processors Access to Intel Xeon Phi processor-based developer platforms. With one year of Intel Parallel Studio XE. Training and support from Colfax. Order your platform today.http://sdm.link/intel _______________________________________________ Openvpn-users mailing list Openvpn-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-users