Hi Jack,

On 22/12/16 13:35, jack seth wrote:
>
> Date: Tue, 20 Dec 2016 20:03:59 +0100
> From: Steffan Karger <stef...@karger.me>
>
> Hi,
>
>
> Exactly.  To reliably bypass good DPI, it is not sufficient to hide that
> traffic is (Open)VPN traffic, but instead you'll need to make it look
> like allowed traffic.  Tunneling over stunnel (which is 'plain' TLS, so
> looks very similar to HTTPS) does a decent job there.
>
> But the advice here remains unchanged:  if you want to bypass DPI, use a
> tool that is designed to do just that, such as obfsproxy.
>
> -Steffan
>
> How do you implement obfsproxy?
>
there's a nice HOWTO at
   https://community.openvpn.net/openvpn/wiki/TrafficObfuscation

HTH,

JJK


------------------------------------------------------------------------------
Developer Access Program for Intel Xeon Phi Processors
Access to Intel Xeon Phi processor-based developer platforms.
With one year of Intel Parallel Studio XE.
Training and support from Colfax.
Order your platform today.http://sdm.link/intel
_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to