Hi Jack, On 22/12/16 13:35, jack seth wrote: > > Date: Tue, 20 Dec 2016 20:03:59 +0100 > From: Steffan Karger <stef...@karger.me> > > Hi, > > > Exactly. To reliably bypass good DPI, it is not sufficient to hide that > traffic is (Open)VPN traffic, but instead you'll need to make it look > like allowed traffic. Tunneling over stunnel (which is 'plain' TLS, so > looks very similar to HTTPS) does a decent job there. > > But the advice here remains unchanged: if you want to bypass DPI, use a > tool that is designed to do just that, such as obfsproxy. > > -Steffan > > How do you implement obfsproxy? > there's a nice HOWTO at https://community.openvpn.net/openvpn/wiki/TrafficObfuscation
HTH, JJK ------------------------------------------------------------------------------ Developer Access Program for Intel Xeon Phi Processors Access to Intel Xeon Phi processor-based developer platforms. With one year of Intel Parallel Studio XE. Training and support from Colfax. Order your platform today.http://sdm.link/intel _______________________________________________ Openvpn-users mailing list Openvpn-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-users