>On Wednesday, January 24th, 2024 at 3:38 PM, Marc SCHAEFER ><schae...@alphanet.ch> wrote:
> Hello, > > On Wed, Jan 24, 2024 at 11:49:43AM +0000, Peter Davis wrote: > > > I am testing this scenario in a virtual environment before moving it to the > > real world. > > > So, use subnets within private address ranges (10.0.0.0/8, 172.16.0.0/12, > 192.168.0.0/16), or possibly > some other reserved addresses [1]. > > Do not use public addresses unless you own them. > > > How can I make OpenVPN look like an HTTPS connection? > > > Do you mean to obfuscate OpenVPN traffic so that an attacker thinks it is > legit web traffic? > > I don't think OpenVPN does that: but you can run OpenVPN over TCP over tor, > and use all > obfuscation methods that tor supports (obfs4, maybe even snowflake), some of > them look > like HTTPS. > > PS: please quote correctly (removing non pertaining text). > > [1] https://en.wikipedia.org/wiki/Private_network > > > _______________________________________________ > Openvpn-users mailing list > Openvpn-users@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/openvpn-users Hello, Thank you so much. 1- So my problem is the IP address range? 2- Yes. Can you tell me how to obfuscate OpenVPN through Tor? _______________________________________________ Openvpn-users mailing list Openvpn-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-users