> On Monday, February 26th, 2024 at 2:20 PM, Jochen Bern 
> <jochen.b...@binect.de> wrote:

> On 24.02.24 11:35, Peter Davis via Openvpn-users wrote:
> 
> > If you use OpenVPN to access the Internet of another country, then
> > receiving data is usually more than sending it, and this traffic is
> > considered suspicious and blocked. Is there a way to send fake data?
> 
> 
> Since the VPN layer supposedly hides all details of the traffic
> transported, any traffic you send out that doesn't cause much traffic
> back would do that.
> 
> However, outgoing traffic that does not cause any traffic back (like
> when sending into a blackhole or against a DROP rule) would IMHO look
> just as suspicious, and very small reply packets (like RSTs, FINs or
> ICMP when you knock on a REJECT rule) would too. And when you get above
> that, whoever runs the receiving server is likely to consider your
> traffic abusive.
> 
> "discard" servers (TCP+UDP port 9) have pretty much died out these days,
> some sort of file upload service would probably fit the bill best. You
> still shouldn't upload the same file over and over, or in regular
> intervals, though, if you want to fool the national censors.
> 
> Kind regards,
> --
> Jochen Bern
> Systemingenieur
> 
> Binect GmbH
> _______________________________________________
> Openvpn-users mailing list
> Openvpn-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/openvpn-users

Hi,
Thank you so much for your advice.
Is there really no way to hide?


_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to