Hello Jon

> Sent: Tuesday, December 20, 2016 at 8:23 PM
> From: "Jonathan K. Bullard" <jkbull...@gmail.com>
> To: "openvpn-users@lists.sourceforge.net" 
> <openvpn-users@lists.sourceforge.net>
> Cc: "Kevin Long" <kevin.l...@haloprivacy.com>
> Subject: Re: [Openvpn-users] Question about tls-crypt and port 443 firewall 
> ducking
>
> 
> One approach that could help would be to use obfsproxy. However that requires 
> a separate program to be running on OpenVPN clients, which can be difficult 
> for VPN service providers.
>
Could you please elaborate why it "can be difficult for VPN service providers"?

> Although the patch is __disapproved__of__by__the__OpenVPN__developers__ 
> (details on the Tunnelblick page), at least one VPN provider that I know of 
> has found it helps their clients.

I assume you were referring to vpn.ac? Some of my friends tried its service in 
China and found it to be patchy at best. The deep inspection technologies 
employed by the Chinese authorities are capable of sniffing out VPN connections.

> I developed a version of the patch which fixes several bugs in the original. 
> A somewhat out-of-date writeup is available at [2]. For the last 18 months my 
> version has been included in copies of OpenVPN that
> are included in Tunnelblick [3] (a GUI for OpenVPN on macOS). There was 
> recently a short discussion about it at GitHub Issue #347 [4].
> 
That's very nice of you to contribute to the development of OpenVPN. But has 
your patch(es) been audited by your peers?

Regards.

Sebastian

------------------------------------------------------------------------------
Developer Access Program for Intel Xeon Phi Processors
Access to Intel Xeon Phi processor-based developer platforms.
With one year of Intel Parallel Studio XE.
Training and support from Colfax.
Order your platform today.http://sdm.link/intel
_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to