Hello Jon > Sent: Tuesday, December 20, 2016 at 8:23 PM > From: "Jonathan K. Bullard" <jkbull...@gmail.com> > To: "openvpn-users@lists.sourceforge.net" > <openvpn-users@lists.sourceforge.net> > Cc: "Kevin Long" <kevin.l...@haloprivacy.com> > Subject: Re: [Openvpn-users] Question about tls-crypt and port 443 firewall > ducking > > > One approach that could help would be to use obfsproxy. However that requires > a separate program to be running on OpenVPN clients, which can be difficult > for VPN service providers. > Could you please elaborate why it "can be difficult for VPN service providers"?
> Although the patch is __disapproved__of__by__the__OpenVPN__developers__ > (details on the Tunnelblick page), at least one VPN provider that I know of > has found it helps their clients. I assume you were referring to vpn.ac? Some of my friends tried its service in China and found it to be patchy at best. The deep inspection technologies employed by the Chinese authorities are capable of sniffing out VPN connections. > I developed a version of the patch which fixes several bugs in the original. > A somewhat out-of-date writeup is available at [2]. For the last 18 months my > version has been included in copies of OpenVPN that > are included in Tunnelblick [3] (a GUI for OpenVPN on macOS). There was > recently a short discussion about it at GitHub Issue #347 [4]. > That's very nice of you to contribute to the development of OpenVPN. But has your patch(es) been audited by your peers? Regards. Sebastian ------------------------------------------------------------------------------ Developer Access Program for Intel Xeon Phi Processors Access to Intel Xeon Phi processor-based developer platforms. With one year of Intel Parallel Studio XE. Training and support from Colfax. Order your platform today.http://sdm.link/intel _______________________________________________ Openvpn-users mailing list Openvpn-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-users