Date: Tue, 20 Dec 2016 20:03:59 +0100
From: Steffan Karger <stef...@karger.me>

Hi,


Exactly.  To reliably bypass good DPI, it is not sufficient to hide that
traffic is (Open)VPN traffic, but instead you'll need to make it look
like allowed traffic.  Tunneling over stunnel (which is 'plain' TLS, so
looks very similar to HTTPS) does a decent job there.

But the advice here remains unchanged:  if you want to bypass DPI, use a
tool that is designed to do just that, such as obfsproxy.

-Steffan

How do you implement obfsproxy?
------------------------------------------------------------------------------
Developer Access Program for Intel Xeon Phi Processors
Access to Intel Xeon Phi processor-based developer platforms.
With one year of Intel Parallel Studio XE.
Training and support from Colfax.
Order your platform today.http://sdm.link/intel
_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to