On 19/11/2024 19:49, Gert Doering wrote:
No.
I would like more details.
Not sure why, but in my setup wireshark detects P_DATA_V2 packets only
on tun connection and does not on tap. So it sounds like it's possible
to completely hide openvpn traffic. (Though possible wireshark is fooled
by
How about feeding OpenVPN through Stunnel?
From: "Gert Doering" mailto:g...@greenie.muc.de>>
Date: Tuesday, 19 November 2024 at 17:53:32
To: "sergio" mailto:ser...@outerface.net>>
Cc: "Tincantech via Openvpn-users"
mailto:openvpn-users@lists.sourceforge.net>>
Subject: Re: [Openvpn-users] hide op
Hi,
On Tue, Nov 19, 2024 at 08:03:52PM +, j.witvl...@mindef.nl wrote:
> How about feeding OpenVPN through Stunnel?
Sure. But that is not "an openvpn thing" but "use a generic method
to hide traffic". And you need infrastructure on both ends to do that.
gert
--
"If was one thing all people
On 19/11/2024 20:44, sergio wrote:
On 19/11/2024 19:49, Gert Doering wrote:
No.
I would like more details.
Not sure why, but in my setup wireshark detects P_DATA_V2 packets only
on tun connection and does not on tap. So it sounds like it's possible
to completely hide openvpn traffic. (Thou
Hello,
I thought tls-crypt makes the traffic indistinguishable from random
data, and was surprised to see P_DATA_V2 sent by the client in Wireshark.
Is there a way to completely hide OpenVPN traffic and make it
indistinguishable from random data?
--
sergio.
___
Hi,
On Tue, Nov 19, 2024 at 07:03:47PM +0300, sergio wrote:
> I thought tls-crypt makes the traffic indistinguishable from random data,
> and was surprised to see P_DATA_V2 sent by the client in Wireshark.
>
> Is there a way to completely hide OpenVPN traffic and make it
> indistinguishable from