Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Protocol masking #210

Open
der-andrew opened this issue Jan 20, 2020 · 1 comment
Open

Protocol masking #210

der-andrew opened this issue Jan 20, 2020 · 1 comment
Milestone

Comments

@der-andrew
Copy link

der-andrew commented Jan 20, 2020

Is it possible to mask or modify or some other way to hide protocol?
Preamble.
I have fullmash connected 30+ peers. Everything is fine, but almost. One pair didn't connect with "No HELLO response received" message. Huge time of investigation reveals that it was due to one of ISP is blocking traffic - Great Firewall or smth.
AIK, openvpn pretends himself as https.
Or vpncloud has:

--magic: This setting can be changed to hide the protocol header and make VpnCloud undetectable. This setting must be the same on all nodes.

@s-vincent
Copy link
Member

It is a good idea.

One starting point could be to use obfsproxy (which can also be used by OpenVPN) to do that instead of recoding HTTPS protocol into FreeLAN.

If someone wants to look at that, it will be awesome !

@s-vincent s-vincent added this to the 3.0 milestone Feb 29, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants