-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 13/02/12 13:59, Jun Matsushita wrote:
> This is my first post in this list. As probably a lot of you heard,
> Iran has stepped up its filtering by apparently blocking SSL/TLS using
> DPI. This is a good read about what's happening 
> http://news.ycombinator.com/item?id=3575029. As these statistics from 
> TOR attest 
> https://metrics.torproject.org/users.html?graph=direct-users&start=2012-01-12&end=2012-02-12&country=ir&events=on&dpi=72#direct-users
>
> 
the impact has been immediate and surely concerns the majority of tools
> out there.
> 
> Does OpenVPN allow the use of some form of Obfuscation (such as the
> one TOR is testing now and seem to work from within Iran 
> https://www.torproject.org/projects/obfsproxy-instructions.html.en)?
> 
> Anyone has thoughts about this or would be interested in discussing
> the matter?
> 

Hi Jun,

OpenVPN uses SSL under the hood.  But it does some tricks to allow SSL
over UDP (SSL is strictly designed for TCP).  This however makes some
changes that many DPI firewalls *might* not identify OpenVPN traffic as
SSL traffic.  But as it's not really an obfuscation which changes over
time, it might still be possible to block it if this kind of traffic is
detected.

However, the obfsproxy project sounds very interesting.  And it should be
possible to use obfsproxy (as it can talk like a SOCKS proxy) with
OpenVPN, by using the --socks-proxy argument.  But I'm not aware of any
openvpn services providing obfsproxy services in conjunction with OpenVPN.


kind regards,

David Sommerseth
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAk85C5gACgkQDC186MBRfro25ACfVYHhArEonjCmWalM9aUx4/av
Xc4AniLaPP0au8uXWCav9r0+2g/bB1F8
=WeLG
-----END PGP SIGNATURE-----

Reply via email to