pag aralan nyo guys baka may makabutas, ng firewall nila
One possible solution is to tunnel OpenVPN traffic over a HTTPS tunnel. Using this method, many users on networks using DPI have been able to bypass it. The method works in most cases because the OpenVPN traffic which is tunneled over HTTPS is recognized by the DPI device as being “True HTTPS” traffic thereby allowing it to bypass. OpenVPN over SSL tunneling can be extremely useful for users who are behind strong firewalls/proxy/DPI devices/countries which only allow real HTTPS traffic on TCP port 443."
1). OpenVPN over SSL
The so called "OpenVPN over SSL" method is established in combination with
You do not have permission to view the full content of this post.
Log in or register now. software and is setup on all VPN countries by default! This method is only possible over TCP protocol, hence the peformance will be even slower than the "normal" TCP, but the point is to bypass DPI and not to win a performance contest.
How to:
1. Inside members area click on "
I need a :443 IP" (remember that this method only works on TCP, so speed will be slower). In the next page click on "
Yes, I want a OpenVPN over SSL TCP IP.."
2. As next edit your OpenVPN config file ("YourUsername.ovpn") with a text edtor, the remote & proto paramaters must be like below, save the config when finished editing:
proto tcp
remote 127.0.0.1 1194
*2.1* Alternatively and easier, simply re-download your config file from the members area now, it will contain the adjusted correct details.
3. If not already done, go ahead and install "stunnel" now, pick your version:
You do not have permission to view the full content of this post.
Log in or register now.
4. We need to do some changes in the stunnel config file, start stunnel and right click its icon located in the taskbar, click on "
Edit Configuration" and place following at the bottom:
[openvpn-over-ssl]
client = yes
accept = 127.0.0.1:1194
connect = uXXXXX.nvpn.so:443
(the connect hostname you find in the OpenVPN config file ("YourUsername.ovpn") it looks like uXXXXX.nvpn.so)
*4.1* Incase you dont want to edit the file yourself, or have troubles doing so, click on this link to automatically generate it on the fly for you:
You do not have permission to view the full content of this post.
Log in or register now.
After clicking the link (its possible you need to log in first) and inside the members area you will then find a Download link for your "stunnel.conf" file!
5. IMPORTANT: After editing the stunnel config it needs to be reloaded to get activated, right click on the stunnel icon again and click on "
Reload stunnel.conf"
6. To verify your data flow you can activate the "
Show Log window"
7. Thats it, now you can connect with OpenVPN!
Conclusion is that OpenVPN will now connect locally to stunnel first and stunnel redirects the traffic to the VPN server, thus making it an OpenVPN over SSL connection which is sufficient to bypass DPI in almost all known cases.