Tell HN: Russia has started blocking OpenVPN/WireGuard connections
439 points| itvision | 2 years ago
The prospect of an isolated Russian interweb has become oh so real.
As a person currently residing in Russia I can confirm that I've been unable to connect to my favourite VPN provider for the past three days, not even its official application works.
I've not seen any discussions on the English-peaking Internet, not it's been in the news for some reasons despite its importance in preserving freedom of information and opinions.
In the Russian internet it's being hotly debated here: https://habr-com.translate.goog/ru/companies/xeovo/articles/...
More on the topic: https://torrentfreak.com/tag/russia/
[+] [-] someotherperson|2 years ago|reply
Fortunately, however, there is equally years of some of the smartest minds on the planet working to bypass Chinese censorship, so there are some great OpenVPN alternatives.
I really encourage you to look into something like Shadowsocks which Chinese people have found great success in using over the last several years.
In your case, however, it's worth mentioning that if you can't connect at all then it's likely they've blocked the commercial IPs of the VPN nodes.
It's quite sad that projects like Streisand[0] were archived, but I'm sure there are other alternatives that might make it just as easy to roll onto a server.
[0] https://github.com/StreisandEffect/streisand
[+] [-] circularfoyers|2 years ago|reply
[+] [-] erebe__|2 years ago|reply
[+] [-] feedforward|2 years ago|reply
https://www.wired.com/2008/05/leaked-cisco-do/
[+] [-] 8organicbits|2 years ago|reply
[+] [-] yellow_lead|2 years ago|reply
To be honest, I think they are blocking anything that exchanges a lot of data with oversesas IPs, after hitting a certain threshold.
[+] [-] unknown|2 years ago|reply
[deleted]
[+] [-] EasyMark|2 years ago|reply
[+] [-] KomoD|2 years ago|reply
[+] [-] throwbas|2 years ago|reply
It isn't consistent. Different ISPs block different hosts and protocols at different times. I assume we are a kind of test and staging environment for censorship in Russia.
In the interest of anonymity I am not going to respond to your questions.
[+] [-] cracrecry|2 years ago|reply
They have been testing it since then.
In China once their AI systems or whatever decides that you are using a VPN you will be punished by increasingly blocking your Internet for more and more time.
[+] [-] jvanderbot|2 years ago|reply
[+] [-] eptcyka|2 years ago|reply
[+] [-] cf1241290841|2 years ago|reply
If anyone else has any educated guesses about the mechanism, please do share!
[+] [-] unknown|2 years ago|reply
[deleted]
[+] [-] dang|2 years ago|reply
[+] [-] Lendal|2 years ago|reply
[+] [-] MrDisposable|2 years ago|reply
My paid VPN provider stopped working months ago. Then my self-hosted Outline server stopped working. Then my self-hosted OpenVPN stopped working too. Both were hosten on Digital Ocean (Frankfurt).
What currently works for me is self-hosted Outline running on an US server, but I suspect that won't last long.
Looks like I have no choice but to learn how to self-host XRay. A smart friend told me that it still works and is hard to block, but unfortunately he has no personal experience with it -- and no need for it anymore, since he emigrated to another country.
Does anyone here have any experience with XRay / XTLS-Reality?
[+] [-] pilosus|2 years ago|reply
[1]: https://github.com/pilosus/Xray-ansible
[+] [-] mmastrac|2 years ago|reply
[+] [-] keddad|2 years ago|reply
UPD: I asked some friends, some of them have faced probmes. I guess it is not protocol block, but instead combination of protocol and "suspicious" server. Mine has stuff other then VPN running on it, so it might have flown under the radar.
[+] [-] _ncyj|2 years ago|reply
https://github.com/v2fly/v2ray-core
https://github.com/XTLS/Xray-core
Here are my configs: https://github.com/acheong08/notes/tree/main/xray
Why this over WireGuard or OpenVPN or commercial solutions? Because it’s obfuscated and you’re much less likely to get caught. Try hosting a small game server on the same machine as well so the traffic doesn’t look too out of place.
[+] [-] shebnik|2 years ago|reply
For example, I found about some 'world oldest tree' competition through the news that it banned trees from Russia. Curious enough, I found their site and.... it rejected me by IP.
[+] [-] lobocinza|2 years ago|reply
Same from Brazil though probably way less. I blame Cloudflare, overzealous sysadmins and paranoid Wordpress security plugins.
[+] [-] khzw8yyy|2 years ago|reply
We are supposed to go overthrow Putin to get LinkedIn and Spotify back (or something).
[+] [-] monday_|2 years ago|reply
I'd expect the government to cool down expansive internet censorship until the "elections" in March, since hitting the preapproved outcome figures will be harder this way.
[+] [-] asdffdasasdf|2 years ago|reply
[+] [-] erebe__|2 years ago|reply
https://github.com/erebe/wstunnel/
[+] [-] cassepipe|2 years ago|reply
[+] [-] sega_sai|2 years ago|reply
[+] [-] cedws|2 years ago|reply
Unfortunately, it's probably a matter of time until this system is activated for real and the Iron Curtain drops to the floor. Then Putin will find some way to blame the West and rally against us.
[+] [-] pinochet2021|2 years ago|reply
[+] [-] vbezhenar|2 years ago|reply
However some huge ingress/egress traffic to unknown website with few random pages looks very suspiciously. So it's possible to select those websites using statistics analysis.
Now the question to hackers: how do I hide tunnelled traffic so its statistics does not look suspicious?
Ideally one would use some CDN webserver (like cloudflare or amazon), however without encrypted SNI, host is extractable with DPI.
[+] [-] dijit|2 years ago|reply
In my efforts to use Linux (which is not supported by Cisco) I found "OpenConnect" and it's partner: "OCServe"; which are open source compatible client & server software (respectively) for the protocol
On the wire traffic looks like normal HTTPS traffic, and without the SSL "CONNECT" header which DPI loves to drop as it's known used for proxies and vpn solutions.
YMMV, but it's worked for me with aggressive HTTP proxies in other companies too. :)
[+] [-] anticensor|2 years ago|reply
Some firewalls will simply drop those protocols.
[+] [-] wiml|2 years ago|reply
[+] [-] unknown|2 years ago|reply
[deleted]
[+] [-] notarget137|2 years ago|reply
[+] [-] kgeist|2 years ago|reply
[+] [-] cf1241290841|2 years ago|reply
But its very much worth mentioning that Russia has totalitarian laws that criminalize the use of vpns.
[+] [-] azkwxm|2 years ago|reply
https://github.com/Useful-open-source-project/Share-vpn-buil...
[+] [-] jnwatson|2 years ago|reply
It took me all of 10 minutes to set up a OpenVPN server in East Asia on DigitalOcean. The container even comes with a client installer that has the parameters preloaded.
Worked fine.
[+] [-] pvaldes|2 years ago|reply
[+] [-] genman|2 years ago|reply
[+] [-] unknown|2 years ago|reply
[deleted]