this post was submitted on 20 Jul 2023
35 points (94.9% liked)

Selfhosted

39435 readers
2 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 1 year ago
MODERATORS
 

I live in a country where wireguard, openvpn and other vpn protocols have been blocked. Tailscale and Cloudflare Tunnels don't wok either. I do have a public ip and my router supports DMZ and port forwarding. For security concerns I'm not willing to forward ports. Is there any other method to use my VPS to forward traffic to my home server?

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 8 points 1 year ago (2 children)

I'm surprised they block WireGuard, especially with a preshared key. That makes it essentially pure randomness over UDP. I'd assume they block popular VPN providers and tunneling services which makes it easier to block by blocking the setup process which is usually just HTTPS.

Have you tried a basic plain WireGuard between your home and your VPS, with a preshared key and using some other protocol's port? Maybe like UDP on port 443 so it looks like QUIC?

[–] [email protected] 3 points 1 year ago* (last edited 1 year ago) (1 children)

I haven't tried this. Will do. When wireguard still worked i used to use this script to set it up.

[–] [email protected] 6 points 1 year ago

Quick glance at the script shows it does randomize the port (but in the upper end of the space), but does not do preshared keys.

The PSK can hide the protocol better by not looking like a key handshake. Although I'm not sure ISPs have quite reached that level yet.

If you're in China, there's been some recent research showing that they block things that looks encrypted based on the entropy of the bits in a packet. I couldn't find the bypass software anymore but that might help you as well.

If you're not in China something like the XRay/v2ray proxy or shadowsocks might help as well.

Although honestly, port forwarding with a firewall only allowing your VPS IP should honestly be fairly sufficient security-wise. You could also try inverting the WireGuard connection and have the VPS connect to your home through port forwarding, traffic analysis is usually on egress not ingress.

[–] [email protected] 2 points 1 year ago

Wireguard is not meant to bypass detection of any kind of Deep Packet Inspection technology. It's also stated by the project website, under the Known Limitations sections.

https://www.wireguard.com/known-limitations/

There are many characteristics (except the handshake) which can make it stand out as a P2P or VPN(-ish) traffic, and then get blocked.