Comment on a VPN that is easily self-hostable and resistant to blocking?
irmadlad@lemmy.world 2 weeks ago
resistant to blocking?
That’s going to be the sticky wicket right there. It is rather trivial for server admins to know what IPs go with VPNs and not. Wireguard is about the best thing on the planet right now, imho, but it will also get blocked. Occasionally, I will happen on a site that outright blocks me. If I can’t bend the site to my will, I just move on. The information on the blocked site will 9 times out of 10 be found duplicated somewhere else.
One ‘trick’ I’ve found works fairly well is Opera. So, when I go to pay my bills online, my VPN coupled with the way I have Firefox configured, will trigger a block. I can fire up Opera, engage it’s built in VPN, still keep my local VPN connected, and have no problem accessing my bills. It’s not an elegant solution, and some users have preclusions to Opera. However, that generally works for me.
iopq@lemmy.world 2 weeks ago
Wireguard is not resistant to blocking, it is plain as day if you’re using wireguard and china had blocked it for years
irmadlad@lemmy.world 2 weeks ago
I sort of said as much. It really doesn’t matter, imho, what you use. As soon as that service becomes abused globally, everyone blocks it, including Tor. Any server using DPI or TLS will spot it a mile away. Now, if you have a fool proof way, than I am very much ready to be educated.
iopq@lemmy.world 2 weeks ago
It does matter.
When I connect to my VPN, the network sees that the server name is yahoo.com
It actually connects to my server which sends the request to yahoo.com and then replies with the cert. So the network sees that yahoo.com sent the cert back to my client from that IP address
Then there is a bunch of encrypted communication with timings and sizes that look like I’m downloading stuff over http.
I’d like to hear a credible model of blocking this