I agree. It sounds like this Rube Goldberg contraption would basically sacrifice all advantages of WireGuard.
At that point you might as well fall back to OpenVPN and at least get the reliability of a proven mature solution.
Comment on How do you mask Wireguard traffic?
possiblylinux127@lemmy.zip 1 year ago
OpenVPN? You can literally set it to run on port 443 tcp
I agree. It sounds like this Rube Goldberg contraption would basically sacrifice all advantages of WireGuard.
At that point you might as well fall back to OpenVPN and at least get the reliability of a proven mature solution.
MigratingtoLemmy@lemmy.world 1 year ago
True, but I just figured that it is possible to run Wireguard with stunnel, the latter is used by OpenVPN to wrap packets in TLS and masquerade as HTTPS traffic. If I can do that, and convert UDP packets to TCP with the software I mentioned in the post (changing the port is trivial), then I could achieve what I want!
Jason2357@lemmy.ca 1 year ago
I used stunnel years ago to tunnel both openVPN and SSH traffic and it worked flawlessly. Looks just like https web traffic to dpi software. Beware though, that long open connections can also set off flags, so don’t keep connection’s open permanently.
MigratingtoLemmy@lemmy.world 1 year ago
Hey, can I ask which DPI software were you using, and how did you get access to it?
MigratingtoLemmy@lemmy.world 1 year ago
I see. Thanks, good to know. I’ll see if I can automate opening and closing connections. However, I do think that a lot of applications (especially chat/video applications) maintain fairly long connections these days: long livestreams on YT, discord client, lemmy, Instagram etc. Basically, if you’re consuming content online, there’s a good chance that your device might keep the connection going.
With that said, it’s important to blend in: I wonder if I can automate the disconnect-connect process on Android