• dr_robot@kbin.social
      link
      fedilink
      arrow-up
      21
      ·
      1 year ago

      Most open source vpn protocols, afaik, do not obfuscate what they are, because they’re not designed to work in the presence of a hostile operator. They only encrypt the user data. That is, they will carry information in their header that they are such and such vpn protocol, but the data payload will be encrypted.

      You can open up wireshark and see for yourself. Wireshark can very easily recognize and even filter wireguard packets regardless of port number. I’ve used it to debug my firewall setups.

      In the past when I needed a VPN in such a situation, I had to resort to a paid option where the VPN provider had their own protocol which did try to obfuscate the nature of the protocol.

      • InverseParallax@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        arrow-down
        1
        ·
        1 year ago

        Gfw is mostly picky about anything udp or where both ports are unknown. Also if the known port (server) isn’t from a licensed block.

        Basically there are heuristics that lead to either a reset, a temp block, or a perm block, but it seems to vary from time to time a lot.

      • Spiritreader@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        1 year ago

        Wireguard through gfw worked fine when I tried it. The other client did have a static IP and static Port tho, that probably helped