ChatGPT led me to tunsafe however the project seems to be abandoned?

I’m trying to find ways to convert wireguard traffic into plain HTTPS so as to not trigger some advanced DPI. So far, I have come across udp2raw and updtunnel which convert the traffic to TCP, but AFAIK the SSL used in Wireguard triggers DPIs.

Does anyone have a workaround? Thanks!


Everyone, there seems to be a way go achieve this:

Wireguard (change port to 443) + udp2raw or udptunnel to convert packets to TCP + stunnel (configured on both client and server - used by OpenVPN to encapsulate traffic in TLS).

This is basically what OpenVPN does, and theoretically this should do OK. I haven’t tested it however, so if you have, please let us know!

@lungdart@lemmy.ca
link
fedilink
English
-131Y

Wireguard is e2e encrypted, no middleman can inspect the packets without the private keys.

@MigratingtoLemmy@lemmy.world
creator
link
fedilink
English
191Y

I’m aware that it is encrypted, however DPIs can pick out Wireguard traffic (due to the behaviour of SSL used in the protocol) and can identify/deny Wireguard traffic. I don’t want that to happen. OpenVPN has a way to mask its traffic, I’m trying to see if anyone has done anything of the sort with Wireguard

@_stranger_@lemmy.world
link
fedilink
English
51Y

shadowsocks seems to be the best way for now.

@MigratingtoLemmy@lemmy.world
creator
link
fedilink
English
21Y

Thank you. It’s between this and SoftEther now

@lungdart@lemmy.ca
link
fedilink
English
-71Y

You can try putting it on pretty 443 or another tls port. It’s not a perfect solution but it could help for your specific setup.

@MigratingtoLemmy@lemmy.world
creator
link
fedilink
English
61Y

Unfortunately, that is not enough

@TCB13@lemmy.world
link
fedilink
English
-21Y

Yes this is a good way to baypass a lot of commercial firewalls.

@railsdev@programming.dev
link
fedilink
English
5
edit-2
1Y

That wouldn’t help with deep packet inspection but only those firewalls too lazy to check what’s actually being sent there. Even then I doubt it would work because WireGuard uses UDP, not TCP.

@TCB13@lemmy.world
link
fedilink
English
-21Y

I know it doesn’t do shit against DPI, but you would be amazed at the amount of firewalls in corporate networks, hotels and public places that’ll be able to bypass by just running WG on port 443 or 80.

OP wants to circumvent deep packet inspection.

Create a post

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.

Rules:

  1. Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it’s not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

  • 1 user online
  • 127 users / day
  • 422 users / week
  • 1.16K users / month
  • 3.85K users / 6 months
  • 1 subscriber
  • 3.68K Posts
  • 74.2K Comments
  • Modlog