標題:
VPN Server和Client 根据一条Key (4096 bytes)然后不定时转 port,那么他们不知道怎样block?
[打印本頁]
作者:
角色
時間:
2013-3-14 23:10
標題:
VPN Server和Client 根据一条Key (4096 bytes)然后不定时转 port,那么他们不知道怎样block?
本帖最後由 角色 於 2013-3-15 00:32 編輯
如题,不知道是否有这样的东西?
就是1秒就转一次port,那么怎样block呢?
作者:
角色
時間:
2013-3-16 10:14
没有人有反应?
作者:
Qnewbie
時間:
2013-3-16 20:37
You increase your own complexity: synchronization, sending and resembling incoming packets, resending mechanism, etc.
For blocker, if I found some communication between two IPs are unknown, I simply drop these traffic no matter which port you are using...
I prefer obfsproxy technique.
作者:
角色
時間:
2013-3-16 21:26
If the same mechanism and methodology apply to the IP address as well, what do you think?
作者:
tomleehk
時間:
2013-6-13 20:31
本帖最後由 tomleehk 於 2013-6-13 22:17 編輯
OpenVPN fix.. just found..
https://forums.openvpn.net/topic12605.html
OpenVPN 流量混淆补丁
http://www.chinagfw.org/2013/02/openvpn.html
http://igfw.net/archives/13018
OpenVPN配置靜態共享密鑰,應對防火長城(GFW)封鎖
http://www.bannedbook.org/bnews/ ... 20130115/94908.html
作者:
tomleehk
時間:
2013-6-18 19:52
回復
1#
角色
May not be identical, yet still looks relevant..
http://kyl191.net/2012/12/getting-openvpn-to-run-on-random-ports/
歡迎光臨 電訊茶室 (http://www.telecom-cafe.com/forum/)
Powered by Discuz! 7.2