Can I self host a VPN that sneakies through the China firewall?
from JimVanDeventer@lemmy.world to selfhosted@lemmy.world on 21 Apr 04:51
https://lemmy.world/post/28502202

Like, from inside China to the outside, but a bilateral solution would be fine with me, too.

#selfhosted

threaded - newest

Zwuzelmaus@feddit.org on 21 Apr 05:03 next collapse

They are prepared for such ideas, and you should assume that they are better than you.

NaibofTabr@infosec.pub on 21 Apr 06:41 collapse

And there are hundreds if not thousands of them, plus a lot of automated tooling.

higgsboson@dubvee.org on 21 Apr 21:54 collapse

And of course, they control the hardware and software. I wouldnt risk it as a foreign national who has occasionally done work in the defense industry, but everyone has a different risk tolerance.

capc8m@lemmy.world on 21 Apr 05:15 next collapse

I don’t know if it will work, but it’s possible to tunnel all your traffic through a VPS using SSH and a piece of software called sshuttle.

xylogx@lemmy.world on 22 Apr 10:48 collapse

You can tunnel over SSL with stunnel. TCP latency can be brutal though.

solrize@lemmy.world on 21 Apr 05:28 next collapse

It’s possible for a while but there is a whack-a-mole game if you’re doing anything they would care about. So you will have to keep moving it around. VPS forums will have some info.

Shimitar@downonthestreet.eu on 21 Apr 05:34 next collapse

It will work for a bit, then they will detect VPN traffic and just block the destination ip for good. Any ip you will use will be shortly unreachable for you, so be prepared to that.

Ulrich@feddit.org on 21 Apr 23:45 collapse

How will they detect “VPN traffic”?

Shimitar@downonthestreet.eu on 22 Apr 00:19 next collapse

Deep level packet inspection, they detect patterns or whatever in encrypted traffic (and the lack of thereof) and ban the destination ip china-wide.

How they do I have no idea, but they do, on my direct first hand experience. Its not based on domain names, directly straight and total ip ban. All ports, all domains on that ip get banned forever just because you started using a VPN (OpenVPN in my case, it was a few years ago).

possiblylinux127@lemmy.zip on 22 Apr 19:57 next collapse

Just ask Cisco (they are the contractor for China)

fishynoob@infosec.pub on 22 Apr 22:37 collapse

You need something like stunnel/OpenVPN flag which masks your traffic as HTTPS I think. Even then DPI can probably detect it

rumba@lemmy.zip on 23 Apr 01:43 collapse

They’re looking for traffic patterns. It doesn’t matter what encryption you’re using, If it’s point to point, they’re going to find it and disable it.

Mniot@programming.dev on 22 Apr 11:26 collapse

To someone watching network traffic, a VPN connection looks like two machines exchanging encrypted packets. You can’t see the actual data inside the packet, but you can see all the metadata (who it’s addressed to, how big it is, whether its TCP or UDP, when it’s sent). From the metadata, you can make guesses about the content and VPN would be pretty easy to guess.

When sending a packet over the Internet, there’s two parts of the address: the IP address and the port. The IP address is a specific Internet location, blocks of IP addresses are owned by groups (who owns what is public info) and there are many services that do geo-ip mappings. So if you’re connecting to an IP address that belongs to a known VPN provider, that’s easy.

The second part of the address is the port-number. Servers choose port-numbers to listen to and the common convention is to use well-known ports. So, for example, HTTPS traffic is on port 443. If you see a computer making a lot of requests to port 443, even though the traffic is encrypted we can guess that they’re browsing the web. Wikipedia has a list (which is incomplete because new software can be written at any time and make up a new port that it prefers) and you can see lots of VPN software on there. If you’re connecting to a port that’s known to be used by VPN software, we can guess that you’re using VPN software.

Once you’re running VPN software on an unknown machine and have configured it to use a non-standard port, it’s a bit harder to tell what’s happening, but it’s still possible to make a pretty confident guess. Some VPN setups use “split-tunnel” where some traffic goes over VPN and some over the public Internet. (This is most common in corporate use where private company traffic goes in the tunnel, but browsing Lemmy would go over public.) Sometimes, DNS doesn’t go through the VPN which is a big give-away: you looked up “foo.com” and sent traffic to 172.67.137.159. Then you looked up “bar.org” and sent traffic to the same 172.67.137.159. Odds are that thing is a VPN (or other proxy).

Finally, you can just look at more complex patterns in the traffic. If you’re interested, you could install Wireshark or just run tcpdump and watch your own network traffic. Basic web-browsing is very visible: you send a small request (“HTTP GET /index.html”) and you get a much bigger response back. Then you send a flurry of smaller requests for all the page elements and get a bunch of bigger responses. Then there’s a huuuuge pause. Different protocols will have different shapes (a MOBA game would probably show more even traffic back-and-forth).

You wouldn’t be able to be absolutely confident with this, but over enough time and people you can get very close. Or you can just be a bit aggressive and incorrectly mark things as VPNs.

PetteriPano@lemmy.world on 21 Apr 05:53 next collapse

Only if you want a visit from the thought police.

Zwuzelmaus@feddit.org on 21 Apr 06:13 collapse

They do not visit you. You do not visit them. You visit bad places.

jagged_circle@feddit.nl on 21 Apr 15:06 collapse

You do visit them. Its a tea chat

Unchanged3656@infosec.pub on 21 Apr 06:16 next collapse

You want to look into v2ray for self hosting. For example with https://github.com/hiddify/Hiddify-Manager

JiminaMann@lemmy.world on 21 Apr 06:40 next collapse

I have a private vpn in korea, i could connect to that vpn even through china’s hotel wifi

Could browse as per normal with abysmal internet speed

Zwuzelmaus@feddit.org on 21 Apr 07:17 collapse

Could browse as per normal with abysmal internet speed

Of course. It’s because they had to catch and write down every single byte with a pencil on paper, then decrypt it, understand it, report the funny ones to a boss, who nodded slowly and silently and then they typed it in again on the other side.

/s

SnootBoop@lemm.ee on 22 Apr 10:34 collapse

It’s getting a little better now because they can just scan in what they wrote and OCR it

NaibofTabr@infosec.pub on 21 Apr 06:42 next collapse

Depends - how many family members do you have that the PRC might use against you? or who would miss you if the PRC black bagged you?

nesc@lemmy.cafe on 21 Apr 07:52 next collapse

VPN’s aren’t illegal in china, and they don’t go about random people who use them. Unless you are very vocal and high profile person no one will black bag you in a country of billion people, lol.

NaibofTabr@infosec.pub on 21 Apr 09:24 collapse

VPNs as a technology might not be illegal but circumventing the firewall certainly is.

Unless you are very vocal and high profile person no one will black bag you in a country of billion people, lol.

This is a bit of a misunderstanding about how things work in an authoritarian system. Sure, you might fly under the radar for awhile, but if you call attention to yourself (say, by getting caught trying to bypass the government firewall) and you are not high-profile, then it is very low-effort to make you disappear. Few will notice, and those that do will stay silent out of fear.

If you are more high-profile you still get black-bagged, you just get released after, with your behavior suitably modified.

<img alt="" src="https://infosec.pub/api/v3/image_proxy?url=https%3A%2F%2Fsubstackcdn.com%2Fimage%2Ffetch%2Fw_1272%2Cc_limit%2Cf_webp%2Cq_auto%3Agood%2Cfl_progressive%3Asteep%2Fhttps%253A%252F%252Fsubstack-post-media.s3.amazonaws.com%252Fpublic%252Fimages%252Fa793d54d-66ea-44be-bc93-dd9de58ace03_1100x445.webp">

Naomi Wu no longer uploads to YouTube.

nesc@lemmy.cafe on 21 Apr 10:03 next collapse

Ffs you do not get disappeared for using vpns especially personal ones. You can install vpns that circumvent firewalls as long as they are blessed by ccp and they are sold using wechat. For non compliant ones it’s the same. It’s you who misunderstands how authoritarian systems work, noone tries to nail you for doing something semi-illegal, you will be dissapeared for non-conforming not for exploiting system.

Tap for spoiler

I work in the vpn industry and we had multiple consultations and tests done in china.

jagged_circle@feddit.nl on 21 Apr 15:05 collapse

The keyboard apps are backdoored.

Yingwu@lemmy.dbzer0.com on 21 Apr 10:39 collapse

It’s crazy that this is an opinion that people really have. I don’t like authoritarian states and I have a lot of issues with the CCP, but this isn’t true at all. Loads of native Chinese living in China uses a VPN. They don’t care about it.

InvertedParallax@lemm.ee on 21 Apr 07:34 next collapse

Not really, you need a license and you can host openvpn at tcp 443, but chances are they’ll try to track you down and make your life unpleasant.

When I was there I vps bumped through Hk, that’s probably harder now.

nesc@lemmy.cafe on 21 Apr 07:50 next collapse

Yeah, you can look up how to setup hysteria2 and xray. Additionally you need to understand that firewall is different in different places, in some places like big cities you can even use plain openvpn (during daytime), in other more rural places almost everything is blocked.

Yingwu@lemmy.dbzer0.com on 21 Apr 10:44 collapse

Yeah, I’ve heard Shanghai for example has zones where the GFW is much more lax?

coherent_domain@infosec.pub on 21 Apr 07:56 next collapse

China blocks most IPs from foreign cloud providers like AWS or Digital Ocean. And if I am not mistaken, they can also block some VPN protocols (tor is not a VPN protocol, but it is very blocked, I don’t know if tor bridge works), but I am not sure which exactly.

IndustryStandard@lemmy.world on 21 Apr 09:52 collapse

Do mainstream VPN providers not have a Chinese solution?

Yingwu@lemmy.dbzer0.com on 21 Apr 10:37 next collapse

They have. I don’t know what people are talking about in this post. It’s bypassable easily, and the CCP won’t kill you for it. There are so many Chinese using aVPN themselves to bypass GFW

coherent_domain@infosec.pub on 21 Apr 11:15 collapse

What brand of VPN do you use to bypass it, many of my friends are there quite frequently, none of them have a mainstream solution for it.

Yingwu@lemmy.dbzer0.com on 21 Apr 11:24 collapse

Unfortunately it’s still trial and error. Check out e.g Ovpn, Astrill, Mullvad though. You can always email and ask different providers as well. Though it’s best it you set it up before visiting China. A HK sim through Airalo or similar also works.

coherent_domain@infosec.pub on 21 Apr 11:13 collapse

Last time I was there, express does not work, and I heard proton also does not work. However, my mobile carrier by default routes all roaming traffic through UK, so that did work.

neidu3@sh.itjust.works on 21 Apr 09:41 next collapse

Yes. China’s great firewall mostly handles content filtering and deals with low hanging fruit. Getting around it is fairly simple, and the censorship is mostly focused on stuff that would otherwise be easily accessible by the broader population.

VPN is your obvious choice here. CCP blocks most public VPN providers, so you’d have to roll your own.

You can set up a VPN concentrator somewhere in the world, and you would be able to reach it. As far as I’ve noticed, they don’t block VPN as a whole, and default port should work fine - the reason for this is probably that VPN has many commercial uses that they don’t want to harm.

Source: I run a (work-related) VPN accessible from inside china.

Yingwu@lemmy.dbzer0.com on 21 Apr 10:40 next collapse

You don’t have to set up your own VPN. Many public providers work.

LandedGentry@lemmy.zip on 21 Apr 12:24 collapse
spoiler

asdklfjsadlk;fjds;

[deleted] on 21 Apr 10:06 next collapse
.
Yingwu@lemmy.dbzer0.com on 21 Apr 10:41 next collapse

It’s better to pay for a VPN provider that is verified to work in China. And no, they won’t kidnap you for using a VPN as some people write here. It’s a non-issue just to bypass the GFW. The issue is when you write to a Chinese audience things that the CCP do not like.

jagged_circle@feddit.nl on 21 Apr 15:02 next collapse

Yeah. But it kinda defeats the purpose.

The whole point of a VPN is to mix your traffic with tons of other people’s traffic

Darkassassin07@lemmy.ca on 21 Apr 15:30 collapse

Where in the world did you get that idea?

VPNs serve three functions:

  • add a layer of encryption so your local network operator and ISP can’t inspect your traffic, its contents and its true destination. (this is what OP is looking for)

  • make it appear to the service you are connecting to, that you are connecting from a different location than where you actually are. (for example make Netflix think you’re in a different region to show you different content)

  • provide secure access to private services that are not exposed directly to the Internet. IE securely connecting devices on seprate LAN networks together over the Internet via an encrypted tunnel. This is a VPNs true purpose and how they are primarily used in Professional/Comercial settings. (pretty much every corporation you’ve ever interacted with runs a VPN that connects its stores/warehouses/offices together)

sem@lemmy.blahaj.zone on 22 Apr 00:43 next collapse

These are the true points, however the 4th reason to use a VPN is if you are using a fingerprint-resistant browser and lots of other people are too, it’s harder to track who is going where, since the exit IP is shared.

If tor isn’t working for whatever reason

jagged_circle@feddit.nl on 22 Apr 01:21 collapse

If all your connections come from the same IP, and you’re the only one using that IP, then everyone knows all of your traffic is associated with you.

If the advisory is the State, then the ISP will still he able to see all your traffic.

Captain_Stupid@lemmy.world on 21 Apr 15:34 next collapse

Social Credit --;

JubilantJaguar@lemmy.world on 21 Apr 20:13 next collapse

ITT: lots of generic VPN advice by people who have no experience with the specific problem.

crmsnbleyd@sopuli.xyz on 22 Apr 11:42 next collapse

I wonder why nobody has mentioned using tor

krasny@lemmy.ml on 22 Apr 17:39 collapse

I couldn’t use Tor inside China, I tried but did not establish a connection. Didn’t dig into it also.

possiblylinux127@lemmy.zip on 22 Apr 19:54 collapse

Look into Snowflakes. The snowflake proxies are hosted by people in low censorship countries with the browser extension installed. The IP addresses are all over the place so they are hard to block.

bonapetit@lemmy.world on 22 Apr 16:55 next collapse

Try gdr.name/tuntox

Sloooow but works

krasny@lemmy.ml on 22 Apr 17:37 next collapse

I travelled to China in October 2023. I have a Wireshark VPN running at home with my internet provider (dinamic IP), and it worked for few hours (about 6) and they ban the IP. Resetting the router and getting a new made it work for another few hours.

As others suggested the vpn traffic is encrypted but very easy to detect. I read about some protocols that can bypass it like shadow shocks but I didn’t have time to tinkering (it was my first time in China).

I ended by using the service provided by 12vpx and it worked flawlessly. Someone recommended it and it is specialized in provided access in china with lots of gateways. I never had problems with this provider.

Probably there are others that also work but that is my experience.

possiblylinux127@lemmy.zip on 22 Apr 21:05 collapse

Be careful of some of those services as they may be using botnets.

Tor snowflakes allow for volunteers to proxy traffic to Tor. They are hard to block since there is effectively unlimited IPs.

possiblylinux127@lemmy.zip on 22 Apr 19:50 collapse

I would avoid China if you can

If you need to go to China make sure to use Tor with snowflake proxies enabled. Tor is the only real answer here since this is what it was designed for.