Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Anyone know openvpn obfuscate technology?

    OpenVPN
    4
    23
    7.2k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • C
      coffeecup25
      last edited by

      @johnpoz:

      Yes you can set a proxy to use in your config, or you can just set it on the gui in the client when you use it.  When at work on my laptop I set proxy, when travel and say at a hotel I do not.

      Keep in mind that if your running any software firewalls on your machine, they will have to be set to allow your tunnel network your using to access what you want, ie remote desktop the windows firewall out of the box would block access other than same segment.

      For example my tunnel network is 10.0.8/24 so when I remote in I am coming from 10.0.8.100 (I set specific IP in client overrides) so any software firewalls running on your lan would have to allow that network or the specific IP you set for specific remote vpn users, etc.

      Thank you!. I will look at this more closely soon.

      1 Reply Last reply Reply Quote 0
      • C
        coffeecup25
        last edited by

        Finally got around to testing remote network access via tun. It worked great. Remote desktop fired right up. Simply putting the ipv4 subnet for the main network in the little box worked. I also checked the wins netbios box, although it seemed to work without it being checked. (Hint to next user: don't forget to move the firewall entry for this server above the last 'block all' entry.)

        More testing is on my to do list.

        I'm, still a tap user, though. At this time, I haven't been able to map a network drive using tun but can easily do so with tap. There may be a lot of overhead with tap and it's certainly more difficult to set up, but the overhead is not noticeable in use and it's convenient in this circumstance. So far.

        I'm still trying to figure out the proxy setup. I think I'm missing something but it appears to be a common way to bypass network blocks. Any help sites known to anyone?

        1 Reply Last reply Reply Quote 0
        • J
          Jackish
          last edited by

          @coffeecup25:

          Finally got around to testing remote network access via tun. It worked great. Remote desktop fired right up. Simply putting the ipv4 subnet for the main network in the little box worked. I also checked the wins netbios box, although it seemed to work without it being checked. (Hint to next user: don't forget to move the firewall entry for this server above the last 'block all' entry.)

          More testing is on my to do list.

          I'm, still a tap user, though. At this time, I haven't been able to map a network drive using tun but can easily do so with tap. There may be a lot of overhead with tap and it's certainly more difficult to set up, but the overhead is not noticeable in use and it's convenient in this circumstance. So far.

          I'm still trying to figure out the proxy setup. I think I'm missing something but it appears to be a common way to bypass network blocks. Any help sites known to anyone?

          FYI, I can map network drive using TUN.

          1 Reply Last reply Reply Quote 0
          • C
            coffeecup25
            last edited by

            @Jackish:

            FYI, I can map network drive using TUN.

            Thanks. So can I now, too. pfSense makes it easy. I came from a DD-WRT background and was happy just to get it working in that case. I was originally under the impression that tun was for private browsing and tap was for network browsing.

            Now I have 3 servers:

            1 tun for safe remote browsing - easy to sign on to.
            1 tun for network access: difficult to sign on to and uses different certs and sign on requirements. Also allows safe browsing
            1 tap just because I had it and it worked fine. Wouldn't do it again, though, now that I know how to make tun 'bridging' work.

            Still looking for openVPN obfuscate insights. I put the new server on port 4664 tcp (google docs) but don't expect it to hide and better than the other servers.

            1 Reply Last reply Reply Quote 0
            • johnpozJ
              johnpoz LAYER 8 Global Moderator
              last edited by

              "now that I know how to make tun 'bridging' work."

              HUH???  You sure and the hell do not need to bridge to access file shares..

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.7.2, 24.11

              1 Reply Last reply Reply Quote 0
              • C
                coffeecup25
                last edited by

                @johnpoz:

                "now that I know how to make tun 'bridging' work."

                HUH???  You sure and the hell do not need to bridge to access file shares..

                Chill. It's a figure of speech. That's why it put it in quotes. I don't live and breath routers like you do. Mentally replace 'bridge' with 'network access just as if it were bridged'. If that's wrong terminology, try well ….

                Anyway, back to the original question about obfuscation .....

                1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator
                  last edited by

                  Bridge would not be the term..  But to your obfuscation question, already answered.  The only way to hide that its openvpn ssl traffic would be to put the tunnel inside a different tunnel, be that normal SSL tunnel or SSH tunnel, etc.

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                  1 Reply Last reply Reply Quote 0
                  • C
                    coffeecup25
                    last edited by

                    @johnpoz:

                    Bridge would not be the term..  But to your obfuscation question, already answered.  The only way to hide that its openvpn ssl traffic would be to put the tunnel inside a different tunnel, be that normal SSL tunnel or SSH tunnel, etc.

                    Thanks. I expected to still do a lot of look up work after some pointers, but this is still too vague. Just say "I don't know but this is probably what the ones with programming staff who CAN hide it do" next time. MY paid VPN providers must make it look like normal traffic. That's why they can get though and my port switch-a-roos don't work.

                    I guess if it were easy, everyone would be doing it and I wouldn't be asking here.

                    Thanks, anyway. At least I got tun 'bridging' to work.

                    1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator
                      last edited by

                      not freaking 'bridging" dude..

                      What part do you not understand about putting your vpn inside a ssl??  Hot spots for internet traffic sure and the hell are not doing deep packet inspection saying oh shit that is a vpn, block that.  They are just blocking non standard ports like UDP 1194.. Run your openvpn connection over tcp 443 so it looks like normal https traffic.  Only doing a DPI would where your at be able to know its not normal ssl..

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                      F 1 Reply Last reply Reply Quote 0
                      • F
                        FrankZappa @johnpoz
                        last edited by

                        @johnpoz JohnPoz, I understand we can use port TCP 443 for OpenVPN. Is there any way to use it without port forwarding the port i.e. not visible to port scanners? If not, how dangerous is it to leave open port TCP 443 to the internet? Shieds-Up always gives me a warning flag that TCP 443 is open and very dangerous to leave open. Thoughts?

                        johnpozJ 1 Reply Last reply Reply Quote 0
                        • johnpozJ
                          johnpoz LAYER 8 Global Moderator @FrankZappa
                          last edited by

                          @frankzappa said in Anyone know openvpn obfuscate technology?:

                          Shieds-Up always gives me a warning flag that TCP 443 is open and very dangerous to leave open.

                          It gives you a warning about ANY Port ;) Opening services to the public is always a risk.. But to access even to attempt to access your vpn has to pass signature on the packet.. Or its just dropped..

                          example.

                          Oct 7 18:08:43 	openvpn 	68875 	Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
                          

                          Lookup how the tls key auth works.

                          Is there any way to use it without port forwarding the port i.e. not visible to port scanners?

                          No - how would that work.. The only way to do what would be able to limit the source IP on who can talk to the service. Sure if you know what IPs would be talking to you, you could prevent them from talking to your service, and the firewall would just drop the traffic because the source IP is not on the allow list..

                          You can with say pfblocker create an alias that only allows say IPs from the company your phone uses for cell connections. Or could limit to specific country your in.. To lower the exposure.

                          If you know your only going to be accessing the vpn from your work location - then you could limit access to only the public IP from your work site, etc.

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                          F 1 Reply Last reply Reply Quote 0
                          • F
                            FrankZappa @johnpoz
                            last edited by

                            @johnpoz Thanks. The part that makes no sense to me is how OpenVPN can listen all day on UDP1194 and be stealthy, but we have to "open" a port to listen on TCP443, even if OpenVPN lets you share port 443. I guess I don't understand why we don't need to open other ports e.g. 80, 25, or 8080, and yet they work fine and don't show up on a port scan as open., Sorry, I'm rambling. I'll get off my soapbox now.

                            johnpozJ 1 Reply Last reply Reply Quote 0
                            • johnpozJ
                              johnpoz LAYER 8 Global Moderator @FrankZappa
                              last edited by johnpoz

                              @frankzappa said in Anyone know openvpn obfuscate technology?:

                              all day on UDP1194 and be stealthy

                              No its not stealthy at all.. That grc scanner is only looking for tcp.. If the port is open its open and you could connect to it.. If it answers..

                              Are you running services on 80, 25 or 8080?? Then no you don't need to open them.. If you want people to connect to your "service" on 443 - then you have to have it open.. If its open, then people can see it via a scan.. Just like if you were running services on 25 (smtp) or 80 http.. or 8080 normally used as proxy or just http if 80 is blocked inbound, etc.

                              An intelligent man is sometimes forced to be drunk to spend time with his fools
                              If you get confused: Listen to the Music Play
                              Please don't Chat/PM me for help, unless mod related
                              SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                              F 1 Reply Last reply Reply Quote 0
                              • F
                                FrankZappa @johnpoz
                                last edited by

                                @johnpoz Ok, got it. Thanks. I was thinking, for example, that SMTP needs port TCP25 open... but, as you mentioned, not on my machine as it's open on the google servers for my email. Makes sense now. You're right...I'm not running any services on my network ergo, nothing is open. So, if I do open port TCP443 for OpenVPN, is it possible for someone to hack that port if they don't have proper OpenVPN certs or user authentication, and is it possible to attack that port (and get in) using something other than OpenVPN service e.g. some kind of hacking tool? I get that anything is possible, but is it likely?Thanks

                                johnpozJ 1 Reply Last reply Reply Quote 0
                                • johnpozJ
                                  johnpoz LAYER 8 Global Moderator @FrankZappa
                                  last edited by

                                  @frankzappa openvpn is pretty freaking secure.. As I mentioned if setup with current recommended settings. TLS auth and encryption

                                  tls.jpg

                                  They would have to pass that first before openvpn would even start to process any data.. They would then need to be able to pass your authentication, they would need the CERT that you issued, they might also need the password you set and the cert, etc.

                                  Now if you were running openvpn with just simple password, and no use of tls or certs in anyway - then yeah sure someone might be able to guess auth to get in..

                                  But to get into a vpn server that is setup correctly would require pretty high level hack - and I have heard of no such possible issues. Something like that would be HUGE freaking news if there was some known exploit to openvpn..

                                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                                  If you get confused: Listen to the Music Play
                                  Please don't Chat/PM me for help, unless mod related
                                  SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                                  F 1 Reply Last reply Reply Quote 0
                                  • F
                                    FrankZappa @johnpoz
                                    last edited by

                                    @johnpoz Many Thanks.

                                    1 Reply Last reply Reply Quote 0
                                    • First post
                                      Last post
                                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.