ChatGPT led me to tunsafe however the project seems to be abandoned?

I’m trying to find ways to convert wireguard traffic into plain HTTPS so as to not trigger some advanced DPI. So far, I have come across udp2raw and updtunnel which convert the traffic to TCP, but AFAIK the SSL used in Wireguard triggers DPIs.

Does anyone have a workaround? Thanks!


Everyone, there seems to be a way go achieve this:

Wireguard (change port to 443) + udp2raw or udptunnel to convert packets to TCP + stunnel (configured on both client and server - used by OpenVPN to encapsulate traffic in TLS).

This is basically what OpenVPN does, and theoretically this should do OK. I haven’t tested it however, so if you have, please let us know!

  • Sauce@lemmy.world
    link
    fedilink
    English
    arrow-up
    3
    ·
    8 months ago

    They are talking about how whoever or whatever you are trying to get around can still mess with your wg tunnels even if you are masking them as https

      • Sauce@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        8 months ago

        They can break the session every 30 seconds, which would be fine for a normal web session but mess with your wg tunnel

        • MigratingtoLemmy@lemmy.worldOP
          link
          fedilink
          English
          arrow-up
          1
          ·
          8 months ago

          Would breaking a TCP session every 30 seconds be OK for something like video streaming/content browsing?

          I wonder if I can automate the breaking and forming of session on clients. Hopefully Android has something that will let me do this, I’m sure I can figure something out on Linux