TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Tell HN: VPN Situation in Iran

78 pointsby amir734jjover 2 years ago
I am an Iranian and have a family member in Iran. As you now the internet is currently shut off from outside or very slow.<p>Over the past years, I would create a OpenVPN server with a port other than default OpenVPN port (1194) and share the connection with my family member in Iran. Using a random port was needed because default OpenVPN is blocked in Iran for sometime (probably since 2010). But recently [after the recent internet shutdown] I notice a change. My family member cannot even connect to a server IP address or (private) domain using any port so VPN doesn&#x27;t work anymore. Instead they are only able to connect to the outside world using locally paid VPNs but applications that have end-to-end encryption doesn&#x27;t work anymore with these VPNs (Telegram, WhatsApp and etc).<p>So my theory is they cut off the connection to outside and people are only able to connect with outside world using certain VPNs that are probably made by the government. Not really sure.

14 comments

LinuxBenderover 2 years ago
OpenVPN, Strongswan, Tinc, Wireguard and even Tor without obfuscation modules and without private entry nodes are all trivial to detect and block. Assuming one can reach a VPS provider outside of the country, the most likely solution would be an HTTPS enabled proxy using SNI and a wildcard cert that makes it look like one is just pushing code to a git repo. HAProxy could peel off the default traffic to an actual Gitea git repo and forward the proxy traffic to a Squid SSL-Bump proxy. Create a VM somewhere, give it a DNS name like &quot;git.yourdomain.tld&quot; and then proxy through that HTTPS connection from a different SNI name like &quot;artifacts.yourdomain.tld&quot;. This isn&#x27;t perfect but may work.<p>Another option if SSH is still permitted to VPS providers, one could tunnel over SOCKS connections through a VPS VM initially as the first hop, then through a friends home in that same region outside of Iran as the second hop to minimize the number of CATPCHA&#x27;s one is subjected to. SSH can make multiple hops transparent to the client. Ensure DNS resolution in the browser is set to use the upstream SOCKS connection. As with the previous proposal, try to make the VM look like a git repo or something else work related.<p>One could find some examples of both of the above ideas on SuperUser, StackExchange and ServerFault.<p>Here [1] is a previous discussion on the topic or Iran internet lock-down.<p>[1] - <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=33025954" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=33025954</a>
评论 #33174070 未加载
Anunayjover 2 years ago
This looks like a classic DPI based blocking. My university had one and it was freaking annoying. Apparantly OpenVPN TLS handshake is subtly different from mainstream ones that DPI firewalls can know the difference.<p>In the end I found the easiest solution was to use SSTP (which is just PPP over TLS). I just used this [1] for the server implementation. And Windows has built in support for it so saves a lot of trouble if you wanna share it with family.<p>1. <a href="https:&#x2F;&#x2F;www.softether.org&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.softether.org&#x2F;</a>
phantomathkgover 2 years ago
If they use the same great firewall to do the blocking, then yes, you will need to adopt the Chinese netizen rulebook and hopping the firewall.<p><a href="https:&#x2F;&#x2F;www.iranintl.com&#x2F;en&#x2F;202202123131" rel="nofollow">https:&#x2F;&#x2F;www.iranintl.com&#x2F;en&#x2F;202202123131</a>
andrewmcwattersover 2 years ago
I hate to make light of a terrible situation, but this really highlights whether or not a private connection over various technologies is truly private.<p>If state actors can see you wearing a mask, it still means you&#x27;re visible.
fasthandleover 2 years ago
It might really be worth going oldskool:<p>Make a website. HTTPS. Put something like PHProxy on it. If you really want to, stick on some messaging, like a BBS. Then you can upload stuff. It&#x27;s not going to be quite as quick as snapping a pic on WhatsApp or Twitter, but it&#x27;s not <i>bad</i>.<p>Then put a plausible front on the website. Like, if you&#x27;re in the grains business, put some public data about grain prices, trade broker services, weather, that sort of thing.
sweetbitterover 2 years ago
You could set up a Tor bridge with an obfs4 pluggable transport. That works even in China, because it resists DPI and probing. Does your VPN protocol resist probing? If not, that may be how they are blocking it. Also if the government goes hard enough on manually requesting Tor bridges, you will have to distribute bridges yourself (which you seem to already be doing with VPN server addresses).
Trouble_007over 2 years ago
does this work? -&gt; OnionShare 2.6 – Released → (October 9, 2022) : <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=33155721" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=33155721</a><p>FYI: Tor Browser (Bundle) 11.5.4 – (All Platforms) release is due, probably within a few hours<p><i>Help people in Iran reconnect to Signal – a request to our community</i> : <a href="https:&#x2F;&#x2F;www.signal.org&#x2F;blog&#x2F;run-a-proxy&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.signal.org&#x2F;blog&#x2F;run-a-proxy&#x2F;</a><p>Also, what DNS are they using, is DoH or DoT able to be used?
评论 #33184987 未加载
1970-01-01over 2 years ago
Starlink works if you can hide or camouflage the dish:<p><a href="https:&#x2F;&#x2F;www.wsj.com&#x2F;articles&#x2F;iranian-protesters-struggle-to-activate-starlink-and-circumvent-internet-restrictions-11664798819" rel="nofollow">https:&#x2F;&#x2F;www.wsj.com&#x2F;articles&#x2F;iranian-protesters-struggle-to-...</a>
评论 #33176059 未加载
jadenover 2 years ago
I don&#x27;t have personal experience with this, but <a href="https:&#x2F;&#x2F;getoutline.org&#x2F;" rel="nofollow">https:&#x2F;&#x2F;getoutline.org&#x2F;</a> is designed to be resistant to blocking and may be worth trying.
farhadhfover 2 years ago
Check this post from a few days ago on HN:<p>Tell HN: The Internet situation inside Iran<p><a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=33025954" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=33025954</a>
w0rstover 2 years ago
Try shadowsocks.
评论 #33170853 未加载
andrewinardeerover 2 years ago
Try ProtonVPN with Stealth protocol
oriettaxxover 2 years ago
just curious: what about telephone calls? are international voice calls allowed?
评论 #33171766 未加载
devKnightover 2 years ago
does TOR work ?