I’m travelling for the moment, and usually I just access my home network with tailscale and it has always worked flawlessly. But the hotel I’m staying at apparently blocks VPN connections, I can’t use my regular VPN for work on their network either and I’ve tried obfuscation,different ports etc. nothing seems to work and it never connects.

How can I circumvent this, if at all? I’m staying for several weeks, so this is a pretty bug issue.

  • Max-P@lemmy.max-p.me
    link
    fedilink
    English
    arrow-up
    0
    ·
    3 months ago

    Best bet is probably going to be using something like OpenVPN on port 443 in TCP mode, which basically looks like regular HTTPS. It’s a hotel, I doubt they’re going to be doing deep analysis to detect signs it’s OpenVPN. It’s detectable easily but they wouldn’t spend the money on that advanced of a firewall.

    My guess is they went for an allowed list of ports rather than blocked, so it lets DNS (53), HTTP (80), HTTPS (443), probably also POP/IMAP/SMTP (110, 995, 143, 993, 465)

    • ExcessShiv@lemmy.dbzer0.comOP
      link
      fedilink
      English
      arrow-up
      0
      ·
      3 months ago

      Yeah this actually works, but only specifically for openvpn on 443 in TCP mode…anything wireguard is blocked regardless of port.

      • Max-P@lemmy.max-p.me
        link
        fedilink
        English
        arrow-up
        1
        ·
        3 months ago

        Yep there’s a reason I reached directly for that configuration. WireGuard uses UDP, that’s one of the first things that gets blocked.

        Turns out that’s also the kind of protocol corporate VPNs use, reusing port 443 over TCP. They call those “SSL VPN”. They get to weed out all commercial VPNs used to bypass their firewalls as well as most torrent/game activity while still mostly catering to their business guests.