this post was submitted on 21 Aug 2024
83 points (96.6% liked)

Selfhosted

39240 readers
391 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 1 year ago
MODERATORS
 

I'm travelling for the moment, and usually I just access my home network with tailscale and it has always worked flawlessly. But the hotel I'm staying at apparently blocks VPN connections, I can't use my regular VPN for work on their network either and I've tried obfuscation,different ports etc. nothing seems to work and it never connects.

How can I circumvent this, if at all? I'm staying for several weeks, so this is a pretty bug issue.

you are viewing a single comment's thread
view the rest of the comments
[–] r00ty@kbin.life 26 points 4 weeks ago (1 children)

I mean, while they can block most things, to give people a usable experience they're going to allow http and https traffic through, and they can't really proxy https because of the TLS layer.

So for universal chance of success, running openvpn tcp over port 443 is the most likely to get past this level of bad. I guess they could block suspicious traffic in the session before TLS is established (in order to block certain domains). OpenVPN does support traversing a proxy, but it might only work if you specify it. If their network sets a proxy via DHCP, maybe you could see that and work around it.

I did have fun working around an ex gf's university network many years ago to get a VPN running over it. They were very, very serious about blocking non-standard services. A similar "through" the proxy method was the last resort they didn't seem to bother trying to stop.

[–] sem@lemmy.blahaj.zone 0 points 3 weeks ago (1 children)

What can you do if the school has a whitelist of domains they accept HTTPS (443) connections for?

[–] r00ty@kbin.life 1 points 3 weeks ago (1 children)

That's got to be extremely rare. Not much you can do in that case. But they will hit many problems with that approach.

[–] sem@lemmy.blahaj.zone 1 points 3 weeks ago* (last edited 3 weeks ago)

I will try to investigate further, but for instance if you go to duckduckgo.com, it says something like "this website is not on our whitelist, let us know if you think you need access." It's very annoying, so I avoid the WiFi when I can.