Page 1 of 1

VPN Blocked by GFW-Help

Posted: Sun Mar 08, 2015 5:01 pm
by JellyVPN
Hi everyone and thanks for trying to help me recently openvpn connect but there is no data , i search and find VPN Protocols Blocked by GFW , and for solve problem need install scramble , i need help for install scramble and fix this is problem , also L2TP/IPSec also not work , my location in iran , and really need help from yours friend , how can fix this problem , Softhether Client and SSTP work fine , but SSTP have the limited Speed , also installed Valid Certificated from Geocert and my config is fine , until today use perfect by VPN , but today OpenVPN connect success but no data maximum 0.01 KB/s
L2TP and L2TP/IPSec also connect but no data 0 KB/s
Please Help me , i will pay for fix this ,
i placed attachment here OpenVPN Config for user
Help me with this link
https://drive.google.com/file/d/138-Jqt ... sp=sharing

this is Critical important for me , please help me to fix my problems
Thanks
Username: Test
Password: JellyVPN
server address: http://www.Mobi.JellyVPN.com
----------------------------------------------------------------------------------------------------
###############################################################################
# OpenVPN 2.0 Sample Configuration File
# for PacketiX VPN / SoftEther VPN Server
#
# !!! AUTO-GENERATED BY SOFTETHER VPN SERVER MANAGEMENT TOOL !!!
#
# !!! YOU HAVE TO REVIEW IT BEFORE USE AND MODIFY IT AS NECESSARY !!!
#
# This configuration file is auto-generated. You might use this config file
# in order to connect to the PacketiX VPN / SoftEther VPN Server.
# However, before you try it, you should review the descriptions of the file
# to determine the necessity to modify to suitable for your real environment.
# If necessary, you have to modify a little adequately on the file.
# For example, the IP address or the hostname as a destination VPN Server
# should be confirmed.
#
# Note that to use OpenVPN 2.0, you have to put the certification file of
# the destination VPN Server on the OpenVPN Client computer when you use this
# config file. Please refer the below descriptions carefully.


###############################################################################
# Specify the type of the layer of the VPN connection.
#
# To connect to the VPN Server as a "Remote-Access VPN Client PC",
# specify 'dev tun'. (Layer-3 IP Routing Mode)
#
# To connect to the VPN Server as a bridging equipment of "Site-to-Site VPN",
# specify 'dev tap'. (Layer-2 Ethernet Bridgine Mode)

dev tun


###############################################################################
# Specify the underlying protocol beyond the Internet.
# Note that this setting must be correspond with the listening setting on
# the VPN Server.
#
# Specify either 'proto tcp' or 'proto udp'.

proto udp


###############################################################################
# The destination hostname / IP address, and port number of
# the target VPN Server.
#
# You have to specify as 'remote <HOSTNAME> <PORT>'. You can also
# specify the IP address instead of the hostname.
#
# Note that the auto-generated below hostname are a "auto-detected
# IP address" of the VPN Server. You have to confirm the correctness
# beforehand.
#
# When you want to connect to the VPN Server by using TCP protocol,
# the port number of the destination TCP port should be same as one of
# the available TCP listeners on the VPN Server.
#
# When you use UDP protocol, the port number must same as the configuration
# setting of "OpenVPN Server Compatible Function" on the VPN Server.

remote http://www.Mobi.JellyVPN.com 1194


###############################################################################
# The HTTP/HTTPS proxy setting.
#
# Only if you have to use the Internet via a proxy, uncomment the below
# two lines and specify the proxy address and the port number.
# In the case of using proxy-authentication, refer the OpenVPN manual.

;http-proxy-retry
;http-proxy [proxy server] [proxy port]


###############################################################################
# The encryption and authentication algorithm.
#
# Default setting is good. Modify it as you prefer.
# When you specify an unsupported algorithm, the error will occur.
#
# The supported algorithms are as follows:
# cipher: [NULL-CIPHER] NULL AES-128-CBC AES-192-CBC AES-256-CBC BF-CBC
# CAST-CBC CAST5-CBC DES-CBC DES-EDE-CBC DES-EDE3-CBC DESX-CBC
# RC2-40-CBC RC2-64-CBC RC2-CBC
# auth: SHA SHA1 MD5 MD4 RMD160

cipher AES-256-CBC
auth SHA1


###############################################################################
# Other parameters necessary to connect to the VPN Server.
#
# It is not recommended to modify it unless you have a particular need.

resolv-retry infinite
nobind
persist-key
persist-tun
client
verb 3
auth-user-pass

###############################################################################
# The certificate file of the destination VPN Server.
#
# The CA certificate file is embedded in the inline format.
# You can replace this CA contents if necessary.
# Please note that if the server certificate is not a self-signed, you have to
# specify the signer's root certificate (CA) here.

<ca>
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

</ca>


###############################################################################
# The client certificate file (dummy).
#
# In some implementations of OpenVPN Client software
# (for example: OpenVPN Client for iOS),
# a pair of client certificate and private key must be included on the
# configuration file due to the limitation of the client.
# So this sample configuration file has a dummy pair of client certificate
# and private key as follows.

<cert>
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

</cert>

<key>
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----

</key>

Re: VPN Blocked by GFW-Help

Posted: Sat Mar 14, 2015 12:48 pm
by JellyVPN
Why no any one help me

Re: VPN Blocked by GFW-Help

Posted: Tue Mar 17, 2015 8:04 am
by GIANT_CRAB
Hello,

Yes, as confirmed, OpenVPN and IPSec/L2TP is blocked for sure and scramblers can also be detected easily.

I would suggest you to use Shadowsocks for your mobile devices because Shadowsocks have native clients for Windows phone, Android and iOS. You can still keep Softether client on your non-mobile devices such as computer and laptop.

Re: VPN Blocked by GFW-Help

Posted: Sun Mar 22, 2015 7:15 pm
by JellyVPN
if you have Shadow Socks Please Give me a test for testing in iran for reason , Thanks
JellyVPN@gmail.com

Re: VPN Blocked by GFW-Help

Posted: Mon Mar 23, 2015 4:02 am
by GIANT_CRAB
I've sent you an email. Configuration for phone is similar to what I have sent you.

This is the URL for Android: https://play.google.com/store/apps/deta ... hadowsocks

This is the URL for iPhone: https://itunes.apple.com/tc/app/shadows ... 29974?mt=8

Re: VPN Blocked by GFW-Help

Posted: Mon Mar 23, 2015 1:49 pm
by JellyVPN
Thanks , i give your email , i have another question can i have Shadows Socks server for my client?
and can i create user?
can i use PM9 , SSL Tunnel , Zebedee Proxy on Shadows Socks or only can use shadowsocks on client need shadowsocks server
Thanks

Re: VPN Blocked by GFW-Help

Posted: Mon Mar 23, 2015 4:45 pm
by GIANT_CRAB
Yes, you can create multiple clients (https://github.com/shadowsocks/shadowso ... iple-Users) with different passwords.

No, Shadowsocks client is only for Shadowsocks server, you can't use it for other SOCKS5 servers.

Re: VPN Blocked by GFW-Help

Posted: Mon Mar 23, 2015 5:24 pm
by JellyVPN
Thanks , i tested and speed is too low,
no way for better speed
and another question:
what is different between Encryption method?

Re: VPN Blocked by GFW-Help

Posted: Tue Mar 24, 2015 2:13 am
by GIANT_CRAB
Hello,

My server is located in Japan, therefore, the speed might be a bit slow since you're connecting from Iran.

If you're using the server you own, spawn more workers and it should be fine.

Better encryption = slower but safe, lousier encryption = faster but not as safe. If a better encryption is used, people who are spying on your network will have issues decrypting it and also, the Iran firewall will have a harder time figuring out what this encrypted data packet is.

Re: VPN Blocked by GFW-Help

Posted: Tue Mar 24, 2015 9:56 am
by JellyVPN
Many many Thanks for helping me ,
i need to know in softether have many encryption if you can tell me better which please tell me
RC4-MD5= ?
RC4-SHA=?
AES128-SHA=?
AES256-SHA=?
DES-CBS-SHA=?
DES-CBS3-SHA=?
DHE-RSA-AES128-SHA=?
DHE-RSA-AES256-SHA=?

i used Default RC4-MD5 , but i don't know between what is different , also i have https://www.Mobi.JellyVPN.com , with valid SSL Scurity , please check what is better for me in iran and my client , thanks

Re: VPN Blocked by GFW-Help

Posted: Wed Mar 25, 2015 2:29 am
by PacoBell
Anything with RC4 or DES shouldn't be relied upon. The rest are okay, though, in my opinion. DHE-RSA-AES256-SHA being the most secure of the ones you listed.