VPN Blocked by GFW-Help
-
- Posts: 47
- Joined: Sun May 25, 2014 3:37 pm
VPN Blocked by GFW-Help
Hi everyone and thanks for trying to help me recently openvpn connect but there is no data , i search and find VPN Protocols Blocked by GFW , and for solve problem need install scramble , i need help for install scramble and fix this is problem , also L2TP/IPSec also not work , my location in iran , and really need help from yours friend , how can fix this problem , Softhether Client and SSTP work fine , but SSTP have the limited Speed , also installed Valid Certificated from Geocert and my config is fine , until today use perfect by VPN , but today OpenVPN connect success but no data maximum 0.01 KB/s
L2TP and L2TP/IPSec also connect but no data 0 KB/s
Please Help me , i will pay for fix this ,
i placed attachment here OpenVPN Config for user
Help me with this link
https://drive.google.com/file/d/138-Jqt ... sp=sharing
this is Critical important for me , please help me to fix my problems
Thanks
Username: Test
Password: JellyVPN
server address: http://www.Mobi.JellyVPN.com
----------------------------------------------------------------------------------------------------
###############################################################################
# OpenVPN 2.0 Sample Configuration File
# for PacketiX VPN / SoftEther VPN Server
#
# !!! AUTO-GENERATED BY SOFTETHER VPN SERVER MANAGEMENT TOOL !!!
#
# !!! YOU HAVE TO REVIEW IT BEFORE USE AND MODIFY IT AS NECESSARY !!!
#
# This configuration file is auto-generated. You might use this config file
# in order to connect to the PacketiX VPN / SoftEther VPN Server.
# However, before you try it, you should review the descriptions of the file
# to determine the necessity to modify to suitable for your real environment.
# If necessary, you have to modify a little adequately on the file.
# For example, the IP address or the hostname as a destination VPN Server
# should be confirmed.
#
# Note that to use OpenVPN 2.0, you have to put the certification file of
# the destination VPN Server on the OpenVPN Client computer when you use this
# config file. Please refer the below descriptions carefully.
###############################################################################
# Specify the type of the layer of the VPN connection.
#
# To connect to the VPN Server as a "Remote-Access VPN Client PC",
# specify 'dev tun'. (Layer-3 IP Routing Mode)
#
# To connect to the VPN Server as a bridging equipment of "Site-to-Site VPN",
# specify 'dev tap'. (Layer-2 Ethernet Bridgine Mode)
dev tun
###############################################################################
# Specify the underlying protocol beyond the Internet.
# Note that this setting must be correspond with the listening setting on
# the VPN Server.
#
# Specify either 'proto tcp' or 'proto udp'.
proto udp
###############################################################################
# The destination hostname / IP address, and port number of
# the target VPN Server.
#
# You have to specify as 'remote <HOSTNAME> <PORT>'. You can also
# specify the IP address instead of the hostname.
#
# Note that the auto-generated below hostname are a "auto-detected
# IP address" of the VPN Server. You have to confirm the correctness
# beforehand.
#
# When you want to connect to the VPN Server by using TCP protocol,
# the port number of the destination TCP port should be same as one of
# the available TCP listeners on the VPN Server.
#
# When you use UDP protocol, the port number must same as the configuration
# setting of "OpenVPN Server Compatible Function" on the VPN Server.
remote http://www.Mobi.JellyVPN.com 1194
###############################################################################
# The HTTP/HTTPS proxy setting.
#
# Only if you have to use the Internet via a proxy, uncomment the below
# two lines and specify the proxy address and the port number.
# In the case of using proxy-authentication, refer the OpenVPN manual.
;http-proxy-retry
;http-proxy [proxy server] [proxy port]
###############################################################################
# The encryption and authentication algorithm.
#
# Default setting is good. Modify it as you prefer.
# When you specify an unsupported algorithm, the error will occur.
#
# The supported algorithms are as follows:
# cipher: [NULL-CIPHER] NULL AES-128-CBC AES-192-CBC AES-256-CBC BF-CBC
# CAST-CBC CAST5-CBC DES-CBC DES-EDE-CBC DES-EDE3-CBC DESX-CBC
# RC2-40-CBC RC2-64-CBC RC2-CBC
# auth: SHA SHA1 MD5 MD4 RMD160
cipher AES-256-CBC
auth SHA1
###############################################################################
# Other parameters necessary to connect to the VPN Server.
#
# It is not recommended to modify it unless you have a particular need.
resolv-retry infinite
nobind
persist-key
persist-tun
client
verb 3
auth-user-pass
###############################################################################
# The certificate file of the destination VPN Server.
#
# The CA certificate file is embedded in the inline format.
# You can replace this CA contents if necessary.
# Please note that if the server certificate is not a self-signed, you have to
# specify the signer's root certificate (CA) here.
<ca>
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
</ca>
###############################################################################
# The client certificate file (dummy).
#
# In some implementations of OpenVPN Client software
# (for example: OpenVPN Client for iOS),
# a pair of client certificate and private key must be included on the
# configuration file due to the limitation of the client.
# So this sample configuration file has a dummy pair of client certificate
# and private key as follows.
<cert>
-----BEGIN CERTIFICATE-----
MIIDRzCCAi+gAwIBAgIBADANBgkqhkiG9w0BAQsFADBnMRwwGgYDVQQDExMzMzMz
NjA3NzI2NzgyOTg5NzAxMRwwGgYDVQQKExMzMzMzNjA3NzI2NzgyOTg5NzAxMRww
GgYDVQQLExMzMzMzNjA3NzI2NzgyOTg5NzAxMQswCQYDVQQGEwJVUzAeFw0xNDA1
MjcyMDU3MTNaFw0zNjEyMzEyMDU3MTNaMGcxHDAaBgNVBAMTEzMzMzM2MDc3MjY3
ODI5ODk3MDExHDAaBgNVBAoTEzMzMzM2MDc3MjY3ODI5ODk3MDExHDAaBgNVBAsT
EzMzMzM2MDc3MjY3ODI5ODk3MDExCzAJBgNVBAYTAlVTMIIBIjANBgkqhkiG9w0B
AQEFAAOCAQ8AMIIBCgKCAQEAqp6bxCB6mWoGjTk26uJvrykw3PzUs/fn+f3dbnFP
qdJDYYqy6cVyzvrNoND4pmWp7rOWT+TCzxnZ1gwbjOf02Mp0ud0AUheyJKxB/Vjw
tv4ycX0UZgxumVsOrSdEuvOlgMsiRYOJV8m+GCtbKZ3O7Ic4WqtZQTk9M0jiiGd1
DqotC0j7z+OIOnume8tJ7QiNOy6EbK/UhVoBGAkw3+jzmtHG7AkiwSDscr5uXX5E
f/aWp1CdB/kdgLfmI8EzXnJnYQ8fm+a88l2vyHNCxMfoTRCm9W6A0iipIVCEleb6
p2QDvcxsli1P0+qj2X54X25r9lIQ9kawqR09AVc1mE/XnwIDAQABMA0GCSqGSIb3
DQEBCwUAA4IBAQComEPvnIHVvooxDK83atrQudum61uhHec3n6ZPbMOw9IUHIhhX
LvwZbgdeGjnwDMZYGWEzznkHPL5aSqQLKn/eNOs11VwR8+REnmDJtYcEaIZHSooV
U1Dbr8UkyT0+4p32ohyZZH909uCc56KRpu8Ro8rUX4NO75Z5GW/jCo3zGbf3sLYv
g1hW0RsnlaaoppYGOghsA5cuLkOy7aDWbH8EprGnVQhRRN8FHMiXh1Uzq6togL7x
I0PD1liWOKCkJwJ4O+xO8Lui/cgLwqhX7kz24jfzu3J9n4Zc0fe+xtn1fd9lJe0f
j8CMaOjXAJREI9iXrsnQXfdBgF4qj5omm4gk
-----END CERTIFICATE-----
</cert>
<key>
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
</key>
L2TP and L2TP/IPSec also connect but no data 0 KB/s
Please Help me , i will pay for fix this ,
i placed attachment here OpenVPN Config for user
Help me with this link
https://drive.google.com/file/d/138-Jqt ... sp=sharing
this is Critical important for me , please help me to fix my problems
Thanks
Username: Test
Password: JellyVPN
server address: http://www.Mobi.JellyVPN.com
----------------------------------------------------------------------------------------------------
###############################################################################
# OpenVPN 2.0 Sample Configuration File
# for PacketiX VPN / SoftEther VPN Server
#
# !!! AUTO-GENERATED BY SOFTETHER VPN SERVER MANAGEMENT TOOL !!!
#
# !!! YOU HAVE TO REVIEW IT BEFORE USE AND MODIFY IT AS NECESSARY !!!
#
# This configuration file is auto-generated. You might use this config file
# in order to connect to the PacketiX VPN / SoftEther VPN Server.
# However, before you try it, you should review the descriptions of the file
# to determine the necessity to modify to suitable for your real environment.
# If necessary, you have to modify a little adequately on the file.
# For example, the IP address or the hostname as a destination VPN Server
# should be confirmed.
#
# Note that to use OpenVPN 2.0, you have to put the certification file of
# the destination VPN Server on the OpenVPN Client computer when you use this
# config file. Please refer the below descriptions carefully.
###############################################################################
# Specify the type of the layer of the VPN connection.
#
# To connect to the VPN Server as a "Remote-Access VPN Client PC",
# specify 'dev tun'. (Layer-3 IP Routing Mode)
#
# To connect to the VPN Server as a bridging equipment of "Site-to-Site VPN",
# specify 'dev tap'. (Layer-2 Ethernet Bridgine Mode)
dev tun
###############################################################################
# Specify the underlying protocol beyond the Internet.
# Note that this setting must be correspond with the listening setting on
# the VPN Server.
#
# Specify either 'proto tcp' or 'proto udp'.
proto udp
###############################################################################
# The destination hostname / IP address, and port number of
# the target VPN Server.
#
# You have to specify as 'remote <HOSTNAME> <PORT>'. You can also
# specify the IP address instead of the hostname.
#
# Note that the auto-generated below hostname are a "auto-detected
# IP address" of the VPN Server. You have to confirm the correctness
# beforehand.
#
# When you want to connect to the VPN Server by using TCP protocol,
# the port number of the destination TCP port should be same as one of
# the available TCP listeners on the VPN Server.
#
# When you use UDP protocol, the port number must same as the configuration
# setting of "OpenVPN Server Compatible Function" on the VPN Server.
remote http://www.Mobi.JellyVPN.com 1194
###############################################################################
# The HTTP/HTTPS proxy setting.
#
# Only if you have to use the Internet via a proxy, uncomment the below
# two lines and specify the proxy address and the port number.
# In the case of using proxy-authentication, refer the OpenVPN manual.
;http-proxy-retry
;http-proxy [proxy server] [proxy port]
###############################################################################
# The encryption and authentication algorithm.
#
# Default setting is good. Modify it as you prefer.
# When you specify an unsupported algorithm, the error will occur.
#
# The supported algorithms are as follows:
# cipher: [NULL-CIPHER] NULL AES-128-CBC AES-192-CBC AES-256-CBC BF-CBC
# CAST-CBC CAST5-CBC DES-CBC DES-EDE-CBC DES-EDE3-CBC DESX-CBC
# RC2-40-CBC RC2-64-CBC RC2-CBC
# auth: SHA SHA1 MD5 MD4 RMD160
cipher AES-256-CBC
auth SHA1
###############################################################################
# Other parameters necessary to connect to the VPN Server.
#
# It is not recommended to modify it unless you have a particular need.
resolv-retry infinite
nobind
persist-key
persist-tun
client
verb 3
auth-user-pass
###############################################################################
# The certificate file of the destination VPN Server.
#
# The CA certificate file is embedded in the inline format.
# You can replace this CA contents if necessary.
# Please note that if the server certificate is not a self-signed, you have to
# specify the signer's root certificate (CA) here.
<ca>
-----BEGIN CERTIFICATE-----
MIIDVDCCAjygAwIBAgIDAjRWMA0GCSqGSIb3DQEBBQUAMEIxCzAJBgNVBAYTAlVT
MRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMRswGQYDVQQDExJHZW9UcnVzdCBHbG9i
YWwgQ0EwHhcNMDIwNTIxMDQwMDAwWhcNMjIwNTIxMDQwMDAwWjBCMQswCQYDVQQG
EwJVUzEWMBQGA1UEChMNR2VvVHJ1c3QgSW5jLjEbMBkGA1UEAxMSR2VvVHJ1c3Qg
R2xvYmFsIENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA2swYYzD9
9BcjGlZ+W988bDjkcbd4kdS8odhM+KhDtgPpTSEHCIjaWC9mOSm9BXiLnTjoBbdq
fnGk5sRgprDvgOSJKA+eJdbtg/OtppHHmMlCGDUUna2YRpIuT8rxh0PBFpVXLVDv
iS2Aelet8u5fa9IAjbkU+BQVNdnARqN7csiRv8lVK83Qlz6cJmTM386DGXHKTubU
1XupGc1V3sjs0l44U+VcT4wt/lAjNvxm5suOpDkZALeVAjmRCw7+OC7RHQWa9k0+
bw8HHa8sHo9gOeL6NlMTOdReJivbPagUvTLrGAMoUgRx5aszPeE4uwc2hGKceeoW
MPRfwCvocWvk+QIDAQABo1MwUTAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTA
ephojYn7qwVkDBF9qn1luMrMTjAfBgNVHSMEGDAWgBTAephojYn7qwVkDBF9qn1l
uMrMTjANBgkqhkiG9w0BAQUFAAOCAQEANeMpauUvXVSOKVCUn5kaFOSPeCpilKIn
Z57QzxpeR+nBsqTP3UEaBU6bS+5Kb1VSsyShNwrrZHYqLizz/Tt1kL/6cdjHPTfS
tQWVYrmm3ok9Nns4d0iXrKYgjy6myQzCsplFAMfOEVEiIuCl6rYVSAlk6l5PdPcF
PseKUgzbFbS9bZvlxrFUaKnjaZC2mqUPuLk/IH2uSrW4nOQdtqvmlKXBx4Ot2/Un
hw4EbNX/3aBd7YdStysVAq45pmp06drE57xNNB6pXE0zX5IJL4hmXXeXxx12E6nV
5fEWCRE11azbJHFwLJhWC9kXtNHjUStedejV0NxPNO3CBWaAocvmMw==
-----END CERTIFICATE-----
</ca>
###############################################################################
# The client certificate file (dummy).
#
# In some implementations of OpenVPN Client software
# (for example: OpenVPN Client for iOS),
# a pair of client certificate and private key must be included on the
# configuration file due to the limitation of the client.
# So this sample configuration file has a dummy pair of client certificate
# and private key as follows.
<cert>
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
</cert>
<key>
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
</key>
-
- Posts: 47
- Joined: Sun May 25, 2014 3:37 pm
Re: VPN Blocked by GFW-Help
Why no any one help me
-
- Posts: 62
- Joined: Tue Mar 17, 2015 7:54 am
Re: VPN Blocked by GFW-Help
Hello,
Yes, as confirmed, OpenVPN and IPSec/L2TP is blocked for sure and scramblers can also be detected easily.
I would suggest you to use Shadowsocks for your mobile devices because Shadowsocks have native clients for Windows phone, Android and iOS. You can still keep Softether client on your non-mobile devices such as computer and laptop.
Yes, as confirmed, OpenVPN and IPSec/L2TP is blocked for sure and scramblers can also be detected easily.
I would suggest you to use Shadowsocks for your mobile devices because Shadowsocks have native clients for Windows phone, Android and iOS. You can still keep Softether client on your non-mobile devices such as computer and laptop.
-
- Posts: 47
- Joined: Sun May 25, 2014 3:37 pm
Re: VPN Blocked by GFW-Help
if you have Shadow Socks Please Give me a test for testing in iran for reason , Thanks
JellyVPN@gmail.com
JellyVPN@gmail.com
-
- Posts: 62
- Joined: Tue Mar 17, 2015 7:54 am
Re: VPN Blocked by GFW-Help
I've sent you an email. Configuration for phone is similar to what I have sent you.
This is the URL for Android: https://play.google.com/store/apps/deta ... hadowsocks
This is the URL for iPhone: https://itunes.apple.com/tc/app/shadows ... 29974?mt=8
This is the URL for Android: https://play.google.com/store/apps/deta ... hadowsocks
This is the URL for iPhone: https://itunes.apple.com/tc/app/shadows ... 29974?mt=8
-
- Posts: 47
- Joined: Sun May 25, 2014 3:37 pm
Re: VPN Blocked by GFW-Help
Thanks , i give your email , i have another question can i have Shadows Socks server for my client?
and can i create user?
can i use PM9 , SSL Tunnel , Zebedee Proxy on Shadows Socks or only can use shadowsocks on client need shadowsocks server
Thanks
and can i create user?
can i use PM9 , SSL Tunnel , Zebedee Proxy on Shadows Socks or only can use shadowsocks on client need shadowsocks server
Thanks
-
- Posts: 62
- Joined: Tue Mar 17, 2015 7:54 am
Re: VPN Blocked by GFW-Help
Yes, you can create multiple clients (https://github.com/shadowsocks/shadowso ... iple-Users) with different passwords.
No, Shadowsocks client is only for Shadowsocks server, you can't use it for other SOCKS5 servers.
No, Shadowsocks client is only for Shadowsocks server, you can't use it for other SOCKS5 servers.
-
- Posts: 47
- Joined: Sun May 25, 2014 3:37 pm
Re: VPN Blocked by GFW-Help
Thanks , i tested and speed is too low,
no way for better speed
and another question:
what is different between Encryption method?
no way for better speed
and another question:
what is different between Encryption method?
-
- Posts: 62
- Joined: Tue Mar 17, 2015 7:54 am
Re: VPN Blocked by GFW-Help
Hello,
My server is located in Japan, therefore, the speed might be a bit slow since you're connecting from Iran.
If you're using the server you own, spawn more workers and it should be fine.
Better encryption = slower but safe, lousier encryption = faster but not as safe. If a better encryption is used, people who are spying on your network will have issues decrypting it and also, the Iran firewall will have a harder time figuring out what this encrypted data packet is.
My server is located in Japan, therefore, the speed might be a bit slow since you're connecting from Iran.
If you're using the server you own, spawn more workers and it should be fine.
Better encryption = slower but safe, lousier encryption = faster but not as safe. If a better encryption is used, people who are spying on your network will have issues decrypting it and also, the Iran firewall will have a harder time figuring out what this encrypted data packet is.
-
- Posts: 47
- Joined: Sun May 25, 2014 3:37 pm
Re: VPN Blocked by GFW-Help
Many many Thanks for helping me ,
i need to know in softether have many encryption if you can tell me better which please tell me
RC4-MD5= ?
RC4-SHA=?
AES128-SHA=?
AES256-SHA=?
DES-CBS-SHA=?
DES-CBS3-SHA=?
DHE-RSA-AES128-SHA=?
DHE-RSA-AES256-SHA=?
i used Default RC4-MD5 , but i don't know between what is different , also i have https://www.Mobi.JellyVPN.com , with valid SSL Scurity , please check what is better for me in iran and my client , thanks
i need to know in softether have many encryption if you can tell me better which please tell me
RC4-MD5= ?
RC4-SHA=?
AES128-SHA=?
AES256-SHA=?
DES-CBS-SHA=?
DES-CBS3-SHA=?
DHE-RSA-AES128-SHA=?
DHE-RSA-AES256-SHA=?
i used Default RC4-MD5 , but i don't know between what is different , also i have https://www.Mobi.JellyVPN.com , with valid SSL Scurity , please check what is better for me in iran and my client , thanks
-
- Posts: 15
- Joined: Tue Mar 24, 2015 11:45 pm
Re: VPN Blocked by GFW-Help
Anything with RC4 or DES shouldn't be relied upon. The rest are okay, though, in my opinion. DHE-RSA-AES256-SHA being the most secure of the ones you listed.