Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

wireguard protocol obfuscation with shadowsocks #17

Open
rajannpatel opened this issue Jul 6, 2020 · 1 comment
Open

wireguard protocol obfuscation with shadowsocks #17

rajannpatel opened this issue Jul 6, 2020 · 1 comment
Labels
enhancement New feature or request

Comments

@rajannpatel
Copy link
Owner

rajannpatel commented Jul 6, 2020

Came across some interesting information courtesy of Yegor Ievlev:

Recently there was discussion about obfuscation to avoid restrictive firewalls. The conclusion apparently was that WG devs should add support for pluggable transports. This is a good idea, but for now you can just use shadowsocks-libev:

On server:

ss-server -s 0.0.0.0 -s ::0 -p 443 -k shadowsocks-password -m aes-128-gcm -U # change to lowercase u if you want to be able to connect to the server over TCP too.

On client:

ss-tunnel -s shadowsocks-server -p 443 -l 51820 -L wireguard-server:51820 -k shadowsocks-password -m aes-128-gcm -U

Connect WireGuard to 127.0.0.1:51820. Done.

It's worth experimenting with Shadowsocks to bypass restrictive firewalls that block Wireguard traffic, and improving this guide/bash script to include these enhancements.

@rajannpatel rajannpatel added the enhancement New feature or request label Jul 6, 2020
@AnonymousWebHacker
Copy link

https://lists.zx2c4.com/pipermail/wireguard/2019-January/003809.html

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants