After my initial post about obfs4 on how to hide any TCP traffic and an example for hiding SSH traffic, it's now time to do so for OpenVPN...
Recently I had to install OpenVPN on a system running Windows XP (Don't ask). The installation went smoothly up until TAP driver installation and then suddenly things went haywire...
Recently I was in need of setting up some windows clients to connect to my OpenVPN server. This server running on Linux, uses a specific MTU value (let’s say 1400) to ensure maximum compatibility with different clients over different links.
In the previous post, I talked about OpenVPN TCP and UDP tunnels and why you should not be using TCP. In this post, I’m going to talk about optimizing the said tunnels to get the most out of them.
Spoiler alert: You most likely would want to use UDP tunneling!
An OpenVPN tunnel runs over IP and can encapsulates VPN traffic into either a UDP or a TCP connection. To understand the pros and cons of each, we first need to have an understanding of them both.