Create a UDP tunnel to forward a udp port. The tunnel applies some magic to trick the noob Great Firewall deep learning VPN detection.
Inspired by a naive udp-forward. I want to test what would happen, if I change the UDP server port number once a minute. (The GFW take 15 minutes to ban my OpenVPN UDP connection)
- Dependency: https://github.com/recolic/rlib
mkdir build && cd build
cmake .. && make
./udp-forwarder [args ...]
# Assume OpenVPN listens base.tw7.recolic.net:1194/UDP
# We run UDPFwd on server:
./udp-forwarder -i [email protected]@443 -o plain@::1@1194 --filter reverse@aes@MyPassword
# Then we run UDPFwd on our home router, to provide OpenVPN service:
./udp-forwarder -i [email protected]@1194 -o [email protected]@1194 --filter aes@MyPassword
# Good! You can use RouterIP:1194 as your OpenVPN server address now! It will work.
dynport module (-i / -o dynport@fe80:1111::1@10000-11000)
obfs method (quic and wechat video) (--filter obfs@[email protected]) (--filter obfs@wechat-video)