By default, OpenVPN traffic is recognizable as OpenVPN traffic - in some rare cases, this might not be an optimal VPN solution, where you want to hide the fact that you are connecting to a VPN, or need a last-ditch method in connecting through a very strict firewall - for example, the great firewall of China.
Here's how you can obfuscate your OpenVPN traffic on Linux:
- Follow the OpenVPN tutorial via Terminal here, but do not connect: https://support.nordvpn.com/hc/en-us/articles/206927749-Linux-setup
- Instead of the configuration files used in the tutorial above, use these files: https://support.nordvpn.com/hc/en-us/article_attachments/115002024545/linux_obfs_config.zip
- Open your Terminal.
- If you are using an Ubuntu/Debian based distribution, run this command in your shell:
sudo apt-get install python2.7 python-pip python-dev build-essential
If you are using a CentOS/Fedora based distribution, run this command in your shell:
sudo yum install make automake gcc python-pip python-devel libyaml-devel
- Run these commands to install the obfs proxy:
pip install obfsproxy
sudo apt install obfsproxy
- Run obfsproxy by typing:
obfsproxy obfs3 socks 127.0.0.1:1050
- Open up a new Terminal window.
- Connect to any of our servers by navigating to directory they are stotred in and using this command templade (of course, replace "xxx" with the chosen configuration file prefix):