I’m travelling for the moment, and usually I just access my home network with tailscale and it has always worked flawlessly. But the hotel I’m staying at apparently blocks VPN connections, I can’t use my regular VPN for work on their network either and I’ve tried obfuscation,different ports etc. nothing seems to work and it never connects.

How can I circumvent this, if at all? I’m staying for several weeks, so this is a pretty bug issue.

49 points

Best bet is probably going to be using something like OpenVPN on port 443 in TCP mode, which basically looks like regular HTTPS. It’s a hotel, I doubt they’re going to be doing deep analysis to detect signs it’s OpenVPN. It’s detectable easily but they wouldn’t spend the money on that advanced of a firewall.

My guess is they went for an allowed list of ports rather than blocked, so it lets DNS (53), HTTP (80), HTTPS (443), probably also POP/IMAP/SMTP (110, 995, 143, 993, 465)

permalink
report
reply
10 points

Yeah this actually works, but only specifically for openvpn on 443 in TCP mode…anything wireguard is blocked regardless of port.

permalink
report
parent
reply
11 points

Yep there’s a reason I reached directly for that configuration. WireGuard uses UDP, that’s one of the first things that gets blocked.

Turns out that’s also the kind of protocol corporate VPNs use, reusing port 443 over TCP. They call those “SSL VPN”. They get to weed out all commercial VPNs used to bypass their firewalls as well as most torrent/game activity while still mostly catering to their business guests.

permalink
report
parent
reply
26 points

I mean, while they can block most things, to give people a usable experience they’re going to allow http and https traffic through, and they can’t really proxy https because of the TLS layer.

So for universal chance of success, running openvpn tcp over port 443 is the most likely to get past this level of bad. I guess they could block suspicious traffic in the session before TLS is established (in order to block certain domains). OpenVPN does support traversing a proxy, but it might only work if you specify it. If their network sets a proxy via DHCP, maybe you could see that and work around it.

I did have fun working around an ex gf’s university network many years ago to get a VPN running over it. They were very, very serious about blocking non-standard services. A similar “through” the proxy method was the last resort they didn’t seem to bother trying to stop.

permalink
report
reply
0 points

What can you do if the school has a whitelist of domains they accept HTTPS (443) connections for?

permalink
report
parent
reply
1 point

That’s got to be extremely rare. Not much you can do in that case. But they will hit many problems with that approach.

permalink
report
parent
reply
1 point
*

I will try to investigate further, but for instance if you go to duckduckgo.com, it says something like “this website is not on our whitelist, let us know if you think you need access.” It’s very annoying, so I avoid the WiFi when I can.

permalink
report
parent
reply
21 points

Try mullvad use different ports, use their circumvention approaches.

Use your cell phone mobile data

Talk to the hotel, tell them you cannot connect to your corporate vpn, ask if they have a workaround

permalink
report
reply
9 points
*

I’ve used mullvad but that can’t punch through either no matter what. Unfortunately I don’t have enough mobile data abroad to fuel my streaming needs for the entire duration of my trip.

I’ll talk to the reception when I get back to the hotel I guess…it’s really frustrating and I hate using hotel WiFi without a VPN.

permalink
report
parent
reply
5 points
*

What country are you in? China?

Go to mullvad settings and choose random ports

Try 53, 80, 443 etc

permalink
report
parent
reply
5 points

Just Czech republic, I’ve already tried this in mullvad, it never connects.

permalink
report
parent
reply
3 points
*

They probably are likely using DPI

permalink
report
parent
reply
0 points

Not OP, but my ISP blocks those :)

permalink
report
parent
reply
18 points

I had the same situation, my hotel used fortinet and they blocked almost everything

Even VPNs that used to work in China were blocked

I used my phone 4g hotspot to initialize the tailscale connection, which was blocked, I chose my server as an exit point, then I switched back to the WiFi. Amazingly, once logged in to tailscale, it kept connected to my server.

Then for added safety I used my kasm install to stream a Firefox browser running on my server

I don’t really understand this, why would a hotel pay thousands and thousands of euro for a “Chinese internet experience” that is going to piss off every single customer

permalink
report
reply
13 points

Contact support and tell them you need VPN access on the WiFi you are paying for.

permalink
report
reply
3 points

Seriously, lots of employees depend on VPNs to access their work computers. VPNs are also a great way to ensure the hotel isn’t snooping your internet traffic.

permalink
report
parent
reply
0 points

unless you are important they’ll tell you to pound sand.

permalink
report
parent
reply
2 points

That’s not a good way to keep customers. I would leave a bad review and maybe even find a different hotel. You could ask for a refund for your remaining stay you could argue they are engaging in false advertising.

permalink
report
parent
reply
1 point

Let’s be real the type of hotel I can afford doesn’t want customers that care about the Wi-Fi

permalink
report
parent
reply

Selfhosted

!selfhosted@lemmy.world

Create post

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.

Rules:

  1. Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it’s not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

Community stats

  • 3.4K

    Monthly active users

  • 1.6K

    Posts

  • 14K

    Comments