Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:Well (Score 1) 222

On their knowledge base and using their own dedicated vpn software they say in order of preference to try OpenVPN on TCP 443, UDP, and lastly L2TP.

L2TP has nothing to do with OpenVPN. its IPSec.

OpenVPN worked reliably with the exception that they detect the network and reset it occasionally (like every 2 hours, but auto-reconnection in the client takes care of that).

So, not reliably. Thats the point. And the problem is some programs like skype auto-reconnect when theyre disconnected, which will be unprotected if your VPN resets. They can clearly see that you're using a VPN (hence the resets) and they can clearly kill the connection if they want. The thing is that enforcement varies from area to area, and time to time. See what happens around the Tianenmen Square anniversary-- Im willing to bet you'll be unable to connect.

You found links claiming otherwise? Great. Thanks for sharing, the information may come in handy. But right now I can only offer you what I have been experiencing the past month.

The OpenVPN devs know its targetted, the Tor project guys know this, and so do a lot of VPN providers.

Its entirely possible your provider is using a form of obfuscated tunnel like Obfs3 or ScrambleSuite or another proprietary mod, like VyprVPN or ExpressVPN offer. Its technically not OpenVPN, but a modified form. Its also up in the air whether those modifications weaken the VPN as the providers often do not disclose the details of what they did to the client.

Comment Re:Encryption? (Score 1) 197

Good luck "going and getting" something from a server location in Russia or China

1) Google is blocked in china.
2) Thats partly because of the massive police state and strong net censorship they have going on over there-- but I'm sure YOUR data would be safe over there
3) Google is probably the only company formerly doing business in China that wont give your data up to the CPC. As a consequence of that, see #1.

Comment Re:Encryption? (Score 1) 197

I think I'd be encrypting everything especially if it involved using a Google server.

Why especially? AFAIK Google is the only one of the big 3 webmail providers not currently bending over backwards for the Chinese Government. There was a warrant in this case; even the famed lavabit had to fold when given a warrant.

Its absurd to go after Google for following the terms of a court order; you'd do better to ask whether the order was justified, and if not ask why the courts issued it and who can be held accountable.

Comment Re:Well (Score 1) 222

The GFW is many years beyond port-based blocking; they use DPI to identify protocols regardless of the port used. Im glad you have TCP 443 OpenVPN working; I have never been able to get that to work with client/server certs-- only static-key tunnels worked.

At the moment, my experience has been that IPSec/ is the next best contender because its more of a corporatish vpn protocol. Im really surprised that you hear people recommend OpenVPN-- I have NEVER heard anyone recommend that in China because of how heavily it is targetted. Even googling "OpenVPN China GFW" you get stuff like this:
Which VPN Protocols To Use?
  * OpenVPN: Strangely, this is the least reliable protocol/client to use — you’ll find most ports are currently blocked (connection reset). The main cause appears to be spoofed RST packets.
  * L2TP: This is a fast protocol for China and currently it works quite well

And theres no shortage. OpenVPN may work for a bit, but my understanding is that about 20 minutes into the connection the remote server gets probed a bit, and then the connection gets reset. I wouldnt use PPTP because of its known security issues; it wouldnt surprise me if they had that nut cracked.

Communications

A Call That Made History, 100 Years Ago Today 51

alphadogg writes These days, making a call across the U.S. is so easy that people often don't even know they're talking coast to coast. But 100 years ago Sunday, it took a hackathon, a new technology and an international exposition to make it happen. The first commercial transcontinental phone line opened on Jan. 25, 1915, with a call from New York to the site of San Francisco's Panama-Pacific International Exposition. Alexander Graham Bell made the call to his assistant, Thomas Watson. Just 39 years earlier, Bell had talked to Watson on the first ever phone call, in Boston, just after Bell had patented the telephone.

Comment Re:Well (Score 1) 222

OpenVPN is trivially identifiable on port 443, and has been for some time. Im not sure why theyre not blocking you-- perhaps you're using a site-to-site tunnel with static keys. Certificate-based OpenVPN is notoriously unreliable in China because they fingerprint it within about 20 minutes and kill the connection.

Part of the reason I know it can be fingerprinted-- aside from the fact that Im well aware of what works and doesnt behind the GFW-- is that Im good buddies with my employer's security team, and they have on occasion let me know when they see my port 443 OpenVPN shenanigans. I believe it has something to do with the way the certs are exchanged; regardless, SSL and HTTPS are two different things and they have different signatures.

Comment Re:Well (Score 1) 222

AFAIK its technically illegal to have an encrypted laptop in China. Any guesses as to whether my employer, or federal employees, or other major companies just go "oh gee, better turn off disk encryption"?

Businesses arent going to just sacrifice a market, but theyre also not going to blithely let their secrets be stolen upon entry into China or on net usage.

Comment Re:What a crock (Score 1) 75

This is a variant of the venerable security through obscurity.

Not really.

Security is not an all-or-nothing proposition. In the real world, an adversary will NOT attempt to crack your encrypted filesystem. Instead they will do one of a hundred other attacks, like swapping your laptop with one that has a cloned disk and hardware but an embedded keylogger, or add in a shim between the disk and interface, or install an infected MBR that logs the decryption password, or perform a RAM sniffing attack to steal the keys, or simply extort the keys out of you.

Security is a process of analyzing the most common risks, and determining the best way to deal with them. Sometimes this means determining that a particular security action will lower your security by attracting the attention of entities with far more sophistication than you are prepared to deal with; if you are worried about criminals stealing your laptop, and your mitigation ends up attracting the attention of the NSA, you have lost the security battle.

IDS / antivirus have no ability whatsoever to detect a hardware keylogger, by the way. If you attract the attention of someone who can gain physical access to your hardware, you lose-- period.

Slashdot Top Deals

Waste not, get your budget cut next year.

Working...