Isp block all vpn protocols, what should i do?

yesterday i bought a Mikrotik server from another country only for bypassing censorship in my country, i setup wireguard and pptp server and i could connect them easily with my android and pc, but today all protocols stop working for me. is there any way i could fix the issue ?

Try an SSL VPN like OpenVPN or SSTP. It shows as just web traffic over port 443 so unless they have blocked the IP for your server it should work no issues

PPTP is not very secure anyway so maybe a silver lining in this

Use an alternate port for something that isn’t blocked?

You can forward ports over ssh as well, if ssh is allowed. Be SURE you validate the server host by sshin’g to it, BEFORE you go behind the censorship wall, as they may intercept the connections (which will show up as an unverifiable host key)

And keep in mind that it is actually illegal in some countries to even try to do what you’re doing, and if they catch you, you may find yourself in a lot of trouble.

It could be paranoia talking, but can you confirm you’re going to the same IP address as before for the other end? They might be intercepting the DNS lookup, if it’s a well-known VPN service.

use SSTP

tik to tik, you don’t need a certificate, you can run it on port 443 or 80. Simple to setup. Its 99% automatic

Have you tried wireguard?

so when im creating ovpn server change 1194 to 433 in the setting ?

i just tried ssh and telnet with putty, i got Network error: Connection refused

how can i check that ? yesterday i was connecting via l2tp and wireguard and pptp, today none of them working…

Yep just run it on 443, if you need to test i can provide test openvpn at 443 (europe ip) , just dm me

To pass as https traffic you should use port 433 and tcp protocol in the openvpn server

Did you setup an SSH service first on the server/host? And allow connections from the Internet?

Ping the server name and note the IP address. Pop it in a geolocator service and see what you get. It won’t be exact, but it’ll give you an idea. Better yet, trace route it and see what path it takes to get to the server.

We did test with my pritunl 443 openvpn and it gets blocked,
the tls hanshake does not properly finish

i did previously run this setup on many diferent blocked (mostly public wlans where wireguard was blocked), i quess this guys isp runs some more sophisticated L7 inspection?

log:

[summer-dreams-6693] Wed Sep 28 20:55:20 2022 TCP connection established with [XX_INET]xx.xx.xx.xx:6199

[summer-dreams-6693] Wed Sep 28 20:55:22 2022 xx.xx.xx.xx:11031 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)

[summer-dreams-6693] Wed Sep 28 20:55:22 2022 xx.xx.xx.xx:11031 TLS Error: TLS handshake failed

[summer-dreams-6693] Wed Sep 28 20:55:22 2022 xx.xx.xx.xx:11031 Fatal TLS error (check_tls_errors_co), restarting

repeats indefinitely

If anyone has some trick up their sleeve, let us know :slight_smile:

Yes, my typo.
Should be 443.

yes my bad it was disable from ip/services i just enabled it and i can ssh now. the other thing i see there is that my www-ssl 443 is disable, i just enable it, but when i put 443 port in ovpn’s setting it gets red. what should i do for that case ?

yeah they were the same

443 is https unless you reconfigure something else to run there.

what do you suggest for my case bro ?