Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

GFW certificated #59

Closed
cattyhouse opened this issue Oct 3, 2019 · 5 comments
Closed

GFW certificated #59

cattyhouse opened this issue Oct 3, 2019 · 5 comments

Comments

@cattyhouse
Copy link

very nice little program, tested server on Debian10 and client on macOS, worked great, it even adds routes and MASQUERADE automatically!

but it is already GFW (you may heard of it, if not, it stands for Great Fire Wall) certificated, several mins later, disconnected and not able to connect again. Anyway, thanks for this great program.

@jedisct1
Copy link
Owner

jedisct1 commented Oct 3, 2019

Even on port 443?

@cattyhouse
Copy link
Author

Even on port 443?
Sorry due to my complex network setup, i forgot to reset my router DHCP settings to default, the information i provided was not accurate, it is actually GFW resistance at the moment. I will test for few days see if GFW bother me or not. I'm sorry.

@briteming
Copy link

@jedisct1
hi,
in my linux vps,i run:
./dsvpn server vpn.key auto 1959

do i have to use port 443 in order to encrypt the connection?

@briteming
Copy link

@cattyhouse
hi,
你在服务器上,让dsvpn监听443端口,就一直能使用dsvpn而未导致你服务器的ip被封吗?
我先头让dsvpn监听1959端口,导致我的vps两次被封IP。
谢谢回复

@briteming
Copy link

在服务器上,让dsvpn监听443端口,暂时能翻墙,看看 能维持多久,也许forever?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants