* WireGuard obfuscation using shadowsocks
@ 2019-01-23 22:48 Yegor Ievlev
0 siblings, 0 replies; only message in thread
From: Yegor Ievlev @ 2019-01-23 22:48 UTC (permalink / raw)
To: wireguard
Recently there was discussion about obfuscation to avoid restrictive
firewalls. The conclusion apparently was that WG devs should add
support for pluggable transports. This is a good idea, but for now you
can just use shadowsocks-libev:
On server:
ss-server -s 0.0.0.0 -s ::0 -p 443 -k shadowsocks-password -m
aes-128-gcm -U # change to lowercase u if you want to be able to
connect to the server over TCP too.
On client:
ss-tunnel -s shadowsocks-server -p 443 -l 51820 -L
wireguard-server:51820 -k shadowsocks-password -m aes-128-gcm -U
Connect WireGuard to 127.0.0.1:51820. Done.
_______________________________________________
WireGuard mailing list
WireGuard@lists.zx2c4.com
https://lists.zx2c4.com/mailman/listinfo/wireguard
^ permalink raw reply [flat|nested] only message in thread
only message in thread, other threads:[~2019-01-24 2:05 UTC | newest]
Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-01-23 22:48 WireGuard obfuscation using shadowsocks Yegor Ievlev
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).