Wireguard is banned in China, anything I could do about it?

Recently, our glorious party and stupid dictator banned all TCP TLS base stuff I used to bypass the Great Firewall of China. So I tried my first UPD VPN.

1st attempt: direct link to wireguard vps to bypass GFW internet blockage, days later it’s banned.

2nd attempt: add port forwarding vps 2 between wireguard vps 1. Vps 2 was banned after 10gb data transmission.

I’m 100% sure CPC is banning wireguard if the data goes to foreign ip address, there’s a total data size to trigger the alarm. And wireguard is too easy to identify. Any stuff I could use to hide wireguard transmission? Maybe disguise the data packages a little?

PS: I don’t know much about computer, but I could read and try, try, try again. Things too complicated might not suit my situation tho… But the taste of freedom keeps me going, even it’s only virtual.

Update 20230213 1AM temporary solutions:

Correction 7AM:

I just watched some pets videos, used 200mb data, port banned again.

GFW didn’t cut off connection like it did to Shadowsocks or v2ray, but once I manually dropped connection, reactivate will fail. They know I was doing sneaky sneaky all the time.

CPC hates cats and dogos. Can’t believe dictators would use so many resources to stop people from seeing things they are told not to watch, listen, read…Why can’t dictators simply give back our freedom and stop stealing from us, listen to people, use those resources to serve the citizen, so everybody would be happy…Oh wait it’s democratic politics.

Bro, are U a Chinese or foreign citizen? Why don’t you consider some protocols like v2ray or x-ray? Wireguard is very easy to identify and should not be your first option to cross the firewall. And by the way, the government has banned wireguard a long time before.

Wireguard does indeed has a good cryptographic implementation, but I think there might be a general confusion between the notions of encryption and obfuscation.

Considering you’re trying to bypass the great firewall of China it will require obfuscating your network traffic.

In this case, I will recommend you to have a look at the following tools:

  • shadowsocks / socks5
  • obfsproxy
  • OpenVPN + xor scrambler
  • v2ray ( already mentioned by Someone Waiting).

I hope this information helps you.

https://github.com/lrvl/tunnel-wireguard-udp2raw
Edit: Sorry, some context here. Try to change things a little. Wireguard by itself is too easy to identify… a VPN might also be too easy if there is a bunch of traffic to a single IP.

Leave as long as you can

ProtonVPN has a stealth option that should be harder to detect and block

Anyone here thinking this guy might actually be a Chinese it guy who wants to know your secrets of passing by the great Wall in order to block them …?

Please update if you find a solution.

Can you try Shadowsocks?

This was an interesting blog post on some things that the GWF does/requires, even though it is now quite old already:

check out r/dumbclub for china specific jumping the wall tips.
Previously, I was able to connect to wireguard via v2ray. Super slow but it worked.

Try Astrill, it still works.
At the moment ExpressVPN works on China Unicom, but very unreliable on China Telecom.

try Phantun plz, udp in tcp tunnel.

op deleted their account but if anyone is in china and would like help please reach out. i don’t have any solutions but would like to learn more about your experiences with the firewall so i can brainstorm some ideas.

Tried, not working, I could log in via ssh, ping the server, but can’t open any webpage, huge package loss.

GFW could 100% identify Shadowsocks/socks5 and V2ray, I used both of them. And other tools: vless, vmess, xtls, utls…

https://github.com/gfw-report/shadowsocks-rust

Modified versions might still work.

Once everything was set up, I can only open one single webpage such as google.com, then instant port ban. After Feb, these tools no longer work for me. Ppl in top tier city or other regions still use SS. Maybe my local ISP is real meanie.

Or maybe they put me on list… In Jan, I did bad mouth about our party and officials on China’s social media, after that my vps got banned one by one.

I just don’t understand, why do we need to obfuscate the traffic if it is already encrypted?

Um, saw udp2raw in github days ago, but do I really have to set up a real website? That sounds like big project. Anyway, thanks. I just need to get a free tk domain, then overcome my fear of “building a real website”, then learn more to protect my website from attacking, then…I just need to learn more. Thanks pal.

yo do you have discord? if so please add me user is azuraeth, i use letsvpn atm it connects instantly but is pretty slow