Wireguard is banned in China, anything I could do about it?

I do use their mail…

Contact Expressvpn and nordvpn, they say all vpn providers are down after Jan 2023, due to “aggressive blockage”.

Thanks.

Yeah, most tools are banned since Jan, since the Covid roaming through the entire realm, killing countless ppl, damn covid nearly took my parents. The CPC is trying to hide something, or they are up to something…

Hello, Mr internet police. I swear my loyalty belongs to our most glorious party and true leader of humankind Mr Pooh himself. I just bypass the GFW to learn from evil western empire, so I could defeat them! I promise that my spirit is still red as fuck. I saved my virginity for our most pure party, I don’t even know what is Cornhub. Sincerely, A random Chinese who really really really loyal to CPC.

Not working, it’s detected, instant ban.

Most VPN aint work here in China, Express VPN use Lightway(based on wireguard) still works in China, but even Expressvpn was down, time is really tough.

嗯,作者也说过这是方便组网用的,翻墙不是设计目的。有考虑过使用国内大企业云端走CN2线路,不过国内云端更贵,且依然受到干扰。经过省级GFW升级,很多TCP,IPV4工具都不能用了,过去可以大摇大摆跨过GFW跑8K视频(虽然只有1080P的屏幕,笑),现在只能偷偷摸摸打游击看几个网页。

不是每个人生来就有很好的条件,像我这种出身国家级贫困县爷爷奶奶黑五类贱农,爸妈普通小职员,别说出国,出省都觉得很奢侈呢。能想象我90末、00年代还挨过饿,骨骼像非洲难民?每次学校、工作体检,医生都会提醒我:你有佝偻。再说,外国sim卡有很高的漫游费,这么做反而有割趾就履之嫌。专线,就是企业用的吗?那东西贵得离谱。之所以自己搭梯子,在于DIY很有意思,可以自己控制成本,添加功能,而且自己独享带宽。ExpressVPN那样的工具一年100美元,已经觉得很贵了。中国的情况继续恶化下去,没准真得想办法跑出去。在大城市007工资一万给房东当ATM,在大农村995工资两千给政府做苦力;就业越来越差大把人找不到工作全都考编,好不容易拼了命考上结果被加分的挤掉;不说露小姐王小姐周公子,本地巨贪也时不时让我感到更加绝望。现在愈发体会到小时候学的”兴亡百姓苦“。

I use home hosted wireguard. Working so far although I have not throughout much data through it just yet. Only the odd YouTube video. I mostly need it for checking emails. Speed seems fine (so far) got at least 2mb/s when I was viewing some video.

I tried Astril but never worked. Possibly due to parents inlaw ISP being shitty.

check out our free VPN community at r/vpn_fail if you want a VPN that actually works in China :slight_smile:

You can try cloak? It is meant to circumvent these types of bans.

I think this is because you didn’t configure it correctly. I was using x-ray for a long time and it performed well. Just follow the instructions on their official website.

I just confirmed my x-ray is working normally, so I’m quite sure that x-ray or v2ray are still efficient if you configure them correctly, unless you are in some specific areas in China. It is impossible to cross the firewall in that case, the firewall only allow IP and domain names in the white list.

Encryption ensures the security of data by transforming it into an unreadable format that can only be deciphered with the appropriate key. In contrast, obfuscation aims to disguise data, making it look like something else or simply very difficult to analyze.

Imagine you are connecting to a WireGuard server from your device. In this scenario, the threat actor is a state with extensive surveillance capabilities and strict control over network traffic.

Regarding Encryption:

Even with strong encryption, some metadata remains exposed at the network level, such as source and destination IP addresses, etc. A sophisticated threat actor with deep packet inspection capabilities can identify and potentially block unwanted traffic, including encrypted traffic, simply by recognizing its characteristics.

Regarding Obfuscation:

For a threat actor capable of performing network traffic analysis, obfuscation can make it more challenging to block certain types of traffic. If your WireGuard traffic is obfuscated to resemble regular HTTP traffic, it can blend in with normal expected traffic. This can be particularly useful in environments where encrypted traffic is actively targeted or entirely banned, as the obfuscated traffic is less likely to raise suspicion and be blocked.

I hope this answers your question and clarifies things.

udp2raw doesn’t require setting up a web server. It just requires a raw socket to implement fake TCP (it also supports ICMP tunneling), which means it needs root access which you probably have. I’m not sure if udp2raw fake TCP or ICMP tunneling will work in China, but if it does then this is one of the more faster options available. Some other tools like wstunnel and some v2ray configurations tunnel over websockets/HTTP which requires a web server.

You should not need a webpage for this.
You’ll need a VPS to run udp2raw and wireguard. You can access the VPS with an IP or a hostname,

I’m in China too. Foreigner in China. Express VPN has been shitty the past few months but recently started working again. Torguard worked. But now having issues with StarVPN using wireguard. (StarVPN has IPs I need and Express VPN does not)

I had Torguard working on Wireguardvon my ddwrt without any obfuscation for months.

But now I’m having issues using the same setup with StarVPN so I’m trying to find a way to get obfuscation/wg working on my router and found this thread.

The CCP is very busy with balloons at the moment.

What about using a tor bridge ?

Different region, different rule. ISP is part of GFW. Mine used to work as well, but now vps ports get instant ban, CDN gets exact 3 mins “time out”. Professionals said GFW might identify client fake tls package headers or something after massive machine learning in Oct 2022. Sooner or later, all provincial gfw hardware will get same upgrade. My area is less developed, there’s no foreigner or big enterprise. GFW is more aggressive.

My B, got confused with this

https://github.com/ShadowsocksR-Live/shadowsocksr-native

This one claims by using real https, GFW won’t be abled to detect and identify, this project even help Iranian during their internet blockage.

This balloon?

https://www.reddit.com/r/sanfrancisco/comments/10uo7xy/mystery_solved_by_the_bay/

LOL